Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄÎó²î£»Apodis PharmaÊý¾Ý¿âÉèÖùýʧй¶1.7TBÉñÃØÊý¾Ý
Ðû²¼Ê±¼ä 2020-12-02
Cisco TalosÅû¶WebKitä¯ÀÀÆ÷ÒýÇæ±£´æ¶à¸öÑÏÖØµÄÎó²î¡£ÕâЩÎó²îÓëWebKitµÄWebSocket¡¢AudioSourceProviderGStreamerºÍImageDecoderGStreamer¹¦Ð§Óйء£»®·ÖΪWebSocket´úÂëÖ´ÐÐÎó²î£¨CVE-2020-13543£©£¬¿Éͨ¹ý´¥·¢ÊͷźóʹÓÃÎó²îÀ´Ô¶³ÌÖ´ÐдúÂ룻ImageDecoderGStreamerÊͷźóʹÓÃÎó²î£¨CVE-2020-13584£©£¬¿Éµ¼ÖÂÔ¶³ÌÖ´ÐдúÂ룬ÒÔ¼°±»×·×ÙΪCVE-2020-13543µÄÎó²î¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/webkit-vulnerabilities-allow-remote-code-execution-malicious-websites
2.Ô½ÄÏ×éÖ¯BismuthÃé×¼·¨¹úºÍÔ½ÄϵÄÕþ¸®»ú¹¹ºÍ¹«Ë¾

΢Èí·¢Ã÷Ô½ÄϺڿÍ×éÖ¯BismuthÃé×¼·¨¹úºÍÔ½ÄϵÄÕþ¸®»ú¹¹ºÍ¹«Ë¾¡£¸ÃÍÅ»ï×Ô2012ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬²¢ÒÔ´úºÅAPT32ºÍOceanLotusµÈΪÈËËùÖª¡£ÆäÖ÷Òª¿ªÕ¹Õë¶Ôº£ÄÚÍâµÄÖØ´óºÚ¿ÍÔ˶¯£¬Ä¿µÄÊÇÍøÂçÐÅÏ¢ÒÔ×ÊÖúÆäÕþ¸®´¦Öóͷ£ÕþÖΡ¢¾¼ÃºÍÍâ½»Õþ²ß¾öÒé¡£µ«Î¢Èí·¢Ã÷£¬ÔÚ2020Äê7ÔÂÖÁ2020Äê8Ô£¬¸Ã×éÖ¯ÔÚÕë¶Ô·¨¹úºÍÔ½ÄϵÄÕþ¸®»ú¹¹ºÍ¹«Ë¾µÄ¹¥»÷ÖÐ×îÏÈʹÓÃMoneroÍÚ¿óÈí¼þ£¬ÏÖÔÚÉв»ÇåÎúÆäΪºÎ¾ÙÐд˸ü¸Ä¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/microsoft-links-vietnamese-state-hackers-to-crypto-mining-malware-campaign/
3.Ñо¿ÍŶӷ¢Ã÷GotkitÓëREvilµÄÏàÖúͬ°é¹ØÏµÖØÉú

Ñо¿ÍŶӷ¢Ã÷£¬ÔÚ³¤´ïÒ»ÄêµÄÐÝÏ¢ºó£¬ÐÅÏ¢ÇÔȡľÂíGootkitÓëREvilÒ»ÆðÔÚÕë¶ÔµÂ¹úµÄÐÂÕ½ÕùÖÐÖØÉú¡£Ôڴ˴ι¥»÷Ô˶¯ÖУ¬ºÚ¿Í¹¥»÷WordPressÍøÕ¾£¬²¢Ê¹ÓÃSEO²¡¶¾Ïò»á¼ûÕßչʾαÔìµÄÂÛ̳Ìû×Ó£¬²¢¸½ÓжñÒâ±í¸ñ»òÏÂÔØµÄÁ´½Ó¡£µ±Óû§µã»÷Á´½Óʱ£¬½«ÏÂÔØÒ»¸ö°üÀ¨»ìÏýµÄJSÎļþµÄZIPÎļþ£¬¸ÃÎļþ½«×°ÖÃGootkit¶ñÒâÈí¼þ»òREvilÀÕË÷Èí¼þ¡£±ðµÄ£¬Ê¹ÓÃÁË»ìÏýµÄÓÐÓÃÔØºÉ¿É½«ÆäÆÊÎö³ÉƬ¶Ï´æ´¢ÔÚ×¢²á±íÖУ¬Ê¹µÃÇå¾²Èí¼þ¸üÄѼì²âµ½¸Ã¶ñÒâ¸ºÔØ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/gootkit-malware-returns-to-life-alongside-revil-ransomware/
4.Ñо¿ÍŶӷ¢Ã÷¿Éͨ¹ýαÔìPayPal±íµ¥ÇÔÈ¡Óû§ÐÅÏ¢

