Https、SSL/TLS相关知识及wireShark抓包分析
在HTTP协议中,所有报文的发送、接收都是以明文的形式进行的。也就是说,在TCP/IP五层网络模型中,数据直接以明文的形式从应用层(HTTP)发送给传输层(TCP),之间没有任何加密过程,如下图所示: 这将带来以下三大风险: 1、窃听/嗅探风险 中间人可以截获客户端、服务器之间的通信数据,一览无遗。 2、数据篡改风险 中间人截获数据之后,可以对数据修改之后再发生给对方。 3、身份伪造风险...
View Article没有中间商赚差价的黑客服务平台
当我卧在沙发里正与即将合上的双眼皮做回合制搏斗时,听到了熟悉的“沉稳”脚步,使劲睁眼瞅了下,果然是熟悉的老友,云鼎实验室研究员宋兵和张壮。...
View Article针对Astaroth WMIC木马的技术分析
概述 最近,Cofense网络钓鱼防御中心(PDC)监测到Astaroth木马再次活跃。上周,我们的客户共计有数十台资产感染该木马。根据估算,在短短一周内,有约8000台机器可能遭到入侵。 Astaroth木马因其使用撒旦的变量名称(古代传说中的“大公爵”)而得名,自2017年底以来,一直通过伪造的发票钓鱼邮件感染受害用户,大部分发件人使用的是cam.br域名,以此来模拟合法的发件人。...
View Article什么是DevSecOps?
随着每个人都转向云计算,人们对DevOps进行了大量宣传:如何使流程更快,更轻松,更高效,作为一名开发人员,我喜欢事情变得更容易,作为安全人员,太容易却让我感到害怕,Devops没有强调安全地迁移到云端,这就需要DevSecOps。...
View ArticleThe 42M Record kayo.moe Credential Stuffing Data
This is going to be a brief blog post but it's a necessary one because I can't load the data I'm about to publish into Have I Been Pwned (HIBP) without providing more context than what I can in a...
View ArticleThree Steps For Increasing The Security of Your Web Apps
I recently shared the following QR code with my work's Slack group: Pro tip: never just scan a random QR code without checking it with a service like this first This QR code isn't malicious, it simply...
View ArticleCompanies race to solve bitcoin’s security problem despite slumping prices
Chesnot | Getty Images Digital cryptocurrencies, Bitcoin, Ripple, Ethernum, Dash, Monero and Litecoin. Despite investors getting burned bybitcoin this year, companies are building key guardrails that...
View ArticleTrust at scale: Introducing Platform TLS and Subscriber Provided Prefix
The web is evolving to be more secure by default. Web browsers now highlight insecure websites that use the unencrypted HTTP web protocol, and Google Search down-ranks web properties that aren’t using...
View Article聚焦网络安全新时代 2018云计算安全高峰论坛成功举行
【51CTO.com原创稿件】近几年,伴随云计算的快速发展,现在无论是城市管理还是金融、医疗、教育、工业信息,各行各业都享受到云计算带来得好处。然而,作为一类全新的信息系统,云计算也不可避免的带来一些新的安全问题。从平台自身的稳定性到用户数据的安全性,全行业也在积极摸索试图找出解决问题的途径。...
View ArticleHow IT and Business Leaders Can Communicate to Enhance Security
IT leaders may not be on the same page as non-IT leaders when it comes to cybersecurity. This is according to “ The Cybersecurity Insight Report ” by CDW, which found that 62 percent of those who work...
View ArticleProject Verify is AT&T, Sprint, T-Mobile & Verizon's solution to mob ...
ByStephen Silver Thursday, September 13, 2018, 12:50 pm PT (03:50 pm ET) The four major U.S. wireless carriers in March announced plans for a new authentication platform for the iPhone and other...
View ArticleNew Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Researchers bypass a Trusted Computing Group security measure to manipulate the firmware and steal data in memory. An updated version of the Cold Boot Attack lets threat actors bypass security...
View ArticleAPT10 Targeting Japanese Corporations Using Updated TTPs
Introduction In July 2018, FireEye devices detected and blocked what appears to be APT10 (Menupass) activity targeting the Japanese media sector. APT10 is a Chinese cyber espionage group that FireEye...
View ArticleRemote Code Execution in Alpine Linux
tl;dr I found several bugs in apk , the default package manager for Alpine linux. Alpine is a really lightweight distro that is very commonly used with Docker. The worst of these bugs, the subject of...
View ArticleOilRig APT Continues Its Ongoing Malware Evolution
The Iran-linked APT appears to be in a state of continuous tool development, analogous to the DevOps efforts seen in the legitimate software world. OilRig, an APT group believed to have ties to Iran,...
View ArticleSecurity Awareness Checklist for Local Government
Local government is an umbrella term that covers a variety of entities. These entities include jails, courts, police departments, local Social Security offices, social services, public transportation...
View ArticleHow to Become Your Own Security Champion
In the last year, you may have heard the term “security champion” and wondered if this was a specific job or just another buzzword. In this article, we’ll talk about what a Security Champion is, what...
View ArticleAn Overview of the OWASP Security Champions Playbook
The OWASP Security Champions Playbook is a project that was initiated for the purpose of gearing up the OWASP Open Web Application Security Project ― namely Security Champions 2.0 . This project was...
View ArticleAPT10又曝光了,这次是因为?
2018年8月由 FireEye 侦测到. 曝光原因分析: 1.1客观原因 碰上了FireEye在日本某媒体公司部署的监控设备. 1.2主观原因 1.2.1 意识上 钓鱼邮件制作粗糙,主题多不加修改的摘录热点新闻标题,甚至内文都是不可阅读的乱码字符,让人一眼就能看出来是假的。 攻击者采用的广撒网尼日利亚骗局式的钓鱼手段,在针对高价值目标的攻击中并不奏效。 注: 尼日利亚骗局:...
View Article