1¡¢IBMºÍPonemon InstituteÁªºÏÐû²¼2019ÄêÊý¾Ýй¶±¾Ç®µ÷Ñб¨¸æ
ƾ֤IBMºÍPonemon InstituteÁªºÏÐû²¼µÄ2019Äê¶ÈÊý¾Ýй¶±¾Ç®µ÷Ñб¨¸æ£¬£¬£¬£¬£¬£¬£¬2019ÄêÊý¾Ýй¶µÄÈ«Çòƽ¾ù±¾Ç®Îª392ÍòÃÀÔª£¬£¬£¬£¬£¬£¬£¬±È2018ÄêÔöÌíÁË1.5£¥¡£¡£¡£2014ÄêµÄÊý×ÖÊÇ350ÍòÃÀÔª£¬£¬£¬£¬£¬£¬£¬2014ÖÁ2019Äêʱ´ú¹²ÔöÌíÁË12%¡£¡£¡£ÕâÒ»Êý×Ö×î¸ßµÄ¹ú¼ÒÊÇÃÀ¹ú£¬£¬£¬£¬£¬£¬£¬´ï819ÍòÃÀÔª£¬£¬£¬£¬£¬£¬£¬ÊÇÈ«Çòƽ¾ùˮƽµÄÁ½±¶¶à¡£¡£¡£Êý¾Ýй¶±¾Ç®×î¸ßµÄÐÐÒµÊÇÒ½ÁƱ£½¡£¬£¬£¬£¬£¬£¬£¬¸ÃÐÐÒµ2019ÄêµÄƽ¾ùÊý×ÖÊÇ645ÍòÃÀÔª¡£¡£¡£¸Ã±¨¸æº¸ÇÁË2018Äê7ÔÂÖÁ2019Äê4ÔÂʱ´ú16¸ö¹ú¼ÒºÍµØÇøÄÚµÄ17¸öÐÐÒµµÄ507ÆðÊý¾Ýй¶ÊÂÎñ¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityintelligence.com/posts/whats-new-in-the-2019-cost-of-a-data-breach-report/
2¡¢ÐÂP2PÈ䳿²¡¶¾Crypto-MinersÔÚÒ°ÍâÆð¾¢Èö²¥
Yoroi-Cybaze Z-LabÑо¿Ö°Ô±·¢Ã÷Ò»ÖÖÔÚÒ°ÍâÈö²¥Crypto-MinersµÄP2PÈ䳿²¡¶¾¡£¡£¡£¸Ã¶ñÒâÈí¼þαװ³ÉÖøÃû¸èÊֵijªÆ¬ºÏ¼¯£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃP2P¹²ÏíÍøÂç¾ÙÐÐÈö²¥¡£¡£¡£´ÓBitTorrentÍøÂçÏÂÔØµÄÎļþÊÇÒ»¸ö°üÀ¨ÆäËü¼¸¸öÎļþµÄSFXÎĵµ£¬£¬£¬£¬£¬£¬£¬ÕâÖÖÎĵµÔÊÐí¹¥»÷ÕßÒþ²Ø¶ñÒâµÄPEÄÚÈݲ¢ÏÔÖø½µµÍɱ¶¾ÒýÇæµÄ¼ì²âÂÊ¡£¡£¡£×îÖÕµÄpayloadÊÇÒ»¸öÍÚ¿óÈí¼þ£¬£¬£¬£¬£¬£¬£¬µ«¹¥»÷ÕßÒ²¿ÉÄܻὫÆäÌæ»»ÎªRAT»òÀÕË÷²¡¶¾¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/88795/malware/p2p-worm-spreading-crypto-miners.html
3¡¢ºÚ¿ÍʹÓýüÆÚWordPress²å¼þÖеÄXSSÎó²îÈö²¥¶ñÒâ¹ã¸æ
WordfenceÑо¿ÍŶӷ¢Ã÷Ò»¸öÕýÔÚ¾ÙÐеĶñÒâ¹ã¸æ»î¶¯£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃWordPress²å¼þComing Soon Page&Maintenance ModeÖеÄXSSÎó²î£¬£¬£¬£¬£¬£¬£¬ÏòÓû§ÍÆËͶñÒâ¹ã¸æ¡£¡£¡£ÕâЩ¶ñÒâ¹ã¸æ½«Óû§Öض¨ÏòÖÁÊÖÒÕÖ§³ÖÕ©Æ¡¢¶ñÒâAPKÏÂÔØºÍÒ©Æ·¹ã¸æµÈ¶ñÒâÍøÕ¾¡£¡£¡£¸Ã²å¼þÖеÄÎó²îÊÇÒ»¸ö´æ´¢ÐÍXSSÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß×¢Èë¶ñÒâJavaScript»òHTML´úÂë¡£¡£¡£¸Ã²å¼þµÄ1.7.8¼°¸üµÍ°æ±¾Êܵ½Ó°Ï죬£¬£¬£¬£¬£¬£¬²å¼þµÄ×îа汾ÒÑÐÞ¸´ÁËÕâ¸öÎó²î¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/hackers-exploit-recent-wordpress-plugin-bugs-for-malvertising/
4¡¢Ñо¿ÍŶÓÅû¶Comodo AntivirusÖеĶà¸öÇå¾²Îó²î
TenableÅû¶Comodo Antivirus/Comodo Antivirus AdvancedÖеĶà¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÍâµØÌáȨÎó²î£¨CVE-2019-3969£©¡¢í§ÒâÎļþдÈëÎó²î£¨CVE-2019-3970£©¡¢¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2019-3971£©¡¢Ô½½ç¶ÁÎó²î£¨CVE-2019-3972£©ÒÔ¼°Ô½½çдÎó²î£¨CVE-2019-3973£©¡£¡£¡£ÕâЩÎó²îÓ°ÏìÁËComodo Antivirus°æ±¾12.0.0.6810£¬£¬£¬£¬£¬£¬£¬µ«CVE-2019-3973Ö»Ó°ÏìÁË11.0.0.6582¼°Ö®Ç°µÄ°æ±¾¡£¡£¡£Ñо¿Ö°Ô±ÔÚgithubÉÏÐû²¼ÁËÏà¹ØPoC¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.tenable.com/security/research/tra-2019-34
5