Aggregator
蝉鸣半夏,心向网安!2024InForSec夏令营圆满落幕
记一次任意文件读取漏洞的挖掘
Brute Ratel C4 Badger Used to Load Latrodectus
Editor’s note: The current article is authored by Mohamed Talaat, a cybersecurity researcher and malware analyst. You can find Mohamed on X and LinkedIn. Brute Ratel C4 (BRC4) is a customized, commercial command and control (C2) framework that was first introduced in December 2020. Its primary use is for conducting adversarial attack simulation, red-team engagements, […]
The post Brute Ratel C4 Badger Used to Load Latrodectus appeared first on ANY.RUN's Cybersecurity Blog.
How a Trust Center Solves Your Security Questionnaire Problem
How Does 5G Enhance IoT?
ISC Releases Security Advisories for BIND 9
The Internet Systems Consortium (ISC) released security advisories to address vulnerabilities affecting multiple versions of ISC’s Berkeley Internet Name Domain (BIND) 9. A cyber threat actor could exploit one of these vulnerabilities to cause a denial-of-service condition.
CISA encourages users and administrators to review the following advisories and apply the necessary updates:
- CVE-2024-4076: Assertion failure when serving both stale cache data and authoritative zone content
- CVE-2024-1975: SIG(0) can be used to exhaust CPU resources
- CVE-2024-1737: BIND’s database will be slow if a very large number of RRs exist at the same name
- CVE-2024-0760: A flood of DNS messages over TCP may make the server unstable
Telegram App Flaw Exploited to Spread Malware Hidden in Videos
New legislation will help counter the cyber threat to our essential services
数据泄漏论坛发生数据泄漏:20万BreachForums会员曝光
城市供暖系统遭网络攻击被关闭,大量居民在寒冬下停暖近2天
Stargazers Ghost Network
Research by: Antonis Terefos (@Tera0017) Key Points Introduction Threat actors continually evolve their tactics to stay ahead of detection. Traditional methods of malware distribution via emails containing malicious attachments are heavily monitored, and the general public has become more aware of these tactics. Recently, Check Point Research observed threat actors using GitHub to achieve initial […]
The post Stargazers Ghost Network appeared first on Check Point Research.
【0724】重保演习每日情报汇总
近期值得关注的IOC(2024-07-24)
SAP AI Core中严重的 “SAPwned” 缺陷可引发供应链攻击
我们仔细分析了使数百万Windows 蓝屏死机的CrowdStrike代码
逆向恢复 Protobuf 对象结构
【通知】关于中通SRC暂停接收漏洞测试的通知
用zig编写Windows的shellcode
Windows下shellcode的通用流程是
- 通过PEB遍历获取DLL模块的地址
- 搜索DLL模块的导出表获取需要的API
- 通过API实现特定的功能
早期很多教程借助汇编来实现,但现在