Ħ¸ùÊ¿µ¤ÀûÒòй¶Êý°ÙÍò¿Í»§ÐÅÏ¢Ö§¸¶3500ÍòÃÀÔª·£¿î
Ðû²¼Ê±¼ä 2022-09-23
¾Ý9ÔÂ21ÈÕ±¨µÀ£¬ÃÀ¹ú֤ȯÉúÒâίԱ»á(SEC)Ðû²¼£¬Ä¦¸ùÊ¿µ¤Àû£¨Morgan Stanley£©ÒÑÔÞ³ÉÖ§¸¶3500ÍòÃÀÔªµÄ·£¿î¡£SEC³Æ£¬Õâ¼Ò½ðÈÚ·þÎñ¹«Ë¾Î´Äܱ£»¤Ô¼Äª1500Íò¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡£´Ó2015Äê×îÏÈ£¬¸Ã¹«Ë¾¶à´ÎÔ¼ÇëÒ»¼Ò¹«Ë¾À´´¦Öóͷ£Êýǧ̨±¨·Ï×°±¸¡£È»¶ø£¬Õâ¼Ò¹«Ë¾ÔÚÊý¾ÝÏú»Ù·½ÃæÃ»ÓÐÂÄÀú£¬ÉõÖÁ½«Êýǧ̨װ±¸³öÊÛ¸øµÚÈý·½£¬ÆäÖаüÀ¨Á˿ͻ§ÐÅÏ¢µÄ×°±¸£¬È»ºóÕâЩװ±¸ÔÚÅÄÂôÍøÕ¾Éϱ»×ªÊÛ¡£¸Ã¹«Ë¾ÊÔͼȡ»ØÕâЩװ±¸£¬µ«ÆäÖоø´ó´ó¶¼ÎÞ·¨»Ö¸´¡£
https://www.securityweek.com/morgan-stanley-pay-35m-fine-exposing-information-millions-customers
2¡¢Windows 11 22H2¹¦Ð§¸üе¼ÖÂNVIDIA·ºÆðÐÔÄÜÎÊÌâ
¾ÝýÌå9ÔÂ22Èճƣ¬±¾ÖÜÔçЩʱ¼äÐû²¼µÄWindows 11 22H2¹¦Ð§¸üÐÂÔÚ×°ÓÐNVIDIA GPUµÄϵͳÉÏÒýÆðÁËÓÎÏ·ÐÔÄÜÎÊÌâ¡£ÓÉÓÚ×°ÖøøüкóCPUʹÓÃÂÊÏÔ×ÅϽµ£¬²¿·ÖÍæ¼ÒÔÚÍæÓÎϷʱ»á·ºÆð¿¨¶ÙºÍÑÏÖØÖͺó¡£ÓÐȤµÄÊÇ£¬Æ¾Ö¤¶à¸öÓû§µÄ±¨¸æ£¬Ôڻعö¸üкó£¬ÓÎÏ·ÐÔÄÜÎÊÌ⽫ÏûÊÅ¡£ËäȻ΢ÈíÉÐδ½éÈë²¢ÊÓ²ìÕâЩÓû§±¨¸æ£¬µ«NVIDIAÖÊÁ¿°ü¹Ü²¿·Ö֤ʵ£¬¸Ã¹«Ë¾ÒѾÒâʶµ½Õâ¸öÎÊÌ⣬²¢ÔÚÌáÐÑÊÜÓ°ÏìµÄRedditÓû§Ìṩ¸ü¶àµÄ·´Ïì¡£
https://www.bleepingcomputer.com/news/gaming/windows-11-22h2-causing-gaming-issues-for-some-nvidia-users/
3¡¢ÐÄ»³²»ÂúµÄ¿ª·¢Ö°Ô±ÔÚTwitter¹ûÕæLockbit 3.0¹¹½¨Æ÷
ýÌå9ÔÂ21ÈÕ±¨µÀ³Æ£¬ÀÕË÷Èí¼þLockBit×îÐÈÎÃüÜÆ÷µÄ¹¹½¨Æ÷ÒѾй¶¡£Ñо¿Ö°Ô±3xp0rt³Æ£¬ÐÂ×¢²áµÄTwitterÓû§Ali QushjiÌåÏÖËûÃǵÄÍŶÓÈëÇÖÁËLockBits·þÎñÆ÷²¢ÕÒµ½ÁËLockBit 3.0µÄ¹¹½¨Æ÷¡£Ö®ºó£¬ÃûΪprotonleaksÒ²¹ûÕæÁ˸ù¹½¨Æ÷µÄ¸±±¾¡£LockBitµÄ´ú±íLockBitSuppÉù³ÆËûÃÇûÓб»ÈëÇÖ£¬¶øÊÇÒ»¸ö¶ÔLockbitµÄÏòµ¼²ã¸ÐÓ¦²»ÂúµÄ¿ª·¢Ö°Ô±Ð¹Â¶Á˹¹½¨Æ÷¡£¸Ã¹¹½¨Æ÷¿É±»ÈκÎÈËÓÃÀ´¿ìËÙ¹¹½¨Æô¶¯¹¥»÷ËùÐèµÄ¿ÉÖ´ÐÐÎļþ£¬°üÀ¨¼ÓÃÜÆ÷¡¢½âÃÜÆ÷ºÍÒÔÌØ¶¨·½·¨Æô¶¯½âÃÜÆ÷µÄרÓù¤¾ß¡£
https://www.bleepingcomputer.com/news/security/lockbit-ransomware-builder-leaked-online-by-angry-developer-/
4¡¢PythonÖÐÒѱ£´æ15ÄêµÄÎó²î¿ÉÓ°ÏìÁè¼Ý35Íò¿ªÔ´´æ´¢¿â
TrellixÑо¿Ö°Ô±ÔÚ9ÔÂ21Èճƣ¬PythonÖÐÒѱ£´æ15ÄêµÄÎó²î¿ÉÄÜ»áÓ°ÏìÁè¼Ý350000¸ö¿ªÔ´ÏîÄ¿¡£ÕâÊÇÒ»¸ö·¾¶±éÀúÎó²î£¨CVE-2007-4559£¬CVSSÆÀ·Ö6.8£©£¬¿É±»ÓÃÀ´ÁýÕÖí§ÒâÎļþ²¢µ¼Ö´úÂëÖ´ÐУ¬±£´æÓÚPython tarfile°üµÄʹÓÃδ´¦Öóͷ£µÄtarfile.extract()º¯Êý»òtarfile.extractall()µÄÄÚÖÃĬÈÏÖµµÄ´úÂëÖС£±ðµÄ£¬Trellix»¹Ðû²¼ÁËÒ»¸öÃûΪCreosoteµÄ×Ô½ç˵ӦÓã¬ÓÃÓÚɨÃèÒ×ÊÜCVE-2007-4559¹¥»÷µÄÏîÄ¿¡£
https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/tarfile-exploiting-the-world.html
5¡¢MicrosoftÅû¶ÁËÕë¶ÔÓ¡¶ÈµÄAndroid¶ñÒâÈí¼þµÄϸ½Ú
9ÔÂ21ÈÕ£¬MicrosoftÅû¶ÁËÕë¶ÔÓ¡¶ÈµÄAndroid¶ñÒâÈí¼þ·Ö·¢Ô˶¯¡£¸ÃÔ˶¯Ê¼ÓÚÒ»Ìõ°üÀ¨¶ñÒâÁ´½ÓµÄSMSÐÂÎÅ£¬Á´½Ó»áÏÂÔØÒ»¸öαÔìµÄÒøÐн±ÀøÓ¦ÓóÌÐò¡£ÕâЩαÔìÓ¦ÓõÄC2·þÎñÆ÷ÓëÆäËû75¸ö»ùÓÚ¿ªÔ´Ç鱨µÄ¶ñÒâAPKÓйء£¸Ã¶ñÒâÈí¼þ¾ßÓÐRAT¹¦Ð§£¬¿É×èµ²Ö÷ÒªµÄ֪ͨ£¬ÀýÈç´«ÈëÐÂÎÅ£¬ÕâÏÔÈ»ÊÇΪÁË»ñµÃÒøÐкͽðÈÚ»ú¹¹Ê¹ÓõÄ2FAÐÂÎÅ¡£Ñо¿Ö°Ô±Ç¿ÁÒ½¨ÒéÓû§²»Òªµã»÷¶ÌÐÅ¡¢Óʼþ»òÐÂÎÅÓ¦ÓÃÖÐÊÕµ½µÄδ֪Á´½Ó£¬²¢È·±£ÒøÐÐÓ¦ÓóÌÐòÊÇ´Ó¹Ù·½Ó¦ÓóÌÐòÊÐËÁÏÂÔØµÄ¡£
https://www.microsoft.com/security/blog/2022/09/21/rewards-plus-fake-mobile-banking-rewards-apps-lure-users-to-install-info-stealing-rat-on-android-devices/
6¡¢VMwareÐû²¼2022°æµÄÄê¶ÈÈ«ÇòÊÂÎñÏìÓ¦ÍþвÆÊÎö±¨¸æ
¾ÝýÌå9ÔÂ20ÈÕ±¨µÀ£¬VMwareÔÚ½üÆÚÐû²¼ÁË2022°æµÄÄê¶ÈÈ«ÇòÊÂÎñÏìÓ¦ÍþвÆÊÎö±¨¸æ¡£VMwareÔÚ±¨¸æÖÐÌá³öÁË8¸öÖ÷Òª·¢Ã÷£ººáÏòÔ˶¯ÊÇеÄÕ½³¡£»Deepfake¹¥»÷ÃÍÔö13%£¬66%µÄÊÜ·ÃÕßÔÚÒÑÍùÒ»ÄêÖÐÑÛ¼ûÁË´ËÀ๥»÷£»65%µÄÊÜ·ÃÕ߳ƶíÎÚÕ½ÕùÒÔÀ´¹¥»÷Ô˶¯ÓÐËùÔöÌí£»23%µÄ¹¥»÷Σ¼°APIÇå¾²ÐÔ£»62%µÄÊÜ·ÃÕßÔÚÒÑÍùÒ»ÄêÄÚÓöµ½¹ýÁãÈÕÎó²î£¬±ÈÈ¥ÄêÔöÌí11%£»½ü60%µÄÊÜ·ÃÕßÔÚÒÑÍùÒ»ÄêÄÚÔâµ½¹ýÀÕË÷¹¥»÷£»ITÑо¿Ö°Ô±ÕýÔÚ»¹»÷£»ITÆ£¾ëÂʱÈÈ¥ÄêÂÔÓÐϽµ£¬µ«ÈÔÈ»ÊÇÒ»¸öÒªº¦ÎÊÌâ¡£
https://www.vmware.com/content/dam/learn/en/amer/fy23/pdf/1553238_Global_Incident_Response_Threat_Report_Weathering_The_Storm.pdf


¾©¹«Íø°²±¸11010802024551ºÅ