issues
search
BruceFeIix
/
picker
GNU General Public License v3.0
49
stars
6
forks
source link
[每日信息流] 2024-10-17
#1289
Open
BruceFeIix
opened
1 month ago
BruceFeIix
commented
1 month ago
每日安全资讯(2024-10-17)
奇安信攻防社区
[ ]
Windows内核:用内核APIo&HIVE文件格式管理注册表
CXSECURITY Database RSS Feed - CXSecurity.com
[ ]
dolibarr 20.0.1 Multiple security token SQLi
[ ]
BYOB Unauthenticated Remote Code Execution
[ ]
Ultra Mini HTTPd 1.21 - POST - Denial of Service (DoS)
Recent Commits to cve:main
[ ]
Update Wed Oct 16 22:53:05 UTC 2024
[ ]
Update Wed Oct 16 14:41:55 UTC 2024
[ ]
Update Wed Oct 16 06:40:20 UTC 2024
Tenable Blog
[ ]
At Nearly $1 Billion Global Impact, the Best Cloud Security Couldn’t Stop This Hybrid Attack Path. Takeaway: Map and Close Viable Attack Paths Before Breaches Begin.
obaby@mars
[ ]
熬夜游戏【2b continue】
嘶吼 RoarTalk – 网络安全行业综合服务平台,4hou.com
[ ]
蚂蚁安全交流会北京站来啦 | 嘉宾议程公布!
[ ]
尽快提交!2024年网络安全“金帽子”年度评选活动报名进行中
[ ]
Microsoft 在 Windows Server 中弃用 PPTP 和 L2TP VPN 协议
SecWiki News
[ ]
SecWiki News 2024-10-16 Review
安全客-有思想的安全新媒体
[ ]
网络骗子关闭了英国和美国的学校,数千名儿童受到影响
[ ]
美国 CISA 将 Fortinet 产品和 Ivanti CSA 漏洞列入已知漏洞目录
[ ]
Intel Broker声称思科遭入侵,出售各大公司被盗数据
[ ]
CVE-2024-9921 (CVSS 9.8): 在流行的商业协作工具 Team+ 中发现严重漏洞
[ ]
“Water Makara”使用Astaroth恶意软件对巴西组织进行有针对性的攻击
[ ]
Earth Simnavaz 利用 Windows 内核漏洞 CVE-2024-30088 攻击关键基础设施
[ ]
针对 Windows 内核模式驱动程序权限提升漏洞 (CVE-2024-35250) 的 PoC 漏洞利用程序发布
[ ]
F5 的杰出工程师 Lori MacVittie 探讨了 API 安全的现状
[ ]
WordPress插件Jetpack修复了影响2700万个网站的重大漏洞
[ ]
使用密码管理器安全吗?(优点、风险和最佳做法)
Files ≈ Packet Storm
[ ]
BYOB Unauthenticated Remote Code Execution
[ ]
GNUnet P2P Framework 0.22.1
[ ]
ABB Cylon Aspect 3.08.01 mapConfigurationDownload.php Configuration Download
[ ]
Ubuntu Security Notice USN-7048-2
[ ]
Red Hat Security Advisory 2024-8176-03
[ ]
Red Hat Security Advisory 2024-8173-03
[ ]
Ubuntu Security Notice USN-7038-2
[ ]
Red Hat Security Advisory 2024-8172-03
[ ]
Red Hat Security Advisory 2024-8171-03
[ ]
Red Hat Security Advisory 2024-8170-03
[ ]
Ubuntu Security Notice USN-7070-1
[ ]
Red Hat Security Advisory 2024-8169-03
[ ]
Red Hat Security Advisory 2024-8168-03
[ ]
Ubuntu Security Notice USN-7069-1
[ ]
Red Hat Security Advisory 2024-8167-03
[ ]
Ubuntu Security Notice USN-7064-1
[ ]
Red Hat Security Advisory 2024-8166-03
[ ]
Red Hat Security Advisory 2024-8162-03
[ ]
Red Hat Security Advisory 2024-8161-03
[ ]
Red Hat Security Advisory 2024-8158-03
[ ]
Red Hat Security Advisory 2024-8157-03
[ ]
Red Hat Security Advisory 2024-8132-03
[ ]
Red Hat Security Advisory 2024-8120-03
[ ]
Red Hat Security Advisory 2024-8112-03
[ ]
Red Hat Security Advisory 2024-7925-03
Doonsec's feed
[ ]
【祝贺】祝贺第二届全国大学生开源情报数据采集与分析大赛88支队伍获奖
[ ]
【工具】WiFi数据分析平台
[ ]
牟林:以色列为何这么狂?
