ÃÀ¹úCISA¡¢DOEºÍÓ¢¹úµÄNCSCÍŽáÐû²¼¡¶ICSÍøÂçÇå¾²×î¼Ñʵ¼ù¡·£»Ó¡¶È2910ÍòÇóÖ°ÕßÐÅϢй¶£¬ÈªÔ´Î´Öª
Ðû²¼Ê±¼ä 2020-05-251.ÃÀ¹úCISA¡¢DOEºÍÓ¢¹úµÄNCSCÍŽáÐû²¼¡¶ICSÍøÂçÇå¾²×î¼Ñʵ¼ù¡·
ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¡¢ÄÜÔ´²¿£¨DOE£©ºÍÓ¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©ÍŽáÐû²¼ÁË¡¶¹¤Òµ¿ØÖÆÏµÍ³ÍøÂçÇå¾²×î¼Ñʵ¼ù¡·£¬ÕâÊÇÒ»¸ö³¤´ïÁ½Ò³µÄÐÅϢͼ£¬Ö÷ÒªÏÈÈÝÁ˹¤Òµ¿ØÖÆÏµÍ³£¨ICS£©ÍøÂçÇå¾²×î¼Ñʵ¼ùÒªÁì¡£¸ÃÐÅϢͼ×ܽáÁËICS³£¼ûµÄΣº¦Ë¼Á¿ÒòËØ¡¢¶ÌÆÚºÍºã¾ÃµÄÍøÂçÇå¾²ÊÂÎñÓ°Ïì¡¢±£»¤ICSÁ÷³ÌµÄ×î¼Ñ×ö·¨£¬²¢ÖصãÏÈÈÝÁËNCSCÔÚÇå¾²Éè¼ÆÔÔòºÍÔËÓªÊÖÒÕ·½ÃæµÄ²úÆ·¡£
ÔÎÄÁ´½Ó£º
https://www.us-cert.gov/ncas/current-activity/2020/05/22/cisa-doe-and-uks-ncsc-issue-guidance-protecting-industrial-control
2.MicrosoftΪEdgeÐû²¼Çå¾²¸üУ¬ÐÞ¸´ÌØÈ¨ÌáÉýÎó²î
MicrosoftÔÚ5ÔÂ22ÈÕÐû²¼ÁËÒ»¸öÇå¾²¸üУ¬ÒÔ½â¾ö»ùÓÚChromiumµÄEdgeÖеÄÌØÈ¨ÌáÉýÎó²î£¨CVE-2020-1195£©¡£¹¥»÷Õß¿ÉÒÔʹÓôËÎó²îÔÚí§ÒâλÖÃдÈëÎļþ²¢»ñµÃ¸ü¸ßµÄȨÏÞ¡£¸ÃÎó²î×Ô¼º²»ÔÊÐíÖ´ÐÐí§Òâ´úÂ룬¿ÉÊÇ£¬¹¥»÷Õß¿ÉÒÔÍŽáʹÓôËÎó²îÓëÒ»¸ö»ò¶à¸öÆäËûÎó²î£¨ÀýÈ磬Զ³Ì´úÂëÖ´ÐÐÎó²îºÍÁíÒ»ÖÖÌØÈ¨ÌáÉýÎó²î£©£¬ÒÔʹÓøü¸ßȨÏÞÖ´ÐдúÂë¡£´Ë´ÎÇå¾²¸üÐÂͨ¹ýÐÞ¸ÄMicrosoft EdgeµÄ·´ÏìÀ©Õ¹ÑéÖ¤ÎļþÀ´ÐÞ¸´´ËÎó²î¡£
ÔÎÄÁ´½Ó£º
https://www.us-cert.gov/ncas/current-activity/2020/05/22/microsoft-releases-security-update-edge
3.Ó¡¶È½ÌÓýÍøÕ¾EduCBAÔâµ½ºÚ¿Í¹¥»÷£¬Ð¹Â¶Óû§Êý¾Ý
5ÔÂ22ÈÕ£¬Ó¡¶ÈÔÚÏß½ÌÓýÍøÕ¾EduCBAͨ¹ýÓʼþ֪ͨÆä¿Í»§£¬ËûÃÇÔâµ½Á˺ڿÍÈëÇÖ£¬²¢ÇÒÓû§Êý¾Ýй¶¡£ÔÚ¸Ã֪ͨÖУ¬²¢Ã»ÓÐÏêϸ˵Ã÷±»ÇÔÐÅÏ¢£¬Ö»ÊǼòÆÓµØÖ¸³öµç×ÓÓʼþ¡¢Ãû³Æ¡¢ÃÜÂë¡¢Ëù»á¼ûµÄ¿Î³ÌµÈ¿ÉÄÜÒѱ»Ð¹Â¶¡£¸Ã¹«Ë¾ÌåÏÖ£¬ÓÉÓÚËûÃÇʹÓÃÁ˵ÚÈý·½Æ½Ì¨À´´¦Öóͷ£¸¶¿î£¨ÀýÈçPayPalºÍ2Checkout£©£¬Òò´ËûÓÐÈκβÆÎñÐÅϢй¶£¬¶øÏÖÔÚÒ²ÒÑÖØÖÃËùÓÐÓû§µÄÃÜÂë¡£¿ÉÊÇÔÚtwitterµÄ̸ÂÛÖУ¬²¿·ÖÓû§ÌåÏÖÆäÕÊ»§ÃÜÂëÎ´ÖØÖá£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/online-education-site-educba-discloses-data-breach-after-hack/
