每日安全动态推送(03-10)

  • A+
所属分类:安全新闻
Tencent Security Xuanwu Lab Daily News


• Newest Intel Side-Channel Attack Sniffs Out Sensitive Data:
https://threatpost.com/intel-side-channel-attack-data/164582/

   ・ 研究人员发现Intel处理器受到新的旁道攻击,对数据存在安全威胁。 – lanying37


• 2137 - Windows: Out-of-bounds write in WindowsCodecsRaw!COlympusE300LoadRaw - project-zero:
https://bugs.chromium.org/p/project-zero/issues/detail?id=2137

   ・ Windows Imaging 组件处理 .raw 图像格式的越界写漏洞 – Jett


• [Windows] 2. 受影响系统及应用版本:
https://bbs.pediy.com/thread-266362.htm

   ・ CVE-2021-1732 Microsoft Windows10 本地提权漏研究及Poc/Exploit开发 – Jett


• Windows & Active Directory Exploitation Cheat Sheet and Command Reference:
https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/

   ・ Windows & Active Directory 环境漏洞利用手册 – Jett


• Google Online Security Blog: Introducing sigstore: Easy Code Signing & Verification for Supply Chain Integrity:
http://feedproxy.google.com/~r/GoogleOnlineSecurityBlog/~3/zn3Co-EmVFs/introducing-sigstore-easy-code-signing.html

   ・ Google 公开 Sigstore 项目,推动软件供应链中的文件签名验证问题 – Jett


• Clast82 – A new Dropper on Google Play Dropping the AlienBot Banker and MRAT:
https://research.checkpoint.com/2021/clast82-a-new-dropper-on-google-play-dropping-the-alienbot-banker-and-mrat/

   ・ Clast82 – A new Dropper on Google Play Dropping the AlienBot Banker and MRAT – Jett


• Technical Advisory – Multiple Vulnerabilities in Netgear ProSAFE Plus JGS516PE / GS116Ev2 Switches:
https://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches/

   ・ Netgear ProSafe Plus JGS516PE 交换机多个漏洞分析 – Jett


• 2129 - Windows Containers: Host Registry Virtual Registry Provider Bypass EoP - project-zero:
https://bugs.chromium.org/p/project-zero/issues/detail?id=2129

   ・ Windows Containers: Host Registry Virtual Registry Provider Bypass EoP – Jett


• Phishing Users to Take a Test:
https://www.mdsec.co.uk/2021/03/phishing-users-to-take-a-test/

   ・ Windows 10 系统 “Take a Test” URL Handler 安全性分析 – Jett


• [Tools] ‘BootHole’ — an overview of GNU GRUB Vulnerabilities:
https://medium.com/ssd-secure-disclosure/boothole-a-look-at-gnu-grub-vulnerabilities-d15c66effe60?source=friends_link&sk=849dfc1dab516826c152cb6711192d0c

   ・ “ BootHole”-GNU GRUB安全漏洞概述。 – lanying37


• The Debugging Book:
https://www.debuggingbook.org/

   ・ The Debugging Book - 一本关于调试技术的在线书籍 – Jett


• [IoT] VOOdoo - Remotely Compromising VOO Cable Modems:
https://quentinkaiser.be/security/2021/03/09/voodoo/

   ・ VOOdoo - Remotely Compromising VOO Cable Modems – Jett


• How to rob a (Fire)fox:
https://wojciechregula.blog/post/how-to-rob-a-firefox/

   ・ 恶意软件可以滥用 Firefox 浏览器权限绕过 macOS 隐私保护机制 – Jett


* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


本文始发于微信公众号(腾讯玄武实验室):每日安全动态推送(03-10)

发表评论

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: