1¡¢IBMºÍPonemon InstituteÍŽáÐû²¼2019ÄêÊý¾Ýй¶±¾Ç®µ÷Ñб¨¸æ
ƾ֤IBMºÍPonemon InstituteÍŽáÐû²¼µÄ2019Äê¶ÈÊý¾Ýй¶±¾Ç®µ÷Ñб¨¸æ£¬2019ÄêÊý¾Ýй¶µÄÈ«Çòƽ¾ù±¾Ç®Îª392ÍòÃÀÔª£¬±È2018ÄêÔöÌíÁË1.5£¥¡£2014ÄêµÄÊý×ÖÊÇ350ÍòÃÀÔª£¬2014ÖÁ2019Äêʱ´ú¹²ÔöÌíÁË12%¡£ÕâÒ»Êý×Ö×î¸ßµÄ¹ú¼ÒÊÇÃÀ¹ú£¬´ï819ÍòÃÀÔª£¬ÊÇÈ«Çòƽ¾ùˮƽµÄÁ½±¶¶à¡£Êý¾Ýй¶±¾Ç®×î¸ßµÄÐÐÒµÊÇÒ½ÁƱ£½¡£¬¸ÃÐÐÒµ2019ÄêµÄƽ¾ùÊý×ÖÊÇ645ÍòÃÀÔª¡£¸Ã±¨¸æº¸ÇÁË2018Äê7ÔÂÖÁ2019Äê4ÔÂʱ´ú16¸ö¹ú¼ÒºÍµØÇøÄÚµÄ17¸öÐÐÒµµÄ507ÆðÊý¾Ýй¶ÊÂÎñ¡£
ÔÎÄÁ´½Ó£ºhttps://securityintelligence.com/posts/whats-new-in-the-2019-cost-of-a-data-breach-report/
2¡¢ÐÂP2PÈ䳿²¡¶¾Crypto-MinersÔÚÒ°ÍâÆð¾¢Èö²¥
Yoroi-Cybaze Z-LabÑо¿Ö°Ô±·¢Ã÷Ò»ÖÖÔÚÒ°ÍâÈö²¥Crypto-MinersµÄP2PÈ䳿²¡¶¾¡£¸Ã¶ñÒâÈí¼þαװ³ÉÖøÃû¸èÊֵijªÆ¬ºÏ¼¯£¬Ê¹ÓÃP2P¹²ÏíÍøÂç¾ÙÐÐÈö²¥¡£´ÓBitTorrentÍøÂçÏÂÔØµÄÎļþÊÇÒ»¸ö°üÀ¨ÆäËü¼¸¸öÎļþµÄSFXÎĵµ£¬ÕâÖÖÎĵµÔÊÐí¹¥»÷ÕßÒþ²Ø¶ñÒâµÄPEÄÚÈݲ¢ÏÔÖø½µµÍɱ¶¾ÒýÇæµÄ¼ì²âÂÊ¡£×îÖÕµÄpayloadÊÇÒ»¸öÍÚ¿óÈí¼þ£¬µ«¹¥»÷ÕßÒ²¿ÉÄܻὫÆäÌæ»»ÎªRAT»òÀÕË÷²¡¶¾¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/88795/malware/p2p-worm-spreading-crypto-miners.html
3¡¢ºÚ¿ÍʹÓýüÆÚWordPress²å¼þÖеÄXSSÎó²îÈö²¥¶ñÒâ¹ã¸æ
WordfenceÑо¿ÍŶӷ¢Ã÷Ò»¸öÕýÔÚ¾ÙÐеĶñÒâ¹ã¸æÔ˶¯£¬¹¥»÷ÕßʹÓÃWordPress²å¼þComing Soon Page&Maintenance ModeÖеÄXSSÎó²î£¬ÏòÓû§ÍÆËͶñÒâ¹ã¸æ¡£ÕâЩ¶ñÒâ¹ã¸æ½«Óû§Öض¨ÏòÖÁÊÖÒÕÖ§³ÖÕ©Æ¡¢¶ñÒâAPKÏÂÔØºÍÒ©Æ·¹ã¸æµÈ¶ñÒâÍøÕ¾¡£¸Ã²å¼þÖеÄÎó²îÊÇÒ»¸ö´æ´¢ÐÍXSSÎó²î£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß×¢Èë¶ñÒâJavaScript»òHTML´úÂë¡£¸Ã²å¼þµÄ1.7.8¼°¸üµÍ°æ±¾Êܵ½Ó°Ï죬²å¼þµÄ×îа汾ÒÑÐÞ¸´ÁËÕâ¸öÎó²î¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/hackers-exploit-recent-wordpress-plugin-bugs-for-malvertising/
