CiscoÐû²¼Çå¾²¸üУ¬ÐÞ¸´Æä¶à¿î²úÆ·ÖеÄ8¸öÎó²î

Ðû²¼Ê±¼ä 2022-08-05
1¡¢CiscoÐû²¼Çå¾²¸üУ¬ÐÞ¸´Æä¶à¿î²úÆ·ÖеÄ8¸öÎó²î

      

8ÔÂ3ÈÕ£¬CiscoÐû²¼Çå¾²¸üУ¬×ܼÆÐÞ¸´ÁË8¸öÎó²î¡£ÆäÖУ¬½ÏΪÑÏÖØµÄÊÇCisco Small Business RVϵÁзÓÉÆ÷ÖеÄÎó²îCVE-2022-20842£¬CVSSÆÀ·ÖΪ9.8£¬¿É±»Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÓÃÀ´Ö´ÐÐí§Òâ´úÂ룬»òʹװ±¸ÒâÍâÖØÆô´Ó¶øµ¼Ö¾ܾø·þÎñ(DoS)£»ÉÐÓÐWeb¹ýÂËÆ÷Êý¾Ý¿â¸üй¦Ð§ÖеÄÏÂÁî×¢ÈëÎó²î£¨CVE-2022-20827£©ºÍ¿ª·Å¼´²å¼´ÓÃ(PnP)Ä£¿éÏÂÁî×¢ÈëÎó²î£¨CVE-2022-20841£©£¬ÒÔÉÏÈý¸öÎó²î¾ùΪÊäÈëÑé֤ȱ·¦µ¼ÖµÄ¡£±ðµÄ£¬»¹ÐÞ¸´ÁËWebex MeetingsºÍÉí·Ý·þÎñÒýÇæµÈ²úÆ·ÖеĶà¸öÎó²î¡£


https://thehackernews.com/2022/08/cisco-business-routers-found-vulnerable.html


2¡¢µÂ¹ú¹¤ÉÌЭ»á³ÆÆäÔâµ½´ó¹æÄ£¹¥»÷±»ÆÈ¹Ø±ÕËùÓÐϵͳ

      

¾ÝýÌå8ÔÂ4ÈÕ±¨µÀ£¬µÂ¹ú¹¤ÉÌЭ»á(DIHK)³ÆÆäÔâµ½ÁË´ó¹æÄ£µÄ¹¥»÷¡£DIHKÊÇÓÉ79¸ö´ú±íµÂ¹ú¹«Ë¾µÄÉÌ»á×é³ÉµÄͬÃË£¬ÓµÓÐÁè¼Ý300Íò»áÔ±¡£¹¥»÷±¬·¢ÔÚ8ÔÂ3ÈÕ£¬Ð­»á±»ÆÈ¹Ø±ÕÆäËùÓÐITϵͳ£¬ÒÔ¼°Êý×Ö·þÎñ¡¢µç»°ºÍµç×ÓÓʼþ·þÎñÆ÷À´Ó¦¶Ô´Ë´Î¹¥»÷¡£DIHKÉùÃ÷¹Ø±ÕϵͳÊÇÒ»ÖÖÔ¤·À²½·¥£¬Ò²ÊÇÈÃITÍŶÓÓÐʱ¼äÌá³ö½â¾ö¼Æ»®ºÍ½¨Éè·ÀÓùµÄ·½·¨¡£ÏÖÔÚ£¬¸Ã»ú¹¹ÕýÔÚÖð²½»Ö¸´Ò»Ð©·þÎñ£¬µ«ÎÞ·¨Õ¹ÍûÐèÒª¶à³¤Ê±¼ä¡£


https://www.bleepingcomputer.com/news/security/german-chambers-of-industry-and-commerce-hit-by-massive-cyberattack/


3¡¢RobinhoodÒòÎ¥·´Å¦Ô¼ÍøÂçÇå¾²¹æÔò±»·£¿î3000ÍòÃÀÔª

      

ýÌå8ÔÂ3Èճƣ¬RobinhoodµÄ¼ÓÃÜÇ®±Ò²¿·ÖÒòÎ¥·´ÍøÂçÇå¾²ºÍÏ´Ç®¹æÔò¶ø±»Å¦Ô¼½ðÈÚ·þÎñ²¿·£¿î3000ÍòÃÀÔª¡£Å¦Ô¼½ðÈÚ·þÎñ²¿µÄÉùÃ÷ÌåÏÖ£¬Robinhood CryptoÍøÂçÇå¾²ÍýÏë±£´æÎÊÌ⣬ûÓÐÍêÈ«½â¾öRHCµÄÔËӪΣº¦£¬²¢ÇÒ¸ÃÍýÏëÖеÄÏêϸÕþ²ß²»ÍêÈ«ÇкÏÍøÂçÇå¾²ºÍÐéÄâÇ®±Ò¹æÔòµÄ¼¸Ïî»®¶¨£¬ÇҸù«Ë¾µÄºÏ¹æÍýÏëºÍÉúÒâ¼à¿ØÏµÍ³Öеı£´æÈ±ÏÝ¡£³ýÁË3000ÍòÃÀÔªµÄ·£¿îÍ⣬¸Ã¹«Ë¾»¹ÐèÒªÔ¼ÇëÒ»Ãû×ÔÁ¦ÕÕÁÏÀ´ÖÜÈ«ÆÀ¹ÀRobinhood Crypto¹æÔòµÄ×ñÊØÇéÐΣ¬²¢ÐÞ¸´ÒÑ·¢Ã÷µÄȱÏݺÍÎ¥¹æÐÐΪ¡£


https://www.securityweek.com/robinhood-crypto-penalized-30m-violating-ny-cybersecurity-regulations