[ ]
【漏洞预警】Apache Solr 认证绕过漏洞CVE-2024-45216
[ ]
【漏洞预警】Oracle 2024年10月补丁日多个安全漏洞
[ ]
【提权】最新 windows 提权 CVE-2024-35250
[ ]
Java反序列化之 CC1 链从0到1
[ ]
漏洞预警 | Oracle WebLogic Server 存在反序列化漏洞
[ ]
一些好用的渗透工具推荐
[ ]
保护隐私,无忧消费
[ ]
身处微信办公时代,敏感数据该何去何从?
[ ]
盛邦安全GITEX GLOBAL 2024首秀,构筑网络安全纵深防御体系
[ ]
一次性看个够,证书站锦集!
[ ]
华为联合客户面向中东地区发布Discover Huawei SASE体验计划
[ ]
整数智能CTO刘明皓出席“上汽集团技术创新峰会”
[ ]
专题·“微软蓝屏”事件 | 美国软件供应链安全政策的演进及对我国的启示
[ ]
【干货】笑傲职场的独家经验(1)
[ ]
【干货原创】实网攻防演习常态化,会带来什么变化01
[ ]
【干货原创】K12教育,鲜为人知的模式秘密
[ ]
原创文章目录
[ ]
万户ezOFFICE协同管理平台 GeneralWeb XXE to RCE
[ ]
建了个SRC专项漏洞知识库
[ ]
G.O.S.S.I.P 阅读推荐 2024-10-16 LLM帮你理解安全补丁
[ ]
工业和信息化部与北京市召开推动人工智能赋能新型工业化座谈会
[ ]
【重磅】赛迪研究院和上海人工智能研究院联合发布《灵巧手行业研究报告》
[ ]
星火阵地 | 四川省“5G+工业互联网”一体化进园区暨工业互联网标识大会、“安徽工业互联网高质量发展专题培训班”成功举办
[ ]
工业互联网产业联盟标识工作组第二十六次会议成功召开,聚焦行业应用与生态共建
[ ]
【年会】网络与信息法学研究会2024年年会精彩观点回顾(分论坛二)
[ ]
【资讯】工信部就《人工智能办公大模型系统技术要求》等198项行业标准、1项推荐性国家标准计划项目公开征求意见
[ ]
【资讯】工信部办公厅发布《关于征集先进计算赋能新质生产力典型应用案例的通知》
[ ]
用友 NC saveXmlToFIleServlet 任意文件上传漏洞(XVE-2024-6507)
[ ]
2024年御宛杯WP
[ ]
面向车路云一体化的数据安全 2023.11 中国汽车工程学会、CAICV 63页
[ ]
自动驾驶系统架构师在线培训课程(中级班)
[ ]
《面向车路云一体化的智能网联汽车数据分类分级指南》
[ ]
招聘|北京|技术专家|P7
[ ]
Metasploit恶意ShellCode注入进程的简单示例
[ ]
《2023-2024中国商用密码行业发展报告》正式预售
[ ]
四川省2024年产业新赛道拟认定名单公示,信息系统密码及安全作为单独赛道
[ ]
中国网安协会:建议对英特尔在华销售产品启动网络安全审查
[ ]
欢迎报考国家数据局公务员
[ ]
热络拉拢、高薪兼职、U盘窃听……这些隐秘陷阱,出境人员切需提防
[ ]
大量个人信息遭境外访问窃取,上海某医疗科技企业被行政处罚
[ ]
代理池工具 - Deadpool
[ ]
蚂蚁安全交流会北京站来啦 | 嘉宾议程公布!
