Aggregator
CVE-2025-6509 | seaswalker spring-analysis up to 4379cce848af96997a9d7ef91d594aa129be8d71 SimpleController.java echo Name cross site scripting (EUVD-2025-18896)
The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M
Гауссовы операции — ключ к практическому эмбиззлменту или очередная теория?
Submit #593061: Netgear ex3700 1.0.0.88 Stack-based Buffer Overflow [Duplicate]
Bill Gates 和 Linus Torvalds 首次同框
Submit #592962: seaswalker spring-analysis master branch Cross Site Scripting [Accepted]
CVE-2002-0644 | Microsoft SQL Server 2000 DBCC memory corruption (MS02-038 / EDB-21650)
CVE-2015-0318 | Adobe Flash Player up to 16.0.0.296 memory corruption (APSB15-04 / EDB-36420)
Chinese “LapDogs” ORB Network Targets US and Asia
Защищённый туннель оказался ловушкой: каждый байт трафика может стать последним для вашей Windows
CVE-2019-11358 | Oracle Financial Services Asset Liability Management 8.0.4/8.0.5/8.0.6/8.0.7 jQuery cross site scripting (EDB-52141 / Nessus ID 208606)
Microsoft Family Safety Now Blocking All Versions of Google Chrome
In a development that has left students, parents, and educators frustrated, Microsoft’s Family Safety feature is now blocking all versions of Google Chrome from launching on Windows devices. The issue, which first surfaced in early June, has persisted for over two weeks without an official fix or comment from Microsoft, raising concerns about both digital […]
The post Microsoft Family Safety Now Blocking All Versions of Google Chrome appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2017-7089 | Apple iOS up to 10.3.2 WebKit Universal cross site scripting (HT208112 / EDB-45866)
Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes’ Data from Saudi Games
CVE-2002-0649 | Microsoft SQL Server 2000 Resolution Service memory corruption (VU#399260 / EDB-16393)
Former JBLM Soldier Admits Attempting to Leak U.S. Military Network Details to China
A former U.S. Army sergeant who served at Joint Base Lewis-McChord (JBLM) in Washington has pleaded guilty to federal charges after admitting he tried to deliver sensitive military secrets to Chinese authorities. Joseph Daniel Schmidt, 31, entered his plea in U.S. District Court in Seattle, acknowledging two felonies: attempting to deliver national defense information and […]
The post Former JBLM Soldier Admits Attempting to Leak U.S. Military Network Details to China appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
14 лет — и уже наёмник: Европа в шоке от «насилия по подписке»
Враг Microsoft номер один — на одном фото с Гейтсом. Спокойно, пока это только ужин… или?
梆梆安全鸿蒙应用加固双路径发布:源码级与二进制级精准防护
随着鸿蒙生态的高速发展,其应用承载的核心业务价值持续攀升,吸引了全球不法分子的针对性研究与攻击。鸿蒙应用面临的逆向分析、代码窃取、二次打包、模拟运行及调试攻击等风险随之加剧。作为开发企业,必须部署有效防护,而非让应用“裸奔”发布,同时应结合自身实际需求,选择合适的加固服务路径。
梆梆安全依托十余年移动安全技术积淀,推出覆盖鸿蒙应用开发全周期的双路径加固方案。方案涵盖 “源码级加固” 与 “二进制级加固” 两种成熟且独立的加固技术路径,客户可根据项目阶段灵活适配。
路径一:源码级加固
(简称源到源加固,推荐开发阶段使用)
适用场景:需从源代码层面对应用进行深度保护的场景
·自主研发,具备应用全部源代码
·需要高强度加固,充分保护核心代码安全
·充分保护知识产权,含核心算法、专利代码等模块
技术实现:
·在DevEco Studio中自动混淆ArkTS/TS/C++源码
·输出已加固源码供编译打包
效率与优势:
·插件化自动完成,零代码改造
·与CI/CD流水线无缝集成
·最高保护强度,源代码级深度耦合安全防护因子,抗单点绕过、破解
路径二:二进制级加固
(简称ABC加固,推荐发布阶段使用)
适用场景:可以直接对已编译的应用文件进行加固的场景
·没有应用源代码(如委托第三方开发、研发与加固实施环境,其他没有源代码的场景)
·希望一键式快速处置,无使用门槛
·不依赖开发人员生产环境和工具
技术实现:
·直接对.abc文件进行字节码加密、
·输出受保护的二进制文件
·支持提交.hap、.app直接进行加固处理
效率与优势:
·一键式全自动加固处理,无学习和使用成本
·独立平台快速加固,不占用开发资源
·统一加固策略安全管控、审核
·与CI/CD流水线无缝集成
梆梆安全鸿蒙应用双路径加固方案核心价值在于其精准匹配鸿蒙应用全生命周期的差异化安全需求。企业可根据项目所处阶段、团队分工及具体安全等级要求,灵活选择最适合的路径,形成覆盖鸿蒙应用开发、测试到发布全过程的安全闭环。
展望未来,梆梆安全将持续深耕鸿蒙生态安全领域,不断升级产品核心能力,积极探索更智能、更轻量化的动态防御机制应对日益复杂的应用威胁,致力于为行业客户构建覆盖应用全生命周期的、前瞻性的安全防护体系,为鸿蒙应用的繁荣发展保驾护航。