¡¾ÍþвÇ鱨¡¿Çå¾²Ñо¿Ö°Ô±·¢Ã÷VIA C3 x86´¦Öóͷ£Æ÷±£´æºóÃÅ»úÖÆ
Çå¾²Ñо¿Ö°Ô±Christopher Domas·¢Ã÷VIA C3 x86´¦Öóͷ£Æ÷Öб£´æºóÃÅ»úÖÆ£¬£¬£¬£¬£¬£¬£¬¿ÉÔÊÐí¹¥»÷Õß´ÓÓû§Ä£Ê½ÌáȨµ½OSÄÚºËģʽ¡£¡£¡£¡£¡£¸Ã´¦Öóͷ£Æ÷ÊÇÓĘ́ÍåVIA Technologies IncÓÚ2001ÄêÖÁ2003Äê¼äÉú²úºÍÏúÊÛµÄCPUϵÁУ¬£¬£¬£¬£¬£¬£¬³£°²ÅÅÔÚPOS»ú¡¢ÖÇÄܵ绰ͤ¡¢ATM¡¢ÓÎÏ·×°±¸¡¢Ò½ÁÆ×°±¸ÒÔ¼°¹¤Òµ×Ô¶¯»¯×°±¸ÉÏ¡£¡£¡£¡£¡£Domas½«¸ÃºóÃÅ»úÖÆ³ÆÎªRosenbridge£¬£¬£¬£¬£¬£¬£¬µ«Ò²ÓÐÑо¿Ö°Ô±ÒÔΪ¸Ã»úÖÆ²¢²»ÊÇÒ»¸öÕæÕýµÄºóÃÅ£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚVIA¹Ù·½ÎĵµÔøÌáµ½¸Ã»úÖÆ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/backdoor-mechanism-discovered-in-via-c3-x86-processors/
¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶÓÌá³öÕë¶ÔAndroid appµÄÐÂÐÍMan-in-the-Disk¹¥»÷
Check PointÑо¿ÍŶӷ¢Ã÷Android appµÄй¥»÷Ãæ£¬£¬£¬£¬£¬£¬£¬ÕâÖÖÃûΪMan-in-the-DiskµÄ¹¥»÷³¡¾°ÔÊÐí¹¥»÷Õß»á¼ûºÍ¸Ä¶¯Íⲿ´æ´¢ÉϵÄÊý¾Ý¡£¡£¡£¡£¡£Man-in-the-Disk¹¥»÷»ùÓÚÁ½¸öÊÂʵ£¬£¬£¬£¬£¬£¬£¬Ê×ÏÈ£¬£¬£¬£¬£¬£¬£¬ÈκÎÓ¦Óö¼¿ÉÒԸ͝ÆäËüÓ¦ÓõÄÍⲿ´æ´¢Êý¾Ý£¬£¬£¬£¬£¬£¬£¬Æä´Î£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÏÕЩËùÓÐapp¶¼ÒªÇó´ËȨÏÞ£¬£¬£¬£¬£¬£¬£¬Óû§Í¨³£»£»£»£»£»£»á²»¼ÓÏÓÒɵظøÓè´ËȨÏÞ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖËûÃÇ¿ÉÒÔÖ´ÐÐÁ½ÖÖÀàÐ͵Ĺ¥»÷£¬£¬£¬£¬£¬£¬£¬Ê¹ÆäËüapp±ÀÀ£»£»£»£»£»£»ò½«ÆäËüapp¸üÐÂΪ¶ñÒâ°æ±¾¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://blog.checkpoint.com/2018/08/12/man-in-the-disk-a-new-attack-surface-for-android-apps/
¡¾Îó²î²¹¶¡¡¿Oracle¿ª·¢ÍŶÓÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¸ßΣÎó²î£¨CVE-2018-3110£©
OracleÐÞ¸´ÆäÊý¾Ý¿â²úÆ·ÖеÄÒ»¸ö¸ßΣÎó²î£¨CVE-2018-3110£©£¬£¬£¬£¬£¬£¬£¬¾ÓÉÔ¶³ÌÉí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉʹÓøÃÎó²î½ÓÊÜÊý¾Ý¿â²¢½¨Éè¶Ôµ×²ãЧÀÍÆ÷µÄshell»á¼û¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚOracle Database ServerµÄJava VM×é¼þÖУ¬£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨WindowsÉϵÄ11.2.0.4¡¢12.2.0.1ºÍ12.1.0.2ÒÔ¼°Unix»òLinuxÉϵÄ12.1.0.2¡£¡£¡£¡£¡£½¨ÒéÓû§¾¡¿ì¾ÙÐиüС£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75310/hacking/cve-2018-3110-oracle-database.html