4¡¢Ñо¿ÍŶÓÅû¶Comodo AntivirusÖеĶà¸öÇå¾²Îó²î
TenableÅû¶Comodo Antivirus/Comodo Antivirus AdvancedÖеĶà¸öÇå¾²Îó²î£¬°üÀ¨ÍâµØÌáȨÎó²î£¨CVE-2019-3969£©¡¢í§ÒâÎļþдÈëÎó²î£¨CVE-2019-3970£©¡¢¾Ü¾ø·þÎñÎó²î£¨CVE-2019-3971£©¡¢Ô½½ç¶ÁÎó²î£¨CVE-2019-3972£©ÒÔ¼°Ô½½çдÎó²î£¨CVE-2019-3973£©¡£ÕâЩÎó²îÓ°ÏìÁËComodo Antivirus°æ±¾12.0.0.6810£¬µ«CVE-2019-3973Ö»Ó°ÏìÁË11.0.0.6582¼°Ö®Ç°µÄ°æ±¾¡£Ñо¿Ö°Ô±ÔÚgithubÉÏÐû²¼ÁËÏà¹ØPoC¡£
ÔÎÄÁ´½Ó£ºhttps://www.tenable.com/security/research/tra-2019-34
5¡¢ÃÀ¹ú¹ú¼ÒÇå¾²¾ÖÍýÏ뽨ÉèÐÂÍøÂçÇå¾²ÀíÊ»á
7ÔÂ23ÈÕÃÀ¹ú¹ú¼ÒÇå¾²¾Ö£¨NSA£©Ðû²¼ÍýÏ뽨ÉèÒ»¸öеÄÍøÂçÇå¾²·ÀÓù²¿·Ö£¬¸Ã²¿·Ö½«×¨×¢ÓÚ±£»¤ÃÀ¹úÃâÊÜÍâ¹úµÄÍøÂçÍþв¡£Ð²¿·Ö±»ÃüÃûÎªÍøÂçÇå¾²ÀíÊ»ᣨCybersecurity Directorate£©£¬½«ÓÚ10ÔÂ1ÈÕ×îÏÈÔËÓª¡£Æ¾Ö¤NSAµÄ˵·¨£¬ÍøÂçÇå¾²ÀíÊ»áµÄ½ÇÉ«½«ÊǸÄÉÆÃÀ¹úÔÚº£ÄÚµÄÍøÂçÇå¾²Ì¬ÊÆ£¬ËüµÄÒ»ÏîÖ÷ÒªÊÂÇ齫ÊÇÇ鱨¹²ÏíºÍÎó²îÆÀ¹À¡£Anne Neuberger½«³ÉΪ¸Ã²¿·ÖµÄµÚÒ»Î»ÍøÂçÇå¾²×ܼࡣËý½«Ö±½ÓÏòNSA¾Ö³¤Paul Nakasone½«¾ü»ã±¨ÊÂÇé¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/nsa-to-establish-a-defense-minded-division-named-the-cybersecurity-directorate/
6¡¢Ç°Î÷ÃÅ×ÓÌõÔ¼¹¤ÈÏ¿ÉÔÚ¹«Ë¾µç×Ó±í¸ñÖÐÖ²ÈëÂß¼Õ¨µ¯
ǰÎ÷ÃÅ×ÓÌõÔ¼¹¤David TinleyÈÏ¿ÉÔÚΪ¹«Ë¾½¨ÉèµÄµç×Ó±í¸ñÖÐÖ²ÈëÂß¼Õ¨µ¯£¬Ëû½«ÃæÁÙ×î¸ß10ÄêµÄî¿ÏµÒÔ¼°25ÍòÃÀÔªµÄ·£¿î¡£Æ¾Ö¤Ïà¹Ø·¨Í¥Îļþ£¬TinleyΪÎ÷ÃÅ×ÓµÄMonroeville PA·þÎñ´¦ÌṩÁ˽üÊ®ÄêµÄÈí¼þ·þÎñ£¬ËûÔÚ¸ø¹«Ë¾½¨ÉèÓÃÓÚÖÎÀí×°±¸¶©µ¥µÄµç×Ó±í¸ñʱֲÈëÁËÂß¼Õ¨µ¯£¬ÕâЩըµ¯»áÔÚÌØ¶¨ÈÕÆÚ´¥·¢£¬µ¼ÖÂÎļþÍ߽⡣ÿ´ÎÍß½âʱTinley¶¼»áÊÕÈ¡ÓöÈÀ´ÐÞ¸´¸ÃÎļþ£¬Ö±µ½Á½ÄêºóÎ÷ÃÅ×Ó·¢Ã÷ÁËÂß¼Õ¨µ¯²¢Ìá³öÁËÖ¸¿Ø¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/siemens-contractor-pleads-guilty-to-planting-logic-bomb-in-company-spreadsheets/