[ ]
思科机密开发数据疑遭大规模泄漏
[ ]
隐秘的测绘 秘密的泄露
Security Boulevard
[ ]
A Turning Point in Loyalty Fraud Prevention
[ ]
Apple Enrages IT — 45-Day Cert Expiration Fury
[ ]
Fortinet Integrates Lacework CNAPP into Cybersecurity Portfolio
[ ]
Escalation of Cyber Warfare in the Israel-Palestine Conflict: A Deep Dive into Recent Israeli Breaches
[ ]
USENIX NSDI ’24 – Hairpin: Rethinking Packet Loss Recovery in Edge-based Interactive Video Streaming
[ ]
More Ransoms Being Paid and More Data Being Lost: Hornetsecurity
[ ]
At Nearly $1 Billion Global Impact, the Best Cloud Security Couldn’t Stop This Hybrid Attack Path. Lesson: Map and Close Viable Attack Paths Before Breaches Begin.
[ ]
Connect Everything, Fix Anything: 50+ Integrations with Veriti
[ ]
Everything you need to know about NIST Security Compliance
[ ]
Finance and Insurance API Security: A Critical Imperative
一个被知识诅咒的人
[ ]
用Java实现机器学习模型:深入探索Deep Java Library (DJL)
[ ]
AI写作助手:用Python构建一个自动生成技术文章的工具
[ ]
利用AIGC自动生成API文档与代码注释:提升代码可读性与开发效率
[ ]
Java中的函数式编程:从Lambda表达式到Stream API
CCC Event Blog
[ ]
38C3 – Infoseiten und Chat
Malwarebytes
[ ]
“Nudify” deepfake bots remove clothes from victims in minutes, and millions are using them
[ ]
Tor Browser and Firefox users should update to fix actively exploited vulnerability
Binary Ninja
[ ]
Objective-C Update
Reverse Engineering
[ ]
Reverse engineering a dead MOTU audio interface to detect its failure
Brute XSS
[ ]
Bypassing Whitelists With XSS Payloads in Attributes
HackerNews
[ ]
“Water Makara”使用 Astaroth 恶意软件对巴西组织进行有针对性的攻击
[ ]
可绕过安全防护!EDR Silencer 红队工具遭黑客利用
[ ]
朝鲜黑客利用 FASTCash 恶意软件从多个国家 ATM 机中窃取资金
[ ]
美国州政府利用漏洞奖励强化防护体系,安全众测成为联合防御最佳实践
[ ]
台湾游客用于酒店预定的敏感信息竟遭遇大规模泄露?