¡¾Îó²î²¹¶¡¡¿Ñо¿Ö°Ô±Åû¶macOSÖеÄÐÂ0 day£¬£¬£¬£¬£¬£¬£¬¿Éͨ¹ýÄ£ÄâÊó±êµã»÷¼ÓÔØÄÚºËÀ©Õ¹
Digita SecurityÑо¿Ö°Ô±Patrick Wardle·¢Ã÷macOSÖеÄÒ»¸öÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÄ£ÄâÊó±êµã»÷ÈÆ¹ýϵͳµÄÇå¾²»úÖÆ£¬£¬£¬£¬£¬£¬£¬¼ÓÔØÏµÍ³ÄÚºËÀ©Õ¹¡£¡£¡£¡£¡£Æ»¹ûÔÚHigh SierraÖÐÍÆ³ö¡°Óû§Åú×¼ÄÚºËÀ©Õ¹¼ÓÔØ¡±µÄÈ«ÐÂÇå¾²¹¦Ð§À´ÔöÇ¿macOSµÄÇå¾²ÐÔ£¬£¬£¬£¬£¬£¬£¬¸Ã¹¦Ð§ÒªÇóÓû§ÔÚÇå¾²ÉèÖýçÃæÊÖ¶¯µã»÷¡°ÔÊÐí¡±°´Å¥À´Åú×¼¼ÓÔØÈκÎÄÚºËÀ©Õ¹¡£¡£¡£¡£¡£µ«Patrick·¢Ã÷Á½´Î¡°°´Ï¡±Êó±ê°´Å¥µÄÊÂÎñ»á±»ÏµÍ³Îóʶ±ðΪ¡°°´Ï¡±ºÍ¡°ËÉ¿ª¡±ÕâÒ»ÍêÕûµÄµã»÷²Ù×÷£¬£¬£¬£¬£¬£¬£¬´Ó¶øÍ»ÆÆÆäÇå¾²»úÖÆ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75293/hacking/synthetic-mouse-click-attack.html
¡¾Îó²î²¹¶¡¡¿Ë¼¿ÆÐû²¼IOSºÍIOS XEµÄÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Õë¶ÔIKEÐÒéµÄÎó²î
˼¿ÆÐÞ¸´ÁËÆäIOSºÍIOS XEÖеÄÇå¾²Îó²î£¨CVE-2018-0131£©£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÊÇÕë¶ÔIKE£¨InternetÃÜÔ¿½»Á÷£©ÐÒéµÄÐÂBleichenbacher oracle¼ÓÃܹ¥»÷µÄËĸöÎó²îÖ®Ò»£¬£¬£¬£¬£¬£¬£¬ÆäÓàÈý¸öÎó²îÊÇ»ªÎª£¨CVE-2017-17305£©¡¢Clavister£¨CVE-2018-8753£©ºÍZyXEL£¨CVE-2018-9129£©¡£¡£¡£¡£¡£Æ¾Ö¤Ë¼¿ÆµÄ˵·¨£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß»ñÈ¡IKEv1»á»°µÄ¼ÓÃÜËæ»úÊý£¬£¬£¬£¬£¬£¬£¬½ø¶ø»Ö¸´Í¨¹ýIPsec·¢Ë͵ÄÊý¾Ý¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/cisco-patches-its-operating-systems-against-new-ike-crypto-attack/
¡¾¶ñÒâÈí¼þ¡¿Çå¾²Ñо¿ÍŶÓÐû²¼¹ØÓÚÀÕË÷Èí¼þKeyPassµÄÆÊÎö±¨¸æ
¿¨°Í˹»ùʵÑéÊÒÐû²¼¹ØÓÚÀÕË÷Èí¼þKeyPassµÄÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬£¬¸ÃÀÕË÷Èí¼þÔÚ8ÔÂ·ÝÆð¾¢¾ÙÐÐÈö²¥¡£¡£¡£¡£¡£¸ÃÑù±¾Ê¹ÓÃC++±àд£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýMS Visual Studio¾ÙÐбàÒ룬£¬£¬£¬£¬£¬£¬ÆäʹÓÃÁËÀà¿âMFC¡¢BoostºÍCrypto ++£¬£¬£¬£¬£¬£¬£¬Ñù±¾µÄPEÍ·ÖаüÀ¨ÁË×î½üµÄ±àÒëÈÕÆÚ¡£¡£¡£¡£¡£Ã¿Ò»¸ö¼ÓÃܵÄÎļþ¶¼»á±»Ìí¼Ó.KEYPASSÀ©Õ¹Ãû¡£¡£¡£¡£¡£Æä¼ÓÃÜËã·¨ÊÇAES-256£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃCFBģʽ²¢ÇÒIVΪ0£¬£¬£¬£¬£¬£¬£¬ËùÓÐÎļþµÄ¼ÓÃÜÃÜÔ¿¶¼ÎªÏàͬµÄ32×Ö½ÚÃÜÔ¿¡£¡£¡£¡£¡£ÆäÓëC£¦CЧÀÍÆ÷µÄͨѶÊÇͨ¹ýHTTPÒÔJSONµÄÐÎʽ´«ÊäµÄ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securelist.com/keypass-ransomware/87412/