¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181107
Ðû²¼Ê±¼ä 2018-11-07
¿¨°Í˹»ùʵÑéÊÒÐû²¼2018ÄêµÚÈý¼¾¶ÈÀ¬»øÓʼþºÍÍøÂç´¹ÂڻµÄÇ÷ÊÆÆÊÎö±¨¸æ¡£¡£¡£ÔÚ2018ÄêQ3£¬£¬£¬£¬£¬£¬À¬»øÓʼþռȫÇòÓʼþ×ÜÁ¿ÖеıÈÀýÔöÌíÁË2.88¸ö°Ù·Öµã£¬£¬£¬£¬£¬£¬´ï52.54%¡£¡£¡£·´´¹ÂÚϵ×ܹ²×èÖ¹ÁËÁè¼Ý1.37ÒÚ¸öÌø×ªÖÁ´¹ÂÚÍøÕ¾µÄÖØ¶¨Ïò£¬£¬£¬£¬£¬£¬±ÈÉÏÒ»¼¾¶ÈÔöÌíÁË3000Íò¡£¡£¡£À¬»øÓʼþºÍ´¹Âڻ¼ÌÐøÊ¹Óñ¾¼¾¶ÈµÄÖØ´óÐÂÎű¨µÀÀ´Èö²¥£¬£¬£¬£¬£¬£¬ÀýÈçÐÂiPhoneµÄÐû²¼¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/spam-and-phishing-in-q3-2018/88686/2¡¢Ñо¿ÍŶӷ¢Ã÷ʹÓÃÐéαTelegram¼àÊÓÒÁÀÊÓû§µÄ¶ñÒâ»î¶¯
˼¿ÆTalosÅû¶ÁËÒÁÀʵÄһЩÓɹú¼Ò×ÊÖúµÄ¶ñÒâ»î¶¯£¬£¬£¬£¬£¬£¬ÕâЩ»î¶¯×Ô2017ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬£¬Ö÷ÒªÓÃÓÚ¼àÊÓÒÁÀʵÄÔ¼4000ÍòTelegramÓû§£¨ËäÈ»¸ÃÓ¦ÓÃÏÖʵÉÏÔڸùú±»Õ¥È¡Ê¹Óã©¡£¡£¡£Talos³ÆÕâЩ»î¶¯µÄÖØ´óÐÔ¡¢×ÊÔ´ÐèÇóºÍÒªÁì¸÷²»Ïàͬ£¬£¬£¬£¬£¬£¬µ«Ö÷ҪʹÓÃÁËÈý¸öÔØÌ壺ÐéαӦÓᢴ¹ÂÚµÇÂ¼Ò³ÃæºÍBGPÐ®ÖÆ¡£¡£¡£ÕâЩÐéαTelegram¡°¿Ë¡Ì塱Ӧ¸Ã±»¹éÀàΪ»ÒÉ«Èí¼þ»òDZÔÚÓꦵÄÈí¼þ£¨PUP£©¡£¡£¡£ËäÈ»ÕâЩ¶ñÒâ»î¶¯¶¼Õë¶ÔÒÁÀÊ£¬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±²¢Î´·¢Ã÷ËüÃÇÖ®¼ä±£´æÁªÏµ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2018/11/persian-stalker.html3¡¢·¸·¨ÍÅ»ïInceptionʹÓÃÐÂPowerShellºóÃÅÃé׼ŷÖÞ
Palo Alto NetworksµÄUnit42Ðû²¼¹ØÓÚ·¸·¨ÍÅ»ïInceptionµÄй¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£InceptionÖÁÉÙ×Ô2014ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÔøÔÚ2017ÄêÕë¶ÔÅ·ÖÞ¡¢¶íÂÞ˹ºÍÖÐÑǵØÇøµÄÕþ¸®»ú¹¹Ìᳫ¹¥»÷¡£¡£¡£Unit42ÊӲ쵽¸Ã×éÖ¯ÔÚ2018Äê10ÔÂʹÓÃOfficeÎó²îCVE-2017-11882ºÍÒ»¸öеÄPowerShellºóÃÅÕë¶ÔÅ·ÖÞµÄÄ¿µÄÌᳫ¹¥»÷¡£¡£¡£¸ÃºóÃű»³ÆÎªPOWERSHOWER£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚÍøÂçϵͳÐÅÏ¢²¢ÉÏ´«ÖÁC2ЧÀÍÆ÷ÒÔ¼°É¨³ýÖ¤¾Ý£¬£¬£¬£¬£¬£¬»¹¿ÉÓÃÓÚÖ´ÐÐÆäËüpayload¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://researchcenter.paloaltonetworks.com/2018/11/unit42-inception-attackers-target-europe-year-old-office-vulnerability/4¡¢Ñо¿Ö°Ô±·¢Ã÷¶à¿î×Ô¼ÓÃÜSSD±£´æÎó²î£¬£¬£¬£¬£¬£¬¿ÉÔÊÐí¹¥»÷Õß½âÃÜÓû§Êý¾Ý
