Background on January 14, 2020, Microsoft officially announced that Windows 7 system will stop updating. On January 15, 2020, the second day after Windows 7 officially stopped serving the critical time node, 360 security brain caught the first composite attack using two 0day vulnerabilities of IE browser and Firefox at the same time in the world. Because it is the first capture in the world, we named it "double star" 0day vulnerability attack. The details of the "double star" 0day vulnerability have been reported to Microsoft and Mozilla respectively for the first time. After a short communication, Microsoft and
Read the full text »
Zhiniang Peng of Qihoo 360 Core SecurityHere I am publishing my talk in PacSec2019 with slides and Speech. It’s a survey of security risks in zero-knowledge proof cryptocurrency. I also propose some ...
Read the full text »
1、 Background: manlinghua (apt-c-08) apt organization is an apt organization that has been attacking China, Pakistan and other countries for a long time. It mainly attacks relevant units of government, power and military industries, mainly stealing sensitive information, with a strong political background. It is one of the active overseas apt organizations that attack domestic targets. The organization was first disclosed by foreign security companies in 2016 and named "bitter". In the same year, 360 also issued an analysis report, naming the organization "manlinghua". So far, several domestic and foreign security teams hold
Read the full text »
Background hacking team is one of the few companies selling commercial cyber weapons around the world. On July 5, 2015, hacking team encountered a large-scale data attack and leakage event. The company's engineering vulnerabilities and backdoor product code were almost all disclosed. The disclosure of the incident includes the open 0day vulnerability of flash, Windows font, ie, chrome, word, PPT, Excel and Android, covering most desktop computers and more than half of smartphones. Leaked cyber weapons
Read the full text »
Chapter I Backgrounds1. Syrian RegimeSyria , officially the Syrian Arab Republic, is a country in Western Asia, bordering the Mediterranean Sea to the west, Turkey to the north, Iraq to the east, ...
Read the full text »
Chapter I background I The Syrian regime introduces the Syrian Arab Republic, commonly known as Syria, which is located in the west of Asia, on the East Bank of the Mediterranean Sea, bordering Turkey in the north, Iraq in the East, Jordan in the south, Lebanon and Palestine in the southwest, Cyprus in the west across the sea, including the Golan Heights, with a total national area of 185180 square kilometers. Syria is one of the oldest civilizations in the world. It has been ruled by Roman Empire, Arab Empire and Ottoman Empire. Before becoming the territory of Roman Empire, he had experienced Phoenicia, hetti, Mitanni, and Asia
Read the full text »
Yuki Chen of Qihoo 360 Vulcan TeamAs a script engine enthusiast, recently I did some research on all the major script engines on Windows system (VBScript, JScript, JScript9 and ChakraCore) and discove...
Read the full text »
at the end of April this year, 360 security brain monitored that hackers attacked the server through various web component vulnerabilities, mainly Weblogic vulnerabilities, and planted sodinokibi blackmail virus (small blue screen blackmail virus). In the next few days, hackers began to use more ways to spread the sodinokibi blackmail virus and expand the scope of transmission. The virus also uses the cve-2018-8453 windows kernel to improve the power of the virus. According to 360 security brain monitoring, the virus has been attacking continuously in the near future. Administrators and enterprise users should take precautions.
Read the full text »
The first chapter discovers the application of "face changing". Recently, 360 Fenghuo laboratory received a feedback: user description downloaded a notepad application from an application market. After a period of use, it was found that the content of the application became related to loans. Figure 1-1 software content in the first use Figure 1-2 software content after a period of time is followed up quickly according to the user feedback. It is found that the application has the function of random transformation interface, and the transformed application function has nothing to do with the original application, so this application is called "face changing" application. 2、 Apply classification
Read the full text »
Author: Zhiniang Peng from Qihoo 360Fully homomorphic encryption is a promising crypto primitive to encrypt your data while allowing others to compute on the encrypted data. But there are many well-kn...
Read the full text »