FreeBuf网络安全行业门户
[ ]
FreeBuf早报 | 万维网联盟宣布隐私工作组章程;黑客利用代码托管平台托管恶意负载
[ ]
朝鲜黑客利用FASTCash恶意软件从多个国家ATM机中窃取资金
[ ]
2024年,全球数据贩卖、勒索攻击等黑产事件大幅上升
[ ]
可绕过安全防护!EDR Silencer红队工具遭黑客利用
rtl-sdr.com
[ ]
Project H Line 3D: Beginners Guide to Hydrogen Line Antenna Fabrication, Reception, Software and Graphic Display
[ ]
Videos from the Software Defined Radio Academy 2024 Conference Now On YouTube
[ ]
A Review of the New HackRF PortaPack H4M
安全牛
[ ]
特斯拉Robotaxi 风光背后,理性审视新一代智能终端的安全挑战
[ ]
Log4j威胁阴影未散,超13%运行实例仍存安全隐患; APT34最新攻击手法揭秘:瞄准微软Exchange服务器 | 牛览
微步在线研究响应中心
[ ]
捕获在野利用!Weblogic RCE 数月前已支持检测
威努特安全网络
[ ]
威努特协同华新水泥荣获2024 IDC中国20大杰出安全项目
奇安信威胁情报中心
[ ]
疑似 Mysterious Elephant 组织利用 CHM 文件攻击南亚多国
安全客
[ ]
Linux系统安全告急:新技术绕过“noexec”,任意代码执行风险激增
君哥的体历
[ ]
关于证券公司数据安全治理及web认证授权的探讨...|总第267周
安全内参
[ ]
大量个人信息遭境外访问窃取,上海某医疗科技企业被行政处罚
[ ]
美国州政府利用漏洞奖励强化防护体系,安全众测成为联合防御最佳实践
安全分析与研究
[ ]
针对新型SWIFT勒索病毒的详细分析报告
长亭安全应急响应中心
[ ]
【已复现】Oracle WebLogic Server 远程代码执行漏洞(CVE-2024-21216)
奇安信 CERT
[ ]
Oracle 2024年10月补丁日多产品高危漏洞安全风险通告
Hacking就是好玩
[ ]
帮朋友招聘 关键词:成都 安全开发 golang easm 扫描器
中国信息安全
[ ]
专题·“微软蓝屏”事件 | 美国软件供应链安全政策的演进及对我国的启示
[ ]
专家解读 | 王建民:以国家数据标准体系为支撑,加速构建数据领域发展新格局
[ ]
前沿 | 网络法治护航数字丝路 为全球数字治理贡献中国智慧
[ ]
观点 | 生成式人工智能的技术局限和伦理风险
[ ]
观点 | 人工智能时代“网络水军”的危害与治理策略
[ ]
前沿 | IPv6环境下秒拨攻击抑制方案研究
安全圈
[ ]
【安全圈】腾讯云加强短信群发资质审核 需提交手持身份证拍照并按手印签署承诺书
[ ]
【安全圈】朝鲜黑客利用FASTCash恶意软件从多个国家ATM机中窃取资金
[ ]
【安全圈】可绕过安全防护!EDR Silencer红队工具遭黑客利用
[ ]
【安全圈】亚马逊宣布全面转向Passkey无密码登录 目前已有超过1.75亿用户使用通行密钥
代码卫士
[ ]
GitHub Enterprise Server中存在严重漏洞,可越权访问实例
[ ]
微软:学校每周面临数千次攻击
非尝咸鱼贩
[ ]
彗星又来的那一夜
数世咨询
[ ]
警报围城:SOC团队如何突破威胁检测工具的误报困境
补天平台
[ ]
倒计时2天,2024补天白帽大会参会小贴士!
奇客Solidot–传递最新科技情报
[ ]
突触变化将多次获胜的小鼠变成恶霸
[ ]
三季度智能手机出货量增长 4%
[ ]
青少年社媒使用与焦虑和抑郁强相关
[ ]
日本继续工作的 65 岁以上老年人数量超 900 万
[ ]
日本高滨核电站 1 号机组获准运行超过 50 年
[ ]
太阳活动进入极大期
[ ]
Google Chrome 开始自动禁用 uBlock Origin
[ ]
诺贝尔经济学奖授予了证明制度对国家繁荣重要性的三位经济学家
[ ]
AMD 和英特尔宣布在 x86 架构实现上展开合作
嘶吼专业版
[ ]
尽快提交!2024年网络安全“金帽子”年度评选活动报名进行中
[ ]
Microsoft 在 Windows Server 中弃用 PPTP 和 L2TP VPN 协议
安全攻防团队
[ ]
腾讯安全威胁情报中心推出2024年9月必修安全漏洞清单
威胁猎人Threat Hunter
[ ]
看不见的广告:2024年第三季度品牌广告欺诈研究报告
安全研究GoSSIP
[ ]
G.O.S.S.I.P 阅读推荐 2024-10-16 LLM帮你理解安全补丁
vivo千镜
[ ]
VDC安全与隐私会场专题解读一:全面拥抱AI,共建可信透明的安全体验
腾讯安全威胁情报中心
[ ]
24年9月必修安全漏洞清单|腾讯安全威胁情报中心
国家互联网应急中心CNCERT
[ ]
网络安全信息与动态周报2024年第41期(10月7日-10月13日)
情报分析师
[ ]
平壤的道路爆炸和无人机,双方是否即将走向一场大战
[ ]
开源情报信息,一网打尽!