Ñо¿ÍŶӷ¢Ã÷еÄÐÅÓÿ¨ÇÔÈ¡Æ÷¿Éͨ¹ýαÔìPayPal±íµ¥ÇÔÈ¡Óû§ÐÅÏ¢¡£¸ÃÇÔÈ¡Æ÷ÊÇ»ùÓÚJavaScriptµÄ¾ç±¾£¬ÓÃÓÚ×¢Èëµ½µçÉÌÆ½Ì¨µÄ½áÕÊÒ³ÃæÖС£¸Ã¾ç±¾Í¨¹ýÒþдÊõ±»Òþ²ØÔÚ±»Íйܵ½ÊÜѬȾÊÐËÁµÄ·þÎñÆ÷ÉϵÄÓ³ÏñÖС£È»ºó£¬Ëü»áʹÓÃÖ®Ç°ÍøÂçµÄ¶©µ¥Êý¾ÝÀ´Ô¤ÌîαÔìµÄPayPalÖ§¸¶±íµ¥£¬ÔÙ½«Êܺ¦ÕßÖØ¶¨Ïòµ½PayPalµÄ¶©µ¥Ò³Ãæ¡£Ò»µ©Êܺ¦ÕßÊäÈëÁ˸¶¿îÐÅÏ¢²¢µã»÷ÁËÌá½»°´Å¥£¬¸ÃÇÔÈ¡Æ÷»á½«ÆäËùÓÐÐÅÏ¢´«»Øµ½¹¥»÷ÕߵķþÎñÆ÷¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/credit-card-skimmer-fills-fake-paypal-forms-with-stolen-order-info/
5.ResearchAndMarketsÐû²¼Î´À´5ÄêSD-WANÊг¡Õ¹Íû±¨¸æ

ResearchAndMarketsÐû²¼ÁËδÀ´5ÄêSD-WANÊг¡Õ¹Íû±¨¸æ¡£±¨¸æÔ¤¼Æ£¬È«ÇòSD-WANÊг¡¹æÄ£½«´Ó2020ÄêµÄ19ÒÚÃÀÔªÔöÌíµ½2025ÄêµÄ84ÒÚÃÀÔª£¬ÔÚ´Ëʱ´úµÄ¸´ºÏÄêÔöÌíÂÊ£¨CAGR£©Îª34.5£¥¡£°´×éÖ¯¹æÄ£»®·Ö£¬ÖÐСÐÍÆóÒµ½«Õ¼Óиü¸ßµÄÊг¡·Ý¶î¡£ÓÉÓÚ¸ü¶àµÄSD-WAN½â¾ö¼Æ»®»ùÓÚÔÆ£¬Ìá¸ßÁËÆä¿ÉÔâÊÜÐÔ£¬Ê¹ÖÐСÆóÒµ¶ÔSD-WAN½â¾ö¼Æ»®µÄÐèÇóÔöÌí¡£±ðµÄ£¬ÆóÒµÕýתÏò»ùÓÚÔÆµÄÓ¦ÓóÌÐò£¬Òò´ËÔ¤¼ÆÔư²ÅŽ«ÔÚδÀ´Ö÷µ¼Êг¡¡£
ÔÎÄÁ´½Ó£º
https://www.researchandmarkets.com/reports/5137053/software-defined-wide-area-network-sd-wan
6.Apodis PharmaÊý¾Ý¿âÉèÖùýʧй¶1.7TBÉñÃØÊý¾Ý

CyberNews·¢Ã÷Apodis PharmaµÄElasticSearchÊý¾Ý¿âÉèÖùýʧ£¬Ð¹Â¶Áè¼Ý1.7TBµÄÉñÃØÊý¾Ý¡£Apodis PharmaÊÇÒ»¼ÒΪҩ·¿¡¢Ò½ÁÆ»ú¹¹µÈ¹«Ë¾ÌṩÊý×Ö¹©Ó¦Á´ÖÎÀíÆ½Ì¨ºÍÈí¼þ½â¾ö¼Æ»®µÄ¹«Ë¾¡£¸ÃÊý¾Ý¿â°üÀ¨´ó×ÚÓëÓªÒµÏà¹ØµÄÉñÃØÊý¾Ý£¬°üÀ¨Ò©Æ·×°ÔËÊý¾ÝºÍ´æ´¢×´Ì¬¡¢Æä25000¶à¸öÏàÖúͬ°éºÍ¿Í»§µÄµµ°¸¡¢²úÆ·ÊýÄ¿ºÍIDµÈ²úÆ·Êý¾Ý¡¢ÏúÊÛÈÕÆÚºÍ¼ÛÇ®µÈÏúÊÛÐÅÏ¢¡¢¿Í»§¼°Ô±¹¤ÐÕÃûµÈÓû§Êý¾Ý¡¢ÏûºÄÕߺͿͻ§Êý¾ÝµÄ¿ÉÊÓ»¯ºÍÆÊÎöÊý¾Ý¡£¸ÃÊý¾Ý¿âÒÑÓÚ11ÔÂ17ÈÕ±»±£»¤ÆðÀ´¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/111756/data-breach/apodis-pharma-data-leak.html


¾©¹«Íø°²±¸11010802024551ºÅ