Threat Hunting with VirusTotal

We recently conducted our first “Hunting with VirusTotal” open training session, providing some ideas on how to use VT Intelligence to hunt for in-...

NFC RELAY ATTACK ON TESLA MODEL Y

Josep Pi Rodriguez, Principal Security Consultant, walks you through the proof-of-concept and technical details of exploitation for IOActive’s rece...

半导体封装趋势

虽然2021年的半导体行业深受供应链问题的困扰,包括严重短缺等,但半导体厂商及其外包半导体封装与测试供应商(OSAT)继续在多个领域取得技术进步。这些技术改...

S7 PLCs漏洞分析

近期关注了文章“Vulnerability analysis of S7 PLCs:Manipulating the security mechanism”,文章对Siemens PLC环境(特别是S7CommPlus通信协议)进行了深入...

Write up DiceCTF 2022: Flare and stumbling upon a Traefik 0-day (CVE-2022-23632)

A while back, I participated in DiceCTF. During the contest I was the first person to solve the problem 'Flare': This was pretty exciting. Normall...

HITCON CTF 2022 — Fourchain – Hypervisor

Intro Fourchain - Hypervisor is a pwnable challenge created by Billy ( @st424204 ) for HITCON CTF 2022. It serves as the 4th stage of the Fourchain...

G.O.S.S.I.P 阅读推荐 2022-11-29 NAS Privacy

大家好,今天给大家推荐的是一篇来自CISPA Helmholtz Center for Information Security张阳研究组,NetApp和清华大学网络与信息安全实验室互联网和云安全研究...

第33篇:DNS劫持攻击原理讲解及溯源分析的常规步骤

 Part1 前言 在世界杯举办期间,DNS劫持事件估计会和链路劫持事件一样,风险提升很多。上期分享了一篇《第32篇:某运营商链路劫持(被挂博彩页)溯源...

看雪2022 KCTF 秋季赛 | 第六题设计思路及解析

看雪 2022 KCTF秋季赛 已于11月15日中午12点正式开始!比赛延续上一届的模式并进行优化,对每道题设置了难度值、火力值、精致度等多类积分,用规则引导...

APT-C-55(Kimsuky)组织以IBM公司安全产品为诱饵的攻击活动分析

APT-C-55  KimsukyBabyShark是基于 Microsoft Visual Basic (VB) 脚本的恶意软件系列,用于收集敏感信息。该组件最早发现于2019年,用于针对美国国家安...
1 628 629 630 631 632 1,106