深信服千里目安全技术中心
[ ]
Oracle 补丁日安全通告10月份
慢雾科技
[ ]
慢雾:Compound Finance V2 安全审计手册
微步在线
[ ]
流量迷踪,真相即将上线
[ ]
2024北京民营企业百强系列榜单发布 微步连登三榜
360数字安全
[ ]
热点 | 又一汽车巨头遭勒索攻击,360为车企系好网络“安全带”
迪哥讲事
[ ]
CTF培训零基础提升班
极客公园
[ ]
这朵云,支起了中国游戏界的「半壁江山」
[ ]
老黄、苏妈、基辛格齐站台,联想搞了什么大事?
[ ]
苹果 iPad mini 7上市,3999 元起;英特尔 AMD 首次联手,振兴 x86;中国将探索地外生命 | 极客早知道
娜璋AI安全之家
[ ]
[漏洞挖掘与防护] 04.Windows系统安全缺陷之5次Shift漏洞启动计算机机理分析
dotNet安全矩阵
[ ]
.NET 一款内置9种不同混淆方法的工具
[ ]
.NET 内网攻防实战电子报刊
[ ]
SoapShell 更新 | 增强免杀版适配冰蝎4.0客户端的WebShell
Krypt3ia
[ ]
Threat Actor Profile: TA-RedAnt
Securityinfo.it
[ ]
Motti Ben Shoshan: “F5, innovazione e sicurezza per il futuro del cloud”
[ ]
FASTCash: una nuova variante colpisce i sistemi Linux per prelevare denaro dagli sportelli
Over Security - Cybersecurity news aggregator
[ ]
Iranian hackers act as brokers selling critical infrastructure access
[ ]
Google: 70% of exploited flaws disclosed in 2023 were zero-days
[ ]
USDoD hacker behind National Public Data breach arrested in Brazil
[ ]
Sudanese brothers charged for ‘Anonymous Sudan’ attacks targeting critical infrastructure, government agencies and hospitals
[ ]
French government uses biased algorithm to detect welfare fraud, rights groups say
[ ]
SolarWinds Web Help Desk flaw is now exploited in attacks
[ ]
The latest in North Korea’s fake IT worker scheme: Extorting the employers
[ ]
US disrupts Anonymous Sudan DDoS operation, indicts 2 Sudanese brothers
[ ]
Understand these seven password attacks and how to stop them
[ ]
Critical Kubernetes Image Builder flaw gives SSH root access to VMs
[ ]
Russia's case against REvil hackers proceeds as government recommends 6.5-year sentence
[ ]
Critical Vulnerability in Veeam Products Exploited by Ransomware Gangs
[ ]
Malicious ads exploited Internet Explorer zero day to drop malware
[ ]
Hackers target Ukraine’s potential conscripts with MeduzaStealer malware
[ ]
Credit Card Fraud in 2024: A Complete Guide to Prevention
[ ]
Amazon says 175 million customers now use passkeys to log in
[ ]
Protecting major events: An incident response blueprint
[ ]
Motti Ben Shoshan: “F5, innovazione e sicurezza per il futuro del cloud”
[ ]
'Nationally significant' cyberattacks are surging, warns the UK's new cyber chief
[ ]
The Evolution of Phishing: A Brief History
[ ]
CISA Issues Urgent Advisory on Vulnerabilities Affecting Multiple Products
[ ]
Cyber Information Gathering: Techniques and Tools for Effective Threat Research
[ ]
Mamba 2FA, così rubano gli account Microsoft 365: come difendersi
[ ]
Violazione dati, bastano le scuse per risarcire il danno privacy: ecco in quali casi
[ ]
Conformità alla NIS 2 e a DORA: aziende e CISO sono pronti? Indicazioni operative
[ ]
Tra IA e dominio degli algoritmi, come cambia il ruolo delle Autorità: sfide e opportunità
[ ]
Non si può invocare il legittimo interesse per scopi commerciali: quali impatti
[ ]
Il phishing si nasconde nei commenti di GitHub per bypassare i filtri e-mail: come difendersi
[ ]
Ruolo cruciale del C-Level: responsibility, accountability e liability secondo la NIS 2
[ ]
TrickMo ruba i codici OTP e prende il controllo dei dispositivi Android: come difendersi
