http://p8.qhimg.com/t0105eadd526b531a1d.png


热点概要:Google Chrome 53.0.2785.143 修复远程代码执行漏洞、方程组的防火墙利用链、解释Jquery安全模型、鲜为人知的后缀名欺诈技巧

国内热词:


微信试图通过小程序增强用户粘性

微软重组,陆奇离职

高通300亿美元洽购NXP

资讯类:


黑客利用照片中的手势照片欺骗德国部长的指纹

https://www.theguardian.com/technology/2014/dec/30/hacker-fakes-german-ministers-fingerprints-using-photos-of-her-hands

Google Chrome 53.0.2785.143 修复远程代码执行漏洞

http://www.bleepingcomputer.com/news/google/google-chrome-53-0-2785-143-m-fixes-remote-code-execution-vulnerabilities/

技术类:


The Equation Group's Firewall Exploit Chain (方程组的防火墙利用链)

https://www.ixiacom.com/company/blog/equation-groups-firewall-exploit-chain

解释Jquery安全模型

https://www.virtuesecurity.com/blog/jquery-security-model/

鲜为人知的后缀名欺诈技巧

https://blog.malwarebytes.com/cybercrime/2016/09/lesser-known-tricks-of-spoofing-extensions/

VMWare工作站在处理JPG2000图像时导致的vprintproxy.exe多个内存损坏漏洞

https://bugs.chromium.org/p/project-zero/issues/detail?id=850

Windows: RegLoadAppKey Hive 列举导致的本地提权漏洞

https://bugs.chromium.org/p/project-zero/issues/detail?id=870

Microsoft Office PowerPoint 2010 无效指针引用漏洞

https://bugs.chromium.org/p/project-zero/issues/detail?id=866

分析最近的一次垃圾邮件中的恶意软件附件的恶意行为

https://isc.sans.edu/forums/diary/Another+Day+Another+Malicious+Behaviour/21539

DAWNSCANNER:Ruby代码审计工具

https://dawnscanner.org/

记录DerbyCon安全会议上有趣的议题

https://labs.mwrinfosecurity.com/blog/popping-my-dos-cherry-at-derbycon

文章原文链接:https://www.anquanke.com/post/id/84664