Aggregator
每周勒索威胁摘要
记一次敏感文件权限维持
XZ-Utils后门事件过程及启示
Akamai?s Perspective on April?s Patch Tuesday 2024
中国网络安全行业全景图(第十一版)发布
渗透入门靶场大盘点
当Nashorn失去括号:非典型Java命令执行绕过
昨天『代码审计』知识星球里有同学向我提了一个有趣的问题:
简单来说就是,在Java的Nashorn脚本中,如果不允许使用小括号(、)和中括号[、],如何执行任意命令?
0x01 浏览器JavaScript无括号XSS我们知道,Nashorn脚本本质上是JavaScript,而无括号的XSS Payload其实是一个老问题了。因为JavaScript在执行函数的时候需要使用括号,所以解决问...
Importance of Scanning Files on Uploader Applications
Cybersecurity Decluttered: A Journey to Consolidation
SDL 18/100问:编码阶段,开展哪些安全活动?
How to Dramatically Simplify PCI DSS Compliance
Ransomware Groups Experiment with a New Tactic: Re-Extortion
As we regularly observe in this blog, ransomware is devious and endlessly inventive. It’s this ability to find new variations on the same basic extortion template that has made it the most successful commercial form of cybercrime yet invented. Excepting the occasional technical hack (including a talent for spotting weaknesses everyone else has overlooked), most […]
The post Ransomware Groups Experiment with a New Tactic: Re-Extortion appeared first on Ransomware.org.
John W. Lyons, Who Led NIST in Times of Great Change, Dies at 93
APT37组织通过RoKRAT恶意软件采用无文件攻击的活动持续增长——每周威胁情报动态第171期(04.11-04.17)
Beyond fun and games: Exploring privacy risks in children’s apps
360、阿里这么一搞,找工作更难了
创业一周年随笔
腾讯科恩实验室: 特斯拉Autopilot的实验性安全研究
AAAI-20论文解读:基于图神经网络的二进制代码分析
腾讯安全科恩实验室《Order Matters: Semantic-Aware Neural Networks for Binary Code Similarity Detection》论文入选人工智能领域顶级学术会议AAAI-20。研究核心是利用AI算法解决大规模二进制程序函数相似性分析的问题,本文将深入对该论文进行解读,完整论文可以通过访问以下链接获取: Order Matters: Semantic-Aware Neu for Binary Code Similarity Detection