4¡¢Ô¼Äª35000¸öGitHub´æ´¢¿â±»¿Ë¡²¢Ìí¼Ó¶ñÒâ´úÂë

      

8ÔÂ3ÈÕ£¬Èí¼þ¿ª·¢Ö°Ô±Stephen LacyÉù³ÆÔÚGitHubÉÏ·¢Ã÷ÁËÔ¼35000¸ö´æ´¢¿â±»¿Ë¡²¢Ìí¼Ó¶ñÒâ´úÂë¡£¿ª·¢Ö°Ô±James TuckerÖ¸³ö£¬°üÀ¨¶ñÒâURLµÄ¿Ë¡´æ´¢¿â²»µ«Ð¹Â¶ÁËÓû§µÄÇéÐαäÁ¿ £¬²¢ÇÒ»¹°üÀ¨Ò»¸öµ¥ÐкóÃÅ¡£ÆäÖоø´ó´ó¶¼¿Ë¡µÄ´æ´¢¿âÔÚÉϸöÔ±»¶ñÒâ´úÂë¸Ä¶¯£¬µ«Ò²µ½Ò»Ð©¿É×·Ëݵ½2015Äê¡£ÏÖÔÚ£¬GitHubÍŶÓÒÑ´ÓÆäÆ½Ì¨ÉÑþ³ØýÁ˶ñÒâ¿Ë¡´æ´¢¿â¡£


https://www.bleepingcomputer.com/news/security/35-000-code-repos-not-hacked-but-clones-flood-github-to-serve-malware/


5¡¢Zscaler·¢Ã÷ʹÓÃAiTMÊÖÒպͶàÖÖÈÆ¹ýÕ½ÂԵĴ¹ÂÚ¹¥»÷

      

ZscalerÔÚ8ÔÂ2ÈÕÅû¶ÁËʹÓÃAiTMÊÖÒÕÒÔ¼°¶àÖÖÈÆ¹ýÕ½ÂԵĴó¹æÄ£ÍøÂç´¹ÂÚÔ˶¯¡£´Ë´ÎÔ˶¯×îÏÈÓÚ2022Äê6Ô£¬Ö÷ÒªÕë¶ÔÃÀ¹ú¡¢Ó¢¹ú¡¢ÐÂÎ÷À¼ºÍ°Ä´óÀûÑǵĽðÈڿƼ¼¡¢´û¿î¡¢»á¼Æ¡¢°ü¹ÜºÍÁª°îÐÅÓÃÏàÖúÉç×éÖ¯¡£¹¥»÷Ô˶¯Ê¹ÓÃÁË»ùÓÚÊðÀíµÄ×Ô½çËµÍøÂç´¹ÂÚ¹¤¾ß°üÈÆ¹ý¶àÒòËØÈÏÖ¤£¨MFA£©£¬Ê¹ÓÃÖÖÖÖαװºÍä¯ÀÀÆ÷Ö¸ÎÆÊÖÒÕÀ´Èƹý×Ô¶¯URLÆÊÎöϵͳ£¬Ê¹ÓÃURLÖØ¶¨ÏòÊÖÒÕÈÆ¹ýÆóÒµµç×ÓÓʼþURLÆÊÎö½â¾ö¼Æ»®£¬»¹Ê¹ÓÃÁËÕýµ±µÄÔÚÏß´úÂë±à¼­·þÎñ£¨ÈçCodeSandboxºÍGlitch£©¡£


https://www.zscaler.com/blogs/security-research/large-scale-aitm-attack-targeting-enterprise-users-microsoft-email-services


6¡¢KasperskyÐû²¼2022ÄêQ2 DDoS¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ

      

8ÔÂ3ÈÕ£¬KasperskyÐû²¼ÁË2022ÄêµÚ¶þ¼¾¶ÈDDoS¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£±¨¸æÖ¸³ö£¬ÔÚµÚ¶þ¼¾¶È×ܹ²¼Í¼ÁË78558´ÎDDoS¹¥»÷£¬±ÈÉÏÒ»¼¾¶ÈϽµÁË13.72%¡£³¤Ê±¼ä£¨20Сʱ»ò¸ü³¤£©DDoS¹¥»÷µÄÕ¼±ÈϽµ£¬´ÓµÚÒ»¼¾¶ÈµÄ½ü20%½µÖÁÔ¼7%£¬4СʱµÄ½Ï¶ÌDDoS¹¥»÷Õ¼×ܹ¥»÷ÊýÄ¿µÄ95.24%¡£46.17%µÄ½©Ê¬ÍøÂçC2·þÎñÆ÷λÓÚÃÀ¹ú£¬Æä´ÎÊǺÉÀ¼£¨14.49%£©ºÍµÂ¹ú£¨9.11%£©¡£Ö÷ÒªµÄDDoS¹¥»÷ÊÖÒÕΪUDP flood£¬Õ¼±È62.53%£¬Æä´ÎÊÇSYN flood£¨20.25%£©¡£


https://securelist.com/ddos-attacks-in-q2-2022/107025/