[ ]
Scoperto un attacco quantistico alla crittografia tradizionale: quali implicazioni
[ ]
L’AI per la difesa nazionale: alleata o cavallo di Troia? L’esperimento nel Regno Unito
[ ]
FASTCash: una nuova variante colpisce i sistemi Linux per prelevare denaro dagli sportelli
[ ]
More than two dozen countries have used internet outages to sway elections: report
ICT Security Magazine
[ ]
Cybersquatting e Combosquatting – La minaccia digitale per i marchi aziendali
[ ]
La governance di sicurezza del Programma spaziale europeo
SANS Internet Storm Center, InfoCON: green
[ ]
The Top 10 Not So Common SSH Usernames and Passwords, (Wed, Oct 16th)
[ ]
ISC Stormcast For Wednesday, October 16th, 2024 https://isc.sans.edu/podcastdetail/9182, (Wed, Oct 16th)
Schneier on Security
[ ]
Cheating at Conkers
The Hacker News
[ ]
Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity
[ ]
FIDO Alliance Drafts New Protocol to Simplify Passkey Transfers Across Different Platforms
[ ]
From Misuse to Abuse: AI Risks and Attacks
[ ]
North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware
[ ]
5 Techniques for Collecting Cyber Threat Intelligence
[ ]
Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack
[ ]
GitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Access
[ ]
CISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability
Security Affairs
[ ]
Brazil’s Polícia Federal arrested the notorious hacker USDoD
[ ]
Finnish Customs dismantled the dark web drugs market Sipulitie
[ ]
U.S. CISA adds Microsoft Windows Kernel, Mozilla Firefox and SolarWinds Web Help Desk bugs to its Known Exploited Vulnerabilities catalog
[ ]
GitHub addressed a critical vulnerability in Enterprise Server
Deeplinks
[ ]
Preemption Playbook: Big Tech’s Blueprint Comes Straight from Big Tobacco
[ ]
Courts Agree That No One Should Have a Monopoly Over the Law. Congress Shouldn’t Change That
[ ]
EFF and IFPTE Local 20 Attain Labor Contract
Computer Forensics
[ ]
I am getting a BS in computer science, need help with career in DF
[ ]
Archive E01 create from a Sd card cellphone with password
[ ]
Get Bitlocker Recovery Key with FVEK
Graham Cluley
[ ]
Smashing Security podcast #389: WordPress vs WP Engine, and the Internet Archive is down
Blackhat Library: Hacking techniques and research
[ ]
How Hackers Really Used Infostealers for the Biggest Recent Cyber Breaches
[ ]
Penetration Testing 101 | TryHackMe Pentesting Fundamentals
Technical Information Security Content & Discussion
[ ]
DTLS "ClientHello" Race Conditions in WebRTC Implementations
[ ]
Spoofing Internal Packets for Multihomed Linux Devices - Anvil Secure
Deep Web
[ ]
Open Mkts
Your Open Hacker Community
[ ]
How useful can math knowledge be?
[ ]
Help with reverse engineering old dos program
Social Engineering
[ ]
What's up with the world today?
[ ]
Video Games Are a Key Battleground in the Propaganda War
[ ]
How to make complex things more accessible so everybody will understand?
Dark Space Blogspot
[ ]
Migliori Progetti AI Su Blockchain (2024-2025)
每日安全资讯(2024-10-17)