1、Avast研究人员黑Vizio智能电视获取家庭网络的访问权限
https://blog.avast.com/2015/11/11/the-anatomy-of-an-iot-hack/
2、Opera提供的VPN仅仅是HTTP/HTTPS代理,任何人都能使用
https://gist.github.com/spaze/558b7c4cd81afa7c857381254ae7bd10
3、chrome和firefox中的CSP绕过
http://www.slideshare.net/x00mario/jsmvcomfg-to-sternly-look-at-javascript-mvc-and-templating-frameworks/17-And_even_morescript_srcjquery171minjsscriptscript_srckendoallminjsscriptdiv
4、IOS/OSX 的 ImageIO空指针参考导致的拒绝服务攻击
https://www.landaire.net/blog/apple-imageio-denial-of-service/
5、反向工程PETYA恶意欺诈勒索软件
http://0xec.blogspot.tw/2016/04/reversing-petya-ransomware-with.html
6、超过10万的韩国用户受blackmoon木马影响
http://blog.fortinet.com/post/over-100-000-south-korean-users-affected-by-blackmoon-campaign
7、在渗透测试时自动自定义密码字典(Basic-Expression-Lexicon-Variation-Algorithms-BELVA工具介绍)
https://www.helpnetsecurity.com/2016/04/21/automate-password-dictionary/
8、PlaidCTF 2016 – sexec (Crypto 300)
http://mslc.ctf.su/wp/plaidctf-2016-sexec-crypto-300/
9、关于PCI DSS 3.2你需要知道的
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/april/pci-dss-32-what-you-need-to-know/
10、oclhashcat现在开始支持OSX
https://hashcat.net/oclhashcat/
11、介绍IOS加密如何工作以及潜在的攻击点
http://www.darthnull.org/media/presentations/2016-BSidesROC-iOSCrypto.pdf
12、intel威胁资源列表
http://www.cyintanalysis.com/resources/
13、通过TLS证书捕捉威胁行为
http://mpars0ns.github.io/bsidescharm-2016slides/
14、分析真实WORDPRESS黑客尝试
http://www.networkworld.com/article/3060774/security/analyzing-real-wordpress-hacking-attempts.html
15、一个起教育目的有漏洞的LINUX socket游戏
https://github.com/vix597/vulny?platform=hootsuite
16、一个SHELL脚本用来暴力破解android锁屏(USB DEBUGGING开启的时候)
https://github.com/Gh005t/Android-BruteForce?platform=hootsuite
17、WINDOWS子系统LINUX预览
https://blogs.msdn.microsoft.com/wsl/2016/04/22/windows-subsystem-for-linux-overview/
18、使用splunk分析终端日志检测恶意行为
http://securitylogsanalysis.blogspot.tw/2016/04/analysis-of-endpoint-logs-with-splunk.html
19、关于SS7已知和未知的安全问题
https://www.ernw.de/download/TSD2016_Known_Unknowns_of_SS7.pdf
20、LOCKY恶意欺诈软件开始使用新的下载者
https://www.fireeye.com/blog/threat-research/2016/04/new_downloader_forl.html
21、在嵌入式系统中应用Bytecode级的自动EXPLOIT生成
http://www.cosc.canterbury.ac.nz/research/reports/HonsReps/2015/hons_1504.pdf
22、panda(动态分析框架)入门教程
https://github.com/moyix/panda
23、构建HOME LAB,变成恶意软件猎人
https://www.alienvault.com/blogs/security-essentials/building-a-home-lab-to-become-a-malware-hunter-a-beginners-guide
24、新的PI变种木马瞄准香港民运人士
http://researchcenter.paloaltonetworks.com/2016/04/unit42-new-poison-ivy-rat-variant-targets-hong-kong-pro-democracy-activists/
25、ELF共享库注入取证
http://backtrace.io/blog/blog/2016/04/22/elf-shared-library-injection-forensics/