• Zero Day Initiative — Finding Deserialization Bugs in the SolarWind Platform:
https://www.zerodayinitiative.com/blog/2023/9/21/finding-deserialization-bugs-in-the-solarwind-platform
・ SolarWind平台中的反序列化远程代码执行漏洞
– SecTodayBot
• PSF-2023-8:
https://osv.dev/vulnerability/PSF-2023-8
・ ssl.SSLSocket 容易绕过 TLS 握手,将发送的未加密数据视为握手后 TLS 加密数据
– SecTodayBot
• Supply Chain Issues in PyPI:
https://seclists.org/oss-sec/2023/q3/203
・ PyPI 中分发恶意包的新方法,以及包管理器和安全扫描工具如何以不同的方式解决依赖关系
– SecTodayBot
• New ways to inject system CA certificates in Android 14:
https://httptoolkit.com/blog/android-14-install-system-ca-certificate/
・ 向 Android 14 中注入系统 CA 证书的新方法
– SecTodayBot
• EDR Unhooking: Patching Falcon hooks without VirtualProtect:
https://inbits-sec.com/posts/in-memory-unhooking/
・ 无需 VirtualProtect,解除 Crowdstrike Falcon 的系统钩子
– SecTodayBot
• Conclusion:
https://8ksec.io/advanced-root-detection-bypass-techniques/
・ 高级 root 检测和绕过技术,以名为 RootDetector 的 root 检测应用程序为示例的分析
– SecTodayBot
• Fuzzing with multiple servers in parallel: AFL++ with Network File Systems:
https://joshua.hu/fuzzing-multiple-servers-parallel-aflplusplus-nfs
・ 在多个服务器上使用高并行度运行 AFL++
– SecTodayBot
• The WebP 0day:
https://blog.isosceles.com/the-webp-0day/
・ WebP 图像库中的堆缓冲区溢出
– SecTodayBot
• Analyzing Agniane Stealer:
https://blog.pulsedive.com/analyzing-agniane-stealer/
・ 分析 Agniane Stealer
– SecTodayBot
* 查看或搜索历史推送内容请访问:
https://sec.today
* 新浪微博账号:腾讯玄武实验室
https://weibo.com/xuanwulab