每日安全动态推送(1-25)
2024-1-25 15:47:26 Author: mp.weixin.qq.com(查看原文) 阅读量:5 收藏

Tencent Security Xuanwu Lab Daily News

• oss-security - darkhttpd: timing attack and local leak of HTTP basic auth credentials:
https://www.openwall.com/lists/oss-security/2024/01/23/2

   ・ 关于darkhttpd项目中发现的HTTP基本认证问题,以及对其代码基础中发现的漏洞及潜在安全影响的详细分析。 – SecTodayBot

• Unpacking Kasseika: The Latest Ransomware to Exploit BYOVD Tactics:
https://securityonline.info/unpacking-kasseika-the-latest-ransomware-to-exploit-byovd-tactics/

   ・ 深度分析了Kasseika勒索软件的攻击手法,揭示了其利用Martini driver漏洞的恶意行为 – SecTodayBot

• SEC blames SIM swap hack for Twitter account hijack:
https://packetstormsecurity.com/news/view/35428

   ・ 美国证券交易委员会的Twitter账号被SIM卡交换黑客攻击的事件。 – SecTodayBot

• CVE-2024-0204: Fortra GoAnywhere MFT Authentication Bypass Deep-Dive:
https://www.horizon3.ai/cve-2024-0204-fortra-goanywhere-mft-authentication-bypass-deep-dive/

   ・ 披露了针对GoAnywhere MFT产品的认证绕过漏洞,包括漏洞的原因和利用方法 – SecTodayBot

• Improving LLM Security Against Prompt Injection: AppSec Guidance For Pentesters and Developers:
https://blog.includesecurity.com/2024/01/improving-llm-security-against-prompt-injection-appsec-guidance-for-pentesters-and-developers/

   ・ 介绍了Prompt Injection的问题以及如何最小化相关风险,主要讨论了使用角色API和安全系统提示设计指南来保护。 – SecTodayBot

• WhatsApp Privacy Flaw Devices Information to Any Other User:
https://cybersecuritynews.com/whatsapp-privacy-flaw/

   ・ WhatsApp存在隐私漏洞,可能导致用户数据泄露和安全受损。 – SecTodayBot

• Resources:
https://github.com/Meowmycks/etwunhook

   ・ 介绍了一种简单的 ETW unhook PoC,通过覆写 NtTraceEvent 操作码来禁用 Nt 函数级别的 ETW – SecTodayBot

• Malicious Life Podcast: The Mariposa Botnet:
https://www.cybereason.com/blog/malicious-life-podcast-the-mariposa-botnet

   ・ 讲述了一位网络安全研究人员与僵尸网络操作者的相遇以及僵尸网络运营的历史。 – SecTodayBot

* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


文章来源: https://mp.weixin.qq.com/s?__biz=MzA5NDYyNDI0MA==&mid=2651959515&idx=1&sn=8f2bb55f00d741549aa59933df227e02&chksm=8baed044bcd95952060751a8075ddd61f614ccd578b4fe957a2dc7eeff3d20bcba9e3005660c&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh