Aggregator
PCI Express 7 即将完成,但 PCI Express 6 尚无普及
《网络安全等级保护测评报告模版》2025版与2021版的对比分析
Kali Linux 2025.1a drops with theme refresh, Kali NetHunter updates
Kali Linux 2025.1a is now available. This release enhances existing features with improvements designed to streamline your experience. 2025 theme refresh Kali Linux 2025.1a introduces an annual theme refresh, maintaining a modern interface. This year’s update debuts a redesigned theme aimed at enhancing the user experience from startup. Users can expect notable visual updates, including an improved boot menu, a refined login screen, and a selection of new desktop wallpapers for both Kali and Kali … More →
The post Kali Linux 2025.1a drops with theme refresh, Kali NetHunter updates appeared first on Help Net Security.
ChatGPT 漏洞被大规模利用:超 1 万个 IP 攻击美国政府机构
CISA Warns of NAKIVO Backup Flaw Exploited in Attacks with PoC Released
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a serious vulnerability in the NAKIVO Backup and Replication software, known as CVE-2024-48248. This vulnerability allows attackers to exploit an absolute path traversal flaw, enabling them to read arbitrary files without authentication. The vulnerability resides in the Director Web Interface of the […]
The post CISA Warns of NAKIVO Backup Flaw Exploited in Attacks with PoC Released appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
欧盟要求苹果开放生态系统否则将面临罚款
Cisco智能许可工具漏洞遭攻击者利用,内置后门账户曝光
用SQL注入穿IE沙箱
每一个安全初学者都喜欢问这样一个问题,“我应该做web安全还是做二进制安全,哪个更有意思?哪个更有钱途?”
二进制安全就只等于反汇编,逆向,调试,内核 ……?
Web安全就只等于XSS,SQL注入,CSRF,webshell ……?
当两者结合起来的时候会发生什么美妙的事情呢?
一个典型的Web系统运行于Linux平台,使用Apache作为服务器,用PHP完成功能逻辑,重要数据存储在MySQL数据中,接收用户输入并返回信息。对于客户端软件来说其实也存在类似的架构,软件运行在Windows系统上,用C/C++完成功能逻辑,可能用SQLite存储重要数据,支持进程间通信。
那么在二进制漏洞挖掘中是否可用使用Web漏洞挖掘的思路呢?
笔者在研究某客户端软件时发现了一个非常有意思的逻辑安全漏洞。本文笔者将展示如何使用客户端软件中存在的SQL注入漏洞,实现本地权限提升,使用漏洞可以绕过IE沙箱等的限制,在高权限进程的上下文中执行任意代码。
UK NCSC Sets 2035 Deadline for Post-Quantum Migration
The British cybersecurity agency urged critical infrastructure operators to adapt to post-quantum cryptography by 2035 as it and other government agencies prepare for the inevitability of quantum computers capable of breaking current encryption algorithms.
公私合作:网络安全行业增长与成熟的催化剂
安卓设备被Root后遭遇攻击的风险激增3000倍,iPhone亦不安全
Цифровые наёмники с ИИ: государства привлекают хакеров для политических атак
Why No-Reply Emails Are a Cybersecurity Hazard
No-reply emails may seem convenient, but they pose serious cybersecurity risks. Learn how they enable phishing, spoofing, and financial fraud—and how to protect your business.
The post Why No-Reply Emails Are a Cybersecurity Hazard appeared first on Security Boulevard.