http://p3.qhimg.com/t012dfaf746e4fefbe3.jpg

1.Ganeti漏洞允许远程接管虚拟机

https://pierrekim.github.io/blog/2016-01-05-Ganeti-Info-Leak-DoS.html

2.NODE/EXPRESS应用的SSRF利用

http://sethsec.blogspot.tw/2015/12/exploiting-server-side-request-forgery.html

3.32C3 CTF: Ranger writeup

https://kitctf.de/writeups/32c3ctf/ranger/

4.通过Rig EK发布的勒索软件

http://www.cyphort.com/radamant-ransomware-distributed-via-rig-ek/

5.测试dns区域递归漏洞以及避免DNS放大攻击

https://isc.sans.edu/diary/Testing+for+DNS+recursion+and+avoiding+being+part+of+DNS+amplification+attacks/20567

6.android反混淆攻击和技术

http://www.slideshare.net/tekproxy/tetcon-2016

7.通过机器学习做恶意软件分析第一部分和第二部分

http://blog.deepviz.com/2016/01/04/the-basics-of-clustering-behind-deepviz-part-2/

http://blog.deepviz.com/2015/12/23/the-basics-of-clustering-behind-deepviz-part-1/

8.缓解微软edge库注入预览

http://www.sekoia.fr/blog/microsoft-edge-binary-injection-mitigation-overview/

9.CryptoJoker恶意勒索软件一点都不搞笑

http://www.bleepingcomputer.com/news/security/the-cryptojoker-ransomware-is-nothing-to-laugh-about/

文章原文链接:https://www.anquanke.com/post/id/83234