4.Ó¡¶È2910ÍòÇóÖ°ÕßÐÅϢй¶£¬ÏÖÔÚÉÐÔÚÊÓ²ìй¿à´Ô´
Ñо¿Ö°Ô±ÔÚ°µÍøÉÏ·¢Ã÷ÁËÒ»ÆðÃô¸ÐÊý¾Ýй¶ÊÂÎñ£¬ºÚ¿Íй¶ÁËÔ¼2910ÍòÓ¡¶È¼®ÇóÖ°ÕßµÄСÎÒ˽¼ÒÏêϸÐÅÏ¢¡£´Ë´Îй¶µÄÐÅÏ¢°üÀ¨µç×ÓÓʼþ¡¢µç»°¡¢¼Òͥסַ¡¢×ʸñ¡¢ÊÂÇéÂÄÀúµÈ¡£CybleÔÚÊÓ²ìÕâ¸öÎÊÌâʱ£¬»¹·¢Ã÷ÓкڿÍÔÚÒ»¸ö°µÍøÉÏÐû²¼ÁË2000¶àÕÅÓ¡¶ÈÉí·ÝÖ¤£¨Aadhaar¿¨£©£¬ÕâÆðй¶ÊÂÎñËÆºõ±¬·¢ÔÚ2019Äê¡£ºÚ¿Í¿ÉÒÔʹÓÃÕâÁ½´Î×ß©µÄÊý¾Ý¾ÙÐÐÖÖÖÖ¶ñÒâÔ˶¯£¬°üÀ¨Éí·Ý͵ÇÔ¡¢Õ©ÆºÍÆóÒµÌØ¹¤Ô˶¯¡£ÏÖÔÚ£¬×¨¼ÒÃÇÈÔÔÚÊÓ²ì×ß©µÄȪԴ£¬²¢ÍƲâ¿ÉÄÜÔ´×Ô¼òÀú»ã×Ü·þÎñ¹«Ë¾¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/103694/data-breach/indian-jobseekers-data-leak.html
5.ºÚ¿ÍÕýÔÚ°µÍø³öÊÛ350ÍòÃûZoomcar¿Í»§Êý¾Ý
Ñо¿Ö°Ô±·¢Ã÷£¬×ÔÉÏÖÜËÄ£¬ºÚ¿ÍÔÚ°µÍøÉϳöÊÛÔ¼350ÍòZoomcarÓû§µÄСÎÒ˽¼ÒÊý¾Ý£¬°üÀ¨Ãû³Æ¡¢µç×ÓÓʼþID¡¢ÃÜÂë¡¢ÊÖ»úºÅÂëºÍIPµØµã¡£ºÚ¿Í»¹ÌåÏÖ£¬½«ÒÔ300ÃÀÔªµÄ¼ÛÇ®³öÊÛ¸ü¶àµÄ900ÍòÃûZoomcarÓû§µÄÊý¾Ý¡£¾ÝºÚ¿Í³Æ£¬´Ë´ÎÊÂÎñ±¬·¢ÔÚ2018Äê7Ô£¬ÕýÓÉÓÚºÚ¿ÍÊÇÔÚÒ»Äêºó³öÊÛÊý¾Ý¶ø²»ÊÇÇÔÈ¡ºóÁ¬Ã¦³öÊÛ£¬Ê¹µÃÖ´·¨Ö°Ô±¸üÄѸú×ÙÆäIPµØµãºÍÎó²îȪԴ¡£Zoomcar CEO Greg MoranÌåÏÖ£¬¹«Ë¾Ê¹ÓÃǿʢµÄ¼ÓÃÜËã·¨¼ÓÃÜËùÓÐÊý¾Ý£¬ZoomcarÓû§ÃÜÂëÊý¾Ýй¶µÄ¶ÏÑÔÏÔÈ»ÊDz»×¼È·µÄ¡£
ÔÎÄÁ´½Ó£º
https://tech.economictimes.indiatimes.com/news/internet/data-of-3-5-million-zoomcar-customers-up-for-sale/75896086
6.ºÚ¿Íð³äÓ¢¹ú×î¸ß·¨Ôº´¹ÂÚ¹¥»÷£¬ÇÔÈ¡Office 365ƾ֤
¿ËÈÕ£¬µç×ÓÓʼþ±£»¤¹«Ë¾ArmorbloxÐû²¼ÁËÒ»·Ý±¨¸æ£¬³ÆÓкڿÍð³äÓ¢¹ú×î¸ß·¨Ôº·¢ËÍ´¹ÂÚµç×ÓÓʼþ¡£´Ë´Î¹¥»÷ÖУ¬¹¥»÷Õß½ö½«Óʼþ·¢Ë͸øÌض¨Óû§¶ø²»ÊÇÅúÁ¿·¢ËÍ£¬ÒÔ´ËÌÓ±ÜExchange Online Protection£¨EOP£©É¸Ñ¡Æ÷µÄ¹ýÂË¡£²¢ÇÒ£¬¸ÃÓʼþÖл¹°üÀ¨0dayµÄÁ´½Ó£¬Í¨¹ýһϵÁеÄÖØ¶¨Ïò£¬×îºóÁ´½Óµ½Î±ÔìµÄMicrosoft Office 365Ò³Ãæ£¬ÒÔÇÔÈ¡Óû§Æ¾Ö¤¡£¸Ã´¹ÂÚÔ˶¯±£´æ²¿·ÖÒì³££¬ÀýÈ磬ºÚ¿ÍʹÓõÄÓòÃûΪ·ÇÕýµ±Óò¡®docketsender[.]com¡¯£¬µ«Óû§ÈôÊDz»×ÐϸÊÓ²ìºÜÄÑ·¢Ã÷¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/fake-supreme-court-subpoena-phishing-scam-office-365-credentials/


¾©¹«Íø°²±¸11010802024551ºÅ