RedgateÐû²¼2020Äê¶ÈÊý¾Ý¿â״̬¼à²â±¨¸æ£»ºÚ¿Í¹¥»÷½ü2000¼ÒMagentoÔÚÏßÊÐËÁ £¬ÒÔÇÔÊØÐÅÓÿ¨

Ðû²¼Ê±¼ä 2020-09-15

1.RedgateÐû²¼2020Äê¶ÈÊý¾Ý¿â״̬¼à²â±¨¸æ


1.png


Redgate×îÐÂÐû²¼ÁË2020Äê¶ÈÊý¾Ý¿â״̬¼à²â±¨¸æ¡£±¨¸æÏÔʾ £¬ÎÞÂÛÊÇÔÚ½ÓÄÉÊý¾Ý¿âDevOps·½Ãæ £¬ÕÕ¾ÉÔÚʹÓÃ¼à¿ØÀ´¸ú×ÙÊý¾Ý¿âÐÔÄܺͰ²ÅÅ·½Ãæ £¬½ðÈÚ·þÎñÐÐÒµµÄÌåÏÖ¶¼ÓÅÓÚÆäËûÐÐÒµ¡£ÆäÖÐ £¬61%µÄ½ðÈÚ·þÎñÐÐÒµÔ±¹¤Ã¿ÖܸüÐÂÖÁÉÙÒ»´ÎÊý¾Ý¿â £¬¶øÆäËûÐÐÒµÖ»ÓÐ43%µÄÔ±¹¤»áÕâÑù×ö¡£½ðÈÚ·þÎñµÄ·þÎñÆ÷ÊýĿҲ¸ü¶à £¬36%µÄ·þÎñÆ÷ÓµÓÐ50µ½500¸öʵÀý £¬¶øÆäËû²¿·ÖÖ»ÓÐ26%¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/09/14/database-monitoring-improves-devops-success/


2.Êý¾ÝÖÐÐÄEquinixѬȾNetwalker £¬Ãô¸ÐÐÅÏ¢»òÒÑй¶


2.png


Êý¾ÝÍйÜÖÐÐÄEquinixÐû²¼ÉùÃ÷ £¬ÌåÏÖÆäÐí¶àÄÚ²¿ÏµÍ³Ôâµ½ÁËÀÕË÷Èí¼þ¹¥»÷ £¬µ«ÆäΪ¿Í»§Ìṩ·þÎñµÄÖ÷Òª½¹µã²¢Î´Êܵ½Ó°Ïì¡£Ö®ºó £¬ºÚ¿Í×éÖ¯NetwalkerÌåÏÖÆäÀÖ³ÉÈëÇÖÁËEquinix²¢Ðû²¼Á˱»µÁÊý¾ÝµÄ½ØÍ¼ £¬ÒÔ´ËҪЮ֧¸¶450ÍòÃÀÔªµÄÊê½ð¡£´Ë´Î×ß©µÄÊý¾Ý°üÀ¨¹«Ë¾²ÆÎñÐÅÏ¢ºÍÊý¾ÝÖÐÐı¨¸æ¡£ÏÖÔÚÉв»ÇåÎú´Ë´Î¹¥»÷µÄǰÒòºó¹û £¬EquinixÌåÏÖÕýÔÚ¾ÙÐÐÊӲ졣


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/data-center-giant-equinix-discloses-ransomware-incident/


3.·ÇÖÞÈûÉà¶û¿ª·¢ÒøÐÐÔâÀÕË÷Èí¼þ¹¥»÷ £¬¿Í»§ÐÅÏ¢¿ÉÄܱ»µÁ


3.png


·ÇÖÞÈûÉà¶ûÖÐÑëÒøÐУ¨CBS£©½ÒÏþÒ»·ÝÐÂÎÅÉùÃ÷ £¬ÈûÉà¶û¿ª·¢ÒøÐУ¨DBS£©Ôâµ½ÁËÀÕË÷Èí¼þ¹¥»÷ £¬¿Í»§ÐÅÏ¢»òÒѱ»µÁ¡£´Ë´Î¹¥»÷±¬·¢ÓÚ2020Äê9ÔÂ9ÈÕ £¬ÏêϸÐÅÏ¢»¹ÔÚÊÓ²ìÖ®ÖС£ËäÈ»ÏÖÔÚÉв»ÇåÎú¹¥»÷ÕßÊÇ·ñÔÚ¼ÓÃÜÒøÐÐϵͳ֮ǰÇÔÈ¡ÁËÊý¾Ý £¬µ«Æ¾Ö¤¹¥»÷ÖÐʹÓõÄÀÕË÷Èí¼þÀàÐÍ £¬ºÜÓпÉÄܱ¬·¢ÕâÖÖÇéÐΡ£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/development-bank-of-seychelles-hit-by-ransomware-attack/


