每日安全动态推送(2-21)
2024-2-21 15:9:54 Author: mp.weixin.qq.com(查看原文) 阅读量:14 收藏

Tencent Security Xuanwu Lab Daily News

• Stop deploying web application firewalls:
https://www.macchaffee.com/blog/2023/wafs/

   ・ 文章讨论了Web应用防火墙的使用效率问题,提出了替代性技术。  – SecTodayBot

• Hacking Electronic Flight Bags. Airbus NAVBLUE Flysmart+ Manager:
https://www.pentestpartners.com/security-blog/hacking-electronic-flight-bags-airbus-navblue-flysmart-manager/

   ・ 该文章揭示了Flysmart+ Manager应用程序存在的安全漏洞,包括安全机制被故意禁用,可能影响飞机性能数据和机场信息。  – SecTodayBot

• oss-security - Python standard library defaults to insecure TLS for mail protocols:
https://www.openwall.com/lists/oss-security/2024/02/01/4

   ・ Python标准库中存在邮件协议的TLS连接存在安全性问题,文章详细分析了这一默认行为的不安全性和启用证书验证的反直觉特性。建议关注Python标准库中的安全性问题和TLS连接验证。  – SecTodayBot

• Qualys TRU Discovers Important Vulnerabilities in GNU C Library’s syslog():
https://blog.qualys.com/vulnerabilities-threat-research/2024/01/30/qualys-tru-discovers-important-vulnerabilities-in-gnu-c-librarys-syslog

   ・ GNU C Library存在重要漏洞,对Linux环境的基础组件产生严重影响,凸显了即使是最基础和值得信赖的组件也不会免疫缺陷。文章详细分析了漏洞的根本原因 – SecTodayBot

• Resources:
https://github.com/AashiqRamachandran/i-am-a-bot

   ・ 该文章介绍了一种基于Multi-Modal LLM的代理程序,用于自动解决验证码 – SecTodayBot

• Backdoor Activator Malware Running Rife Through Torrents of macOS Apps:
https://s1.ai/Bkdr-Mac

   ・ 该文章重点介绍了最近发现的 macOS 恶意软件 macOS.Bkdr.Activator,它通过多种流行软件的破解版本传播,并且采用了多阶段传送和一系列恶意操作,对用户构成严重威胁。  – SecTodayBot

• WordPress Tackles PHP and RCE Flaws in Security Update:
https://securityonline.info/wordpress-tackles-php-and-rce-flaws-in-security-update/

   ・ WordPress发布了紧急安全更新版本6.4.3,修复了两个重要的安全漏洞,包括插件安装过程中的PHP文件上传漏洞和RCE(远程代码执行)POP链漏洞。  – SecTodayBot

• Opera Browser Zero-Day RCE Vulnerability on Cross-Platforms:
https://www.darkrelay.com/post/opera-zero-day-rce-vulnerability

   ・ Opera浏览器被发现存在零日RCE漏洞,文章详细分析了漏洞根源 – SecTodayBot

• The many ways electric cars are vulnerable to hacks, and whether that matters in a real-world:
https://blog.talosintelligence.com/threat-source-newsletter-feb-1-2024/

   ・ 电动汽车和路由器的新漏洞信息披露,以及来自Pwn2Own黑客大赛的研究成果。  – SecTodayBot

* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


文章来源: https://mp.weixin.qq.com/s?__biz=MzA5NDYyNDI0MA==&mid=2651959529&idx=1&sn=1d7f4b7ff0250654317800916acea3b5&chksm=8baed076bcd95960f804b8c665efdee82b54fdcf02a95c7687d36e5a9059fce84a27a11eba79&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh