²¿·ÖOutLookÕÊ»§ÐÅϢй¶£»£»£»£»Ð¶ñÒâÈí¼þ¿É¸Ä¶¯CATºÍMRIɨÃèÒǵÄÒ½ÁÆÉ¨ÃèЧ¹û

Ðû²¼Ê±¼ä 2019-04-15
1.΢ÈíÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¿·ÖÓû§µÄOutLookÕÊ»§ÐÅϢй¶


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


΢Èí֤ʵ1ÔÂ1ÈÕÖÁ3ÔÂ29ÈÕʱ´ú¹¥»÷ÕßÈëÇÖÁËÒ»¸ö¿Í»§Ö§³ÖÊðÀíÕË»§£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓøÃÕË»§»á¼ûÁ˿ͻ§Ö§³ÖÃÅ»§ÍøÕ¾¼°²¿·ÖOutLookÓû§µÄÏà¹ØÐÅÏ¢¡£¡£¡£¡£¡£ÕâЩÐÅÏ¢°üÀ¨µç×ÓÓʼþµØµã¡¢Îļþ¼ÐÃû³Æ¡¢ÓʼþÖ÷Ìâ¼°ÁªÏµÈ˵ç×ÓÓʼþµØµã£¬£¬£¬£¬£¬£¬£¬µ«²»°üÀ¨Óʼþ¼°¸½¼þµÄÄÚÈÝ¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷µÄÏêϸϸ½Ú£¬£¬£¬£¬£¬£¬£¬µ«Î¢ÈíÌåÏÖÒѾ­½ûÓÃÁ˸ÃÊðÀíÕË»§µÄƾ֤£¬£¬£¬£¬£¬£¬£¬²¢Í¨ÖªËùÓÐÊÜÓ°ÏìµÄÓû§¡£¡£¡£¡£¡£Î¢ÈíҲûÓÐ͸¶ÊÜÓ°ÏìµÄÓû§×ÜÊý¡£¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/04/microsoft-outlook-email-hack.html


2.°®´ïºÉÖÝÀ¶Ê®×Ö»á¹ÙÍøÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬²¿·ÖÓû§µÄСÎÒ˽¼ÒÐÅϢй¶

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


°®´ïºÉÖÝÀ¶Ê®×Ö»áµÄµçÉÌÍøÕ¾ÓÚ3ÔÂ21ÈÕÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÊÔͼÌᳫڲƭÐÔµÄÉúÒ⣬£¬£¬£¬£¬£¬£¬µ«Ã»ÓÐÀֳɡ£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹»á¼ûÁ˰üÀ¨Óû§PHIÐÅÏ¢µÄ»ã¿îÎļþ£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨Óû§µÄÐÕÃû¡¢¹ÒºÅ/¶©ÔĺÅÂ롢ЧÀÍÈÕÆÚ¡¢Ò½ÁÆÐ§ÀÍÌṩÕßµÄÃû×Ö¡¢»¼ÕßÕ˺𢏶¿îÐÅÏ¢µÈ£¬£¬£¬£¬£¬£¬£¬µ«²»°üÀ¨Éç»áÇå¾²ºÅÂë¡¢¼ÝÕÕID¼°ÐÅÓÿ¨ºÅÂë¡£¡£¡£¡£¡£Æ¾Ö¤ÊÓ²ìЧ¹û£¬£¬£¬£¬£¬£¬£¬À¶Ê®×Ö»áÒÔΪ¹¥»÷Õß»á¼ûÁËÔ¼1%µÄÓû§ÐÅÏ¢¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/blue-cross-of-idaho-notice-of-privacy-breach/


3.ºÚ¿ÍÍÅ»ïÔÚÍøÉÏÐû²¼ÊýǧÃûÃÀ¹ú¾¯Ô±ºÍÁª°îÌØ¹¤µÄСÎÒ˽¼ÒÊý¾Ý

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

¾ÝÍâýTechcrunch±¨µÀ£¬£¬£¬£¬£¬£¬£¬Ò»¸öºÚ¿ÍÍÅ»ïÉù³ÆÈëÇÖÁËÊýÊ®¸öFBIÁ¥ÊôÍøÕ¾£¬£¬£¬£¬£¬£¬£¬²¢ÇÔÈ¡ÁËÊôÓÚÃÀ¹úÁª°î»ú¹¹ºÍ¹«¹²Ð§ÀÍ×éÖ¯Ô±¹¤µÄÁè¼ÝÒ»°ÙÍòÌõÊý¾Ý¡£¡£¡£¡£¡£¸ÃÍÅ»ïÔÚÍøÉÏÐû²¼ÁËÊýÊ®¸öÎļþ£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Ô¼4000ÃûÃÀ¹ú¾¯Ô±ºÍÁª°îÌØ¹¤µÄÏêϸСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÕâЩÐÅÏ¢°üÀ¨ÐÕÃû¡¢Ð¡ÎÒ˽¼ÒºÍÕþ¸®ÓÊÏ䵨µã¡¢Ö°Î»¡¢µç»°ºÅÂëºÍÓÊÕþµØµã¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/83763/data-breach/fbi-affiliated-websites-hack.html


4.ÃÀ¹ú¸ñÁÖά¶ûÊÐÔâÐÂÀÕË÷Èí¼þRobbinHood¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÊÂÎñÈÔÔÚÊÓ²ì

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÐÂÀÕË÷Èí¼þRobbinHoodÕýÔÚÆð¾¢¾ÙÐй¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÉÐÎ´ÍøÂçµ½RobbinHoodµÄÑù±¾£¬£¬£¬£¬£¬£¬£¬µ«ÒÑÓжàÃûÊܺ¦ÕßÖÐÕС£¡£¡£¡£¡£RobbinHoodµÄÊê½ðÊÇÿ̨ÅÌËã»ú3±ÈÌØ±Ò»òÕû¸öÍøÂç7±ÈÌØ±Ò£¬£¬£¬£¬£¬£¬£¬²¢ÔÚµÚËÄÌìÖ®ºóÊê½ðÖðÈÕÔöÌí1ÍòÃÀÔª¡£¡£¡£¡£¡£ÔÚRobbinHoodµÄTorÖ§¸¶Ò³ÃæÉÏ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÇ¿µ÷ËûÃÇÊ®·ÖÌåÌùÊܺ¦ÕßµÄÒþ˽£¬£¬£¬£¬£¬£¬£¬²¢½«ÔÚÊܺ¦Õ߸¶¿îºóɾ³ýÏà¹Ø¼Í¼£¬£¬£¬£¬£¬£¬£¬°üÀ¨¼ÓÃÜÃÜÔ¿ºÍIPµØµã¡£¡£¡£¡£¡£Ã½Ì屨µÀ³Æ±±¿¨ÂÞÀ´ÄÉÖݵĸñÁÖά¶ûÊÐÔâµ½RobbinHood¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ïà¹ØÖ´·¨»ú¹¹ÕýÔÚ¾ÙÐÐÊӲ졣¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/robbinhood-ransomware-claims-its-protecting-your-privacy/


5.д¹ÂڻThe Nasty List£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÇÔÈ¡InstagramÓû§Æ¾Ö¤

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


еĴ¹ÂÚȦÌס°The Nasty List¡±£¨ÁîÈËÑá¶ñµÄÃûµ¥£©ÕýÔÚInstagramÉÏÈö²¥£¬£¬£¬£¬£¬£¬£¬Ö÷ÒªÇÔÈ¡Óû§µÄµÇ¼ƾ֤¡£¡£¡£¡£¡£¸Ã´¹ÂÚÐÅÏ¢Éù³ÆÄ¿µÄÓû§»òÓû§µÄÅóÙ­´¦ÓÚÒ»¸öÁîÈËÑá¶ñµÄÃûµ¥ÉÏ£¬£¬£¬£¬£¬£¬£¬²¢°üÀ¨Ãûµ¥ÏêϸÐÅÏ¢µÄÁ´½Ó£¬£¬£¬£¬£¬£¬£¬µ«¸ÃÁ´½ÓÖ¸ÏòÒ»¸öαÔìµÄInstagramµÇÂ¼Ò³Ãæ£¬£¬£¬£¬£¬£¬£¬×Åʵ¼ÊÓòÃûΪnastylist-instatop50[.]me¡£¡£¡£¡£¡£Ò»µ©Óû§ÊäÈëÆ¾Ö¤£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß½«Ê¹ÓÃËûÃǵÄÕË»§½øÒ»²½Èö²¥¸ÃȦÌס£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/the-nasty-list-phishing-scam-is-sweeping-through-instagram/


6.жñÒâÈí¼þ¿É¸Ä¶¯CATºÍMRIɨÃèÒǵÄÒ½ÁÆÉ¨ÃèЧ¹û

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Ben-Gurion´óѧµÄÒ»¸öÑо¿ÍŶÓÑÝʾÁËÒ»ÖÖÄܹ»¸Ä¶¯Ò½ÁÆÉ¨ÃèЧ¹ûµÄжñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬ÕâÖÖ¶ñÒâÈí¼þ¿É¸Ä¶¯É¨Ãè³öµÄÒ½ÁÆÍ¼Ïñ£¬£¬£¬£¬£¬£¬£¬½«Ö×ÁöÌí¼Óµ½Í¼ÏñÖлòÊÇ´ÓͼÏñÖÐÒÆ³ýÖ×Áö£¬£¬£¬£¬£¬£¬£¬ÒÔÎóµ¼Ò½ÉúµÄÕïÖÎЧ¹û¡£¡£¡£¡£¡£Ñо¿Ö°Ô±²âÊÔÁË70ÕÅͼÏñ£¬£¬£¬£¬£¬£¬£¬ÀÖ³ÉÓÕÆ­ÁËÈýÃû·ÅÉä¿ÆÒ½ÉúºÍÒ½ÔºµÄ×Ô¶¯É¸Ñ¡ÏµÍ³¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆÕâÖÖ¹¥»÷µÄÔµ¹ÊÔ­ÓÉÊÇÒ½ÁÆ×°±¸µÄÇå¾²²½·¥È±·¦£¬£¬£¬£¬£¬£¬£¬ÀýÈçȱÉÙ¶ÔͼÏñµÄÊðÃûºÍ¼ÓÃÜ¡£¡£¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.pandasecurity.com/mediacenter/news/new-malware-healthcare-sector/