4.ÃÀ¹úÓÊÕþ²¿·ÖITϵͳ±£´æ¶à¸öÎó²î £¬¿Éµ¼ÖÂÊý¾Ýй¶


4.jpg


ÃÀ¹úÓÊÕþ²¿·ÖµÄÒ»·ÝÉ󼯱¨¸æ·¢Ã÷ £¬¸Ã²¿·ÖµÄITϵͳ±£´æ¶à¸öÎó²î £¬ÕâЩÎó²î¿ÉÄܱ»ºÚ¿ÍʹÓÃÀ´ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£î¿Ïµ»ú¹¹ÌåÏÖ £¬ÕâЩÎó²îÖÐÓÐ12¸öÔÖÄÑÐ﵀ £¬ËüÃÇ¿ÉÄÜ»á¸ø¸Ã»ú¹¹´øÀ´ÖØ´óµÄ¾­¼ÃËðʧ £¬ÆäÖаüÀ¨³£¼ûµÄ¡¢Òѱ»¹ûÕæÈýÄêµÄÎó²î¡£×èÖ¹ÏÖÔÚ £¬»¹Ã»ÓÐÈκÎÖ¤¾ÝÅú×¢ÕâЩÎó²îÒѱ»ºÚ¿ÍʹÓá£


Ô­ÎÄÁ´½Ó£º

https://www.cyberscoop.com/postal-service-inspector-general-cyber-vulnerabilities/


5.Ñо¿ÍŶӷ¢Ã÷ʹÓÃOffice 365 API´¹ÂÚ¹¥»÷Ô˶¯


5.jpg


Ñо¿ÍŶӷ¢Ã÷Ò»ÖÖеÄÍøÂç´¹ÂÚ¹¥»÷Ô˶¯ £¬¹¥»÷Õß¿ÉʹÓÃÉí·ÝÑéÖ¤APIʵʱÑéÖ¤Êܺ¦ÕßµÄOffice 365ƾ֤¡£´Ë´Î¹¥»÷ÖеĴ¹ÂÚÓʼþÖ¸ÏòÓëOffice 365µÇ¼ҳÏàͬµÄ´¹ÂÚÍøÕ¾ £¬²¢ÇÒÓû§ÃûÒÑÔ¤ÏÈÊäÈë¡£Ò»µ©Êܺ¦Õß½«Æäƾ֤ÊäÈëµ½ÍøÂç´¹ÂÚµÇÂ¼Ò³Ãæ £¬Azure Active DirectoryµÇ¼ÈÕÖ¾¾Í»áÏÔʾÓëÔÚ¸½¼þÍøÒ³ÉÏÖ´ÐеÄXHRÇëÇóÏà¶ÔÓ¦µÄÁ¬Ã¦µÇ¼ʵÑé¡£ÈôÊÇÉí·ÝÑéÖ¤ÀÖ³É £¬Ôò½«Óû§Öض¨Ïòµ½zoom.com¡£ÈôÊÇÉí·ÝÑé֤ʧ°Ü £¬Ôò»á½«Óû§Öض¨Ïòµ½login.microsoftonline.com¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/office-365-phishing-attack-leverages-real-time-active-directory-validation/159188/


6.ºÚ¿Í¹¥»÷½ü2000¼ÒMagentoÔÚÏßÊÐËÁ £¬ÒÔÇÔÊØÐÅÓÿ¨


6.jpg


ÉÏÖÜÄ© £¬ÐÅÓÿ¨ÇÔȡԤ·À¹«Ë¾Sanguine Security·¢Ã÷ÔÚÒÑÍùËÄÌìÖкڿÍÈëÇÖÁË1904¼ÒMagentoÔÚÏßÊÐËÁ £¬ÒÔÇÔÊØÐÅÓÿ¨¡£¹¥»÷ʼÓÚÉÏÖÜÎå £¬ÆäʱÓÐ10¼ÒÊÐËÁѬȾÁË´Óδ¼û¹ýµÄÐÅÓÿ¨ÇÔÈ¡¾ç±¾¡£Ö®ºó £¬¹¥»÷ÔÚÖÜÁù¼¤Ôö £¬ÓÐ1058¸öÕ¾µã±»ºÚ¿ÍÈëÇÖ £¬ÔÚÖÜÈÕÓÐ603¸öÕ¾µã±»ÈëÇÖ £¬ÖÜÒ»ÓÐ233¸ö±»ÈëÇÖ¡£Sanguine SecurityÌåÏÖ £¬ÕâÊÇ×Ô2015Äê×îÏÈ¼à¿Øµç×ÓÉÌÎñÊÐËÁÒÔÀ´ £¬ËûÃÇËù¿´µ½µÄ×î´óµÄMagento¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/magento-stores-hit-by-largest-automated-hacking-attack-since-2015/