每日安全动态推送(4-28)
2024-4-28 15:47:41 Author: mp.weixin.qq.com(查看原文) 阅读量:4 收藏

Tencent Security Xuanwu Lab Daily News

• Exploiting the NT Kernel in 24H2: New Bugs in Old Code & Side Channels Against KASLR:
https://exploits.forsale/24h2-nt-exploit/

   ・ 24H2版本的Windows 11中发现了多个NT内核漏洞,文章详细分析了两个漏洞的根本原因,并提供了一个漏洞的Proof-of-Concept。 – SecTodayBot

• oss-security - Update on the distro-backdoor-scanner effort:
https://www.openwall.com/lists/oss-security/2024/04/26/1

   ・ 介绍了对Linux发行版构建流水线中潜在后门的调查工作,并介绍了用于扫描和分析潜在后门的工具和方法。 – SecTodayBot

• CyberInsecurity: The Cost of Monopoly:
https://www.schneier.com/essays/archives/2003/09/cyberinsecurity_the.html

   ・ 微软产品的主导地位对安全性构成了风险,这篇文章详细分析了微软软件设计的复杂性对安全漏洞的根本原因产生了影响,强调了这种单一主导操作系统的危险性,对整个社会造成了巨大的影响。 – SecTodayBot

• Coverage Guided Fuzzing – Extending Instrumentation to Hunt Down Bugs Faster!:
https://blog.includesecurity.com/2024/04/coverage-guided-fuzzing-extending-instrumentation/

   ・ 介绍了模糊测试在安全评估和渗透测试中的应用,以及覆盖引导模糊测试及其在识别软件漏洞中的应用。文章讨论了对JerryScript的Fuzzilli补丁的修改,以演示如何扩展Fuzzilli的工具来识别漏洞。 – SecTodayBot

• Loading DLLs Reflections:
https://trustedsec.com/blog/loading-dlls-reflections?utm_content=290826020&utm_medium=social&utm_source=twitter&hss_channel=tw-403811306

   ・ 介绍了一种常见的恶意软件技术——反射式加载DLL,并详细阐述了其技术细节 – SecTodayBot

• LightSpy Malware Variant Targeting macOS:
https://www.huntress.com/blog/lightspy-malware-variant-targeting-macos

   ・ 有关LightSpy移动间谍软件框架的新变种 – SecTodayBot

• Windows Kernel EoP Vulnerability (CVE-2024-21345) Gets PoC Exploit Code:
https://securityonline.info/windows-kernel-eop-vulnerability-cve-2024-21345-gets-poc-exploit-code/

   ・ 介绍了CVE-2024-21345的Windows内核提权漏洞及其利用代码的披露。漏洞利用了Windows内核的内存处理操作中的双重获取问题,允许攻击者提升特权至SYSTEM级,并对受影响系统获得完全控制。 – SecTodayBot

* 查看或搜索历史推送内容请访问:
https://sec.today

* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab


文章来源: https://mp.weixin.qq.com/s?__biz=MzA5NDYyNDI0MA==&mid=2651959620&idx=1&sn=1573d203ebf04f7eaf79362e4a7bbc9c&chksm=8baed1dbbcd958cd21dca7a45e60251e5c24a4544761e4f3989f78715cf437713fadadcd7029&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh