¡¾Çå¾²²¥±¨¡¿Wi-FiͬÃËÕýʽÐû²¼ÐÂÒ»´úÇå¾²±ê×¼WPA3£¬£¬£¬£¬¿É½øÒ»²½Ìá¸ßÍøÂçÇå¾²ÐÔ
±¾ÖÜÒ»Wi-FiͬÃËÕýʽÐû²¼ÐÂÒ»´úÇå¾²±ê×¼WPA3£¬£¬£¬£¬WPA3ÊÇÓÃÓÚWi-FiÅþÁ¬µÄÓû§Éí·ÝÑéÖ¤ÊÖÒÕµÄ×îа汾¡£¡£¡£¡£¡£¡£¡£WPA3ÓÐÁ½ÖÖÇ徲ģʽ£¬£¬£¬£¬WPA3-PersonalºÍWPA3-Enterprise£¬£¬£¬£¬ÕâÁ½ÖÖÇ徲ģʽµÄÖ÷񻂿±ðÔÚÓÚÉí·ÝÑéÖ¤½×¶Î¡£¡£¡£¡£¡£¡£¡£¹ØÓÚÆóÒµ¡¢Õþ¸®ºÍ½ðÈÚÍøÂçÖÐʹÓõÄ×°±¸£¬£¬£¬£¬½¨ÒéʹÓÃWPA3-EnterpriseÇ徲ģʽ£¬£¬£¬£¬WPA3-PersonalÔòÊÇÃæÏòͨË×СÎÒ˽¼ÒÓû§¡£¡£¡£¡£¡£¡£¡£Wi-FiͬÃËÌåÏÖWPA3µÄSAEËã·¨Äܹ»µÖÓù±©Á¦¹¥»÷£¬£¬£¬£¬WPA3½«ÔÚ¶à´Îʧ°ÜʵÑéºó×èÖ¹ÈÏÖ¤ÇëÇ󡣡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/new-wpa3-wi-fi-standard-released/
¡¾ÍþвÇ鱨¡¿Çå¾²Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶Ô¶«ÄÏÑǵĹ¥»÷»î¶¯Rancor
Palo Alto NetworksµÄUnit 42Ñо¿ÍŶÓÊӲ쵽Õë¶Ô¶«ÄÏÑǵÄһϵÁй¥»÷»î¶¯£¬£¬£¬£¬Æä¶ñÒâÈí¼þµÄ·Ö·¢ºÍÄ¿µÄµÄÑ¡Ôñ¾ßÓи߶ÈÕë¶ÔÐÔ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ¸Ã¹¥»÷ÕßÊÇÒ»¸öδ֪µÄ×éÖ¯Rancor£¬£¬£¬£¬RancorÖ÷ҪʹÓÃÁ½¸ö¶ñÒâÈí¼þ¼Ò×壬£¬£¬£¬DDKONGºÍPLAINTEE¡£¡£¡£¡£¡£¡£¡£DDKONGÊÇÆäÖ÷ÒªµÄ¶ñÒâÈí¼þ¹¤¾ß£¬£¬£¬£¬PLAINTEEËÆºõÊÇÐÂÔöÌíµÄ¹¤¾ß¡£¡£¡£¡£¡£¡£¡£Æä¹¥»÷Ä¿µÄ°üÀ¨µ«²»ÏÞÓÚÐÂ¼ÓÆÂºÍ¼íÆÒÕ¯¡£¡£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷»î¶¯´Ó´¹ÂÚÐÅÏ¢×îÏÈ£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÔΪÆäÖ÷ÒªÕë¶ÔÕþÖÎʵÌå¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://researchcenter.paloaltonetworks.com/2018/06/unit42-rancor-targeted-attacks-south-east-asia-using-plaintee-ddkong-malware-families/
¡¾ÍþвÇ鱨¡¿Ñо¿Ö°Ô±³Æ2017ÄêµÄÿһ¸ö¼ÓÃÜÇ®±ÒICOƽ¾ù°üÀ¨5¸öÇå¾²Îó²î
Positive.com·¢Ã÷2017ÄêµÄÿһ¸ö¼ÓÃÜÇ®±ÒICOƽ¾ù±£´æ5¸öÇå¾²Îó²î£¬£¬£¬£¬´ó´ó¶¼Îó²î¶¼ÊÇÔÚICO×Ô¼ºµÄÖÇÄܺÏÔ¼Öз¢Ã÷µÄ¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ2017ÄêËùÓеÄICOÒÆ¶¯Ó¦Óö¼±£´æÇå¾²Îó²î£¬£¬£¬£¬ÁíÍâÈý·ÖÖ®Ò»µÄÎó²î·ºÆðÔÚICOµÄwebÓ¦ÓÃÖУ¬£¬£¬£¬Îó²î¹æÄ£°üÀ¨´úÂë×¢È롢ЧÀÍÆ÷Ãô¸ÐÊý¾Ýй¶¡¢²»Çå¾²µÄÊý¾Ý´«ÊäÒÔ¼°í§ÒâÎļþ¶ÁÈ¡µÈ¡£¡£¡£¡£¡£¡£¡£ICO×éÖ¯ÕßÍùÍùûÓÐΪÆäÏîĿע²áÉ罻ýÌåÕË»§£¬£¬£¬£¬Ê¹ÆäÓû§Ò