Aggregator
CVE-2024-37032 Ollama远程代码执行漏洞分析报告
36 minutes 27 seconds ago
该漏洞允许通过路径遍历任意写入或读取文件。具体来说,漏洞存在于Ollama对digest字段验证不正确的问题上,服务器错误地将有效负载解释为合法的文件路径,攻击者可在digest字段中包含路径遍历payload的恶意清单文件,利用该漏洞实现任意文件读取/写入或导致远程代码执行。
Account Takeover Scams Are Bypassing Fraud Defenses
36 minutes 29 seconds ago
FIs Must Invest in AI-Fueled Behavioral Biometrics to Go Beyond Static Credentials
Scammers are increasingly turning to account takeover fraud, as financial institutions ramp up their defenses. Instead of luring victims into making authorized transactions, cybercriminals are bypassing them altogether, hijacking their digital identities and draining accounts from within.
Scammers are increasingly turning to account takeover fraud, as financial institutions ramp up their defenses. Instead of luring victims into making authorized transactions, cybercriminals are bypassing them altogether, hijacking their digital identities and draining accounts from within.
US Senate Democrats Push Noem on Cybersecurity Spending Cuts
36 minutes 29 seconds ago
Homeland Security Secretary Says Trump Budget Strengthens Cybersecurity
Senate Democrats Tuesday pushed Homeland Security Secretary Kristi Noem on the Trump administration's cuts to the cybersecurity component of the U.S. federal department she leads. Noem told senators the U.S. Cybersecurity and Infrastructure Agency will "continue to fulfill" its statutory obligations.
Senate Democrats Tuesday pushed Homeland Security Secretary Kristi Noem on the Trump administration's cuts to the cybersecurity component of the U.S. federal department she leads. Noem told senators the U.S. Cybersecurity and Infrastructure Agency will "continue to fulfill" its statutory obligations.
M&S Reportedly Hacked Using Third-Party Credentials
36 minutes 29 seconds ago
Scattered Spider Stole Tata Consulting Services Employee Login Details for Hack
British retailer Marks & Spencer was reportedly compromised by cybercrime group Scattered Spider using stolen employee credentials from a third-party IT company. Citing an unidentified source, Reuters reported hackers used the M&S login credentials of two Tata Consulting Services employees.
British retailer Marks & Spencer was reportedly compromised by cybercrime group Scattered Spider using stolen employee credentials from a third-party IT company. Citing an unidentified source, Reuters reported hackers used the M&S login credentials of two Tata Consulting Services employees.
Judge Lets Delta Lawsuit Over CrowdStrike Outage Proceed
36 minutes 29 seconds ago
Georgia Court Allows Claims of Fraud, Trespass Over Falcon Software Update
Delta can proceed with its lawsuit against CrowdStrike over a July 2024 update that allegedly bypassed Microsoft safeguards and crashed thousands of systems. The judge found that Delta sufficiently alleged fraud, computer trespass and gross negligence, allowing key claims to move forward.
Delta can proceed with its lawsuit against CrowdStrike over a July 2024 update that allegedly bypassed Microsoft safeguards and crashed thousands of systems. The judge found that Delta sufficiently alleged fraud, computer trespass and gross negligence, allowing key claims to move forward.
一次恶意挖矿样本分析到捕获矿池地址
38 minutes 18 seconds ago
一次恶意挖矿样本分析到捕获矿池地址
VirtualApp 原理速览 - 总结篇
38 minutes 38 seconds ago
从很早以前就一直很好奇 VirtualApp 的相关技术,但是一直抽不出时间。正巧最近想试着自己照猫画虎开发一个类似的容器化应用,并做一些定制化的需求,因此抽空把整个项目过了一遍,也正好帮我整理一遍过去一直对整个 Android 系统较为模糊的认知。
带正常数字签名的后门样本分析
39 minutes 33 seconds ago
越来越多的恶意软件使用正常的数字签名,近日笔者又跟踪到一例使用正常数字签名的后门样本,该攻击样本将相关的函数保存在文件名或INI文件当中,然后读取文件名或INI文件获取到相关函数执行恶意操作。
大模型隐私攻击技术
39 minutes 34 seconds ago
击者可能仅通过模型的API查询接口(即“黑盒”访问),就能推断出某条数据是否被用于训练(成员推断攻击),甚至直接提取训练数据中的具体内容(数据提取攻击)。这些攻击技术的快速发展揭示了一个严峻的事实:大模型的强大功能与其隐私风险之间存在深刻的矛盾
多阶段DarkCloud Stealer分析与溯源反制
39 minutes 35 seconds ago
DarkCloud Stealer是一款由vc6编写信息窃取程序,本文对其一个样本进行分析后发现,攻击者通过多重内存反射加载试图绕过杀软。
Webpack源码泄露漏洞批量探测
41 minutes 56 seconds ago
工具脚本、批量探测
ISCC 练武初赛re+mobile wp
43 minutes 40 seconds ago
mobileISCC mobile 邦布出击安装apk点击右下角的按钮,进入图鉴界面,百度各种邦布的种类,一个一个试,可以得到三段base64加密的文本邦布图鉴 - 绝区零WIKI_BWIKI_哔哩哔哩然后将三段base64拼接起来,循环解码三次base64得到一串明文尝试打开解压得到的db文件,提示非数据库文件,经查询是经过sqlcipher加密,那么此前得到的明文应该就是解密的keyflag是
高版本Fastjson:Getter调用限制及绕过方式探究
45 minutes 49 seconds ago
分析高版本Fastjson组件getter调用过程中的限制成因,以及一步步尝试探索通过动态代理技术代理安全接口,规避Fastjson对危险类的黑名单检查,使反序列化时通过代理接口转发调用到恶意类的getter方法(如TemplatesImpl的getOutputProperties),从而绕过黑名单限制触发漏洞。
先知社区Q&A
51 minutes 52 seconds ago
先知社区Q&A
2025ISCC练武区域赛和决赛pwn以及擂台pwn合集
55 minutes 30 seconds ago
2025ISCCpwn合集
深入理解曼彻斯特编码及其变种
59 minutes 1 second ago
曼彻斯特编码的详细过程,三种编码模式的剖析,编码、解码过程的详细py脚本,在ctf中的应用
- 差分曼彻斯特编码
- IEEE 802.3
- G.E. Thomas
【高级睡眠混淆技术】| Cronos
59 minutes 47 seconds ago
基于EKKO的一种睡眠变种
Windows Shellcode开发(x64 stager)
1 hour 15 minutes ago
本文介绍如何使用MASM汇编语言编写x64 stager
Fuzz挖掘sudo提权漏洞:一次堆溢出如何逆向分析出提权思路
1 hour 15 minutes ago
堆漏洞在二进制中是非常常见的,之前一直觉得CTF-Pwn的堆题没有任何实战价值,之后开始实战漏洞挖掘后发现大部分挖出来的奔溃样本都是堆内存相关的,这就引发了思考,堆内存触发的奔溃大部分都只能触发一次到底该如何利用呢?但是我觉得这个应该是我自己的知识范围不够,之后去分析了很多其他的堆相关漏洞利用,但往往利用思路都不能够通用,所以出了这篇文章记一次sudo堆溢出如何逆向分析出提权思路,旨在以 sudo