ºÉÀ¼Radboud´óѧµÄÑо¿Ö°Ô±Carlo MeijerºÍBernard van Gastel·¢Ã÷¶à¿îÊ¢ÐеÄ×Ô¼ÓÃÜSSD±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬¿ÉÔÊÐí¹¥»÷Õß½âÃÜ´ÅÅ̺ͻñÈ¡Óû§Êý¾Ý¡£¡£¡£ÊÜÓ°ÏìµÄ²úÆ·°üÀ¨CrucialµÄCruces MX100ºÍÈýÐǵÄ850 EVOµÈ¡£¡£¡£CrucialÒѾΪÆäËùÓÐÊÜÓ°ÏìµÄSSDÐû²¼Á˹̼þ²¹¶¡£¬£¬£¬£¬£¬£¬µ«ÈýÐÇֻΪT3ºÍT5±ãЯʽSSDÐû²¼ÁËÐÞ¸´²¹¶¡£¬£¬£¬£¬£¬£¬²¢½¨ÒéEVOÓû§Ê¹ÓÃÓëϵͳ¼æÈݵļÓÃÜÈí¼þ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/11/self-encrypting-ssd-hacking.html5¡¢GoogleÐû²¼11ÔÂAndroidÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸öÎó²î
GoogleÔÚ11Ô·ݵÄAndroidÇå¾²¸üÐÂÖÐÐÞ¸´ÁË36¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬±ðµÄÉÐÓÐ17¸öÎó²îÓëQualcomm×é¼þÓйء£¡£¡£½ÏÑÏÖØµÄÎó²î°üÀ¨Ó°ÏìAndroid 7.0+µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2018-9527£©ºÍÓ°Ïì9.0µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2018-9531ºÍCVE-2018-9521£©¡£¡£¡£ÓÉÓÚÔÚLibxaac¿âÖз¢Ã÷´ó×ÚÇå¾²Îó²î£¬£¬£¬£¬£¬£¬Òò´ËGoogleÒѽ«¸Ã¿â±ê¼ÇΪʵÑéÐÔ²¢ÇÒ²»»á½«¸Ã¿â°üÀ¨ÔÚÈκÎAndroidÉú²ú°æ±¾ÖС£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬11ÔµÄÇå¾²¸üнöÊÊÓÃÓÚAndroid7.0+µÄ°æ±¾£¬£¬£¬£¬£¬£¬»»¾ä»°Ëµ£¬£¬£¬£¬£¬£¬Android 6.x½«²»ÔÙ»ñµÃGoogleµÄÖ§³Ö¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://source.android.com/security/bulletin/2018-11-01.html6¡¢Akado TelecomÒâÍâй¶ÊýǧÃû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢
¾Ý·͸É籨µÀ£¬£¬£¬£¬£¬£¬¶íÂÞ˹ISP Akado TelecomÒâÍâµØ½«ÊýǧÃû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢ÉÏ´«ÖÁRIPE NCCµÄЧÀÍÆ÷£¬£¬£¬£¬£¬£¬ÕâЩй¶µÄСÎÒ˽¼ÒÐÅÏ¢£¨PII£©Öл¹°üÀ¨Ò»Ð©¶íÂÞ˹Õþ¸®¹ÙÔ±ºÍ¶íÂÞ˹ÃûÈË¡¢ÒøÐÐÊÂÇéÖ°Ô±µÄµØµãºÍµç»°ºÅÂëµÈ¡£¡£¡£RIPE NCCÊÇÅ·ÖÞ¡¢Öж«ºÍÖÐÑDz¿·ÖµØÇøµÄ·ÇÓªÀûÐÔÇøÓò»¥ÁªÍø×¢²á»ú¹¹£¬£¬£¬£¬£¬£¬ÆäÊý¾Ý¿âÊǿɹûÕæ»á¼ûµÄ¡£¡£¡£Akado TelecomÌåÏÖÒѾÆô¶¯ÁËÒ»Ïî¹ØÓÚ´ËÊÂÎñµÄÄÚ²¿ÊӲ졣¡£¡£
ÔÎÄÁ´½Ó£º
https://news.softpedia.com/news/akado-telecom-accidentally-leaks-customers-names-phone-numbers-and-addresses-523617.shtmlÉùÃ÷£º±¾×ÊѶÓÉ¿·¢k8άËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