Joshua J. Drake @jduck
[ Android ] For an unspecified reason, Google switched all the Nexus factory image files to ZIP (instead of TGZ) today. https://t.co/HLnhoN3CiX updated!
?" 不知道什么原因, Google 将出厂时的 Nexus 镜像文件切换至 ZIP 格式,不再采用 TGZ: http://t.cn/Rc7rdYx "
PHR34K @unpacker
[ Android ] How Trojans manipulate Google Play https://t.co/p91Q4JBUfP
?"Android 木马是如何调戏 Google Play 的: http://t.cn/Rc7rdYT"
Nicolas Krassas @Dinosn
[ Attack ] Dropbox Data Breach, more than 68 Million account details leaked online https://t.co/qIZN6goyDK
?"Dropbox 6800 万账户信息泄漏,该事件发生于 2012 年: http://t.cn/Rc7rdT7"
Nicolas Krassas @Dinosn
[ Browser ] Stealing all browser data (passwords,history etc.) from Yandex Browser by exploiting a CSRF in Yandex's sync system https://t.co/DRiD5ZKZzJ
?" Yandex 浏览器的一个 CSRF 漏洞: http://t.cn/Rc7rdTr "
Ars Technica @arstechnica
[ Crypto ] New cloud attack takes full control of virtual machines with little effort https://t.co/bPVZh39Iht by @dangoodin001
?" 针对云的攻击 - 在 RowHammer 的面前,现有的加密软件显得脆弱无力: http://t.cn/Rc7uYJZ "
Samuel @Cyber_IR_UK
[ Detect ] Best paper I've ever read for Intrusion detection with Windows Events! https://t.co/P9beVnc0HU #dfir #ThreatHunting
?" 基于 Windows 事件日志的入侵检测: http://t.cn/Rc7rdHY "
NCC Group @NCCGroupInfosec
[ Fuzzing ] NCC Group Open Source: Hodor Fuzzer - a generic fuzzer design - https://t.co/DPukdKHP0s by Joel St. John, Braden Hollembaek, and Frank Arana
?" Hodor - 通用型 Fuzzer,NCC Group 开源的: http://t.cn/Rc7rdHm"
Nicolas Krassas @Dinosn
[ IoTDevice ] Exploiting PS Vita kernel: sceNetIoctl use-after-free https://t.co/AzEoVfzgI1
?"利用 SceNetPs 模块的一个 UAF 漏洞攻击 PS Vita 内核: http://t.cn/Rchnlr3"
Nicolas Krassas @Dinosn
[ Linux ] So I lost my OpenBSD FDE password - reversing the metadata and building a bruteforcerhttps://t.co/7ZuyqYcn6p
?" 我忘了我的 OpenBSD 全盘加密(FDE)的密码: http://t.cn/Rc7rdQl"
Peter Skomoroch @peteskomoroch
[ MachineLearning ] Baidu releases deep learning framework - nice work @AndrewYNg https://t.co/eqQlNJb9CA
?"百度开源了自己的深度学习平台 PaddlePaddle: https://github.com/baidu/paddle "
newshtwit @newshtwit
[ Operating System ] #Genode 16.08 released https://t.co/Tl2o7k8sh7
?" Genode 操作系统框架发布 16.08 版本: http://t.cn/Rc7rd8m"
Bromium @bromium
[ Others ] Using #Intel #SGX to Protect On-line #Credentials. Read this https://t.co/IpJzgsrIq1https://t.co/3fpB29uXDy
?" 用 Intel SGX 保护在线凭据信息: http://t.cn/Rc7rd8d "
Sebas Guerrero ? @0xroot
[ Others ] Comma Separated Vulnerabilities explanation (With different attack vectors) - https://t.co/Yeai410V7r
?" 逗号分隔的漏洞,公式注入漏洞,来自 Context Blog: http://t.cn/RyiaMCL"
Nathan Granitz @ngranitz08
[ Others ] New #infosec course by the Dr. himself @JaredDeMott "Sec for #hackers & #devs: Code Auditing" @pluralsight https://t.co/Yn05v7t0Qc
?" 面向黑客和开发者的代码审计视频教程: http://t.cn/Rc7rduA"
Frank Denis @jedisct1
[ Others ] Smaller and faster data compression with Zstandard https://t.co/WKXTlXRuWk
?" Facebook 公开的新压缩算法 Zstandard,更快,压缩比更高: http://t.cn/Rc7QxJ7"
PHR34K @unpacker
[ Others ] Code Injection and Its Types- Part 1 https://t.co/7jcznrBPmG
?"代码注入及其类型 Part 1,来自 InfoSec Blog: http://t.cn/Rc7rdum"
Jon Oberheide @jonoberheide
[ Others ] Fake ransomware spreading via Redis compromise: https://t.co/vk0p0ZvFLw
?" Redis 服务器设计是运行在可信环境的,Duo 团队发现,超过 18000 台 Redis 服务器暴露在互联网。勒索软件早就盯上了? http://t.cn/Rc7rdus"
Nicolas Krassas @Dinosn
[ Protocol ] Attacking SS7: Mobile Operators Security Analysis https://t.co/js4zipozm2
?" Attacking SS7,手机运营商安全性分析: http://t.cn/Rc7rd3L"
Artem I. Baranov @artem_i_baranov
[ Tools ] New version of Sysinternals Suite is out https://t.co/Rkeqv2wWXU
?"Sysinternals 工具套件更新新版本: http://t.cn/R2XjyDR"
Sebas Guerrero ? @0xroot
[ Tools ] SQL Map tamper scripts guide - https://t.co/BasouuGQyd
?"SQL Map 篡改脚本指南: http://t.cn/Rc7rd3k"
Bruce Dawson @BruceDawson0xB
[ Windows ] Windows 10 symbols are on symbol server finally. Yay! It turns out the best email address for symbol bugs is on: https://t.co/SIyzjXBxtU
?"Windows 的调试符号下载? http://t.cn/Rc7rd1g 包括 Wind






还没有评论,来说两句吧...