×ÊÜÉç½»¹¤³ÌºÍ´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£¡£×îºó£¬£¬£¬£¬ICO×éÖ¯ÕßÍùÍùδÄÜΪÆäÃô¸ÐÕË»§ÆôÓÃË«ÒòËØÈÏÖ¤£¬£¬£¬£¬µ¼Ö¹¥»÷Õß¿ÉÄÜÐ®ÖÆ¹Ù·½ÍøÕ¾»òÇ®°ü¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/researchers-last-year-s-icos-had-five-security-vulnerabilities-on-average/
¡¾ÍþвÇ鱨¡¿Çå¾²Ñо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þThanatosµÄ½âÃܹ¤¾ß
˼¿ÆTalosÐû²¼ÀÕË÷Èí¼þThanatosµÄÃ⺬»ìÃܹ¤¾ß£¬£¬£¬£¬¸Ã¹¤¾ßÔÚThanatos°æ±¾1ºÍ1.1ÒÔ¼°ÆäËüÒÑÖª°æ±¾É϶¼ÓÐÓᣡ£¡£¡£¡£¡£¡£Thanatosͨ¹ýŲÓÃGetTickCount»ñȡϵͳÔËÐÐʱ¼äµÄºÁÃëÊý£¬£¬£¬£¬È»ºóÌìÉú¼ÓÃÜÃÜÔ¿£¬£¬£¬£¬²¢Ê¹ÓÃ(AES)-256¾ÙÐмÓÃÜ¡£¡£¡£¡£¡£¡£¡£Òò´ËÆäÃÜÔ¿ÊÇÒ»¸ö32λµÄÖµ£¬£¬£¬£¬ÔÚÆ½¾ùÿÃë10Íò´ÎµÄ±©Á¦ÆÆ½âÏ£¨²âÊÔÐéÄâ»úµÄ»ù×¼£©£¬£¬£¬£¬»ñµÃÃÜÔ¿ÐèÒªÔ¼14·ÖÖÓµÄʱ¼ä¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://blog.talosintelligence.com/2018/06/ThanatosDecryptor.html
¡¾ÆÊÎö±¨¸æ¡¿Ñо¿ÍŶÓÐû²¼¹ØÓÚ¹ã¸æÈí¼þPbotµÄбäÌåµÄÆÊÎö±¨¸æ
¿¨°Í˹»ùʵÑéÊÒ·¢Ã÷¹ã¸æÈí¼þPBot£¨PythonBot£©µÄбäÌ壬£¬£¬£¬¸Ã±äÌåÊÔͼÔÚÓû§µÄä¯ÀÀÆ÷ÉÏ×°ÖÃ¹ã¸æ²å¼þ£¬£¬£¬£¬ÕâЩ²å¼þ»áÔÚÍøÒ³ÉÏÌí¼ÓÖÖÖÖ¹ã¸æ£¬£¬£¬£¬²¢½«Óû§Öض¨Ïòµ½¹ã¸æÍøÕ¾¡£¡£¡£¡£¡£¡£¡£PBotµÄ¿ª·¢Ö°Ô±Ò»Ö±Ðû²¼¸Ã±äÌåµÄа汾£¬£¬£¬£¬Ã¿¸ö°æ±¾¶¼»áʹ¾ç±¾»ìÏý±äµÃÔ½·¢Öش󡣡£¡£¡£¡£¡£¡£ÔÚ4Ô·ݿ¨°Í˹»ù¼ì²âµ½Áè¼Ý5Íò´Î×°ÖÃPBotµÄʵÑ飬£¬£¬£¬ÔÚ5Ô·ÝÕâÒ»Êý×ÖÉõÖÁ»¹ÔÚÔöÌí¡£¡£¡£¡£¡£¡£¡£PBotÖ÷ÒªÕë¶Ô¶íÂÞ˹¡¢ÎÚ¿ËÀ¼ºÍ¹þÈø¿Ë˹̹µÄÓû§¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securelist.com/pbot-evolving-adware/86242/
¡¾Çå¾²Îó²î¡¿Ñо¿Ö°Ô±³ÆJolokiaµÄ¹ýʧÉèÖÿÉÄܵ¼ÖÂÐÅϢй¶»òDoS
Çå¾²Ñо¿Ö°Ô±Mat Mannion·¢Ã÷Jolokia Java Management Extensions£¨JMX£©±£´æÒ»Ð©Çå¾²Îó²î£¬£¬£¬£¬¿ÉÄܵ¼Ö¾ܾøÐ§ÀÍ¡¢ÐÅϢй¶µÈÕë¶ÔJava WebЧÀÍÆ÷µÄDZÔÚ¹¥»÷¡£¡£¡£¡£¡£¡£¡£Mannion³ÆJolokiaµÄĬÈÏÉèÖò¢²»Çå¾²£¬£¬£¬£¬Ã»ÓоÙÐÐÊʵ±ÉèÖõÄJolokia¿ÉÄܸøÍøÕ¾´øÀ´Î£º¦£¬£¬£¬£¬ÉõÖÁ°üÀ¨Ò»Ð©½ðÈÚ»ú¹¹µÄÍøÕ¾¡£¡£¡£¡£¡£¡£¡£Mannion»¹Ðû²¼ÁËÕë¶ÔApache Tomcat 8µÄPoC¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://matmannion.com/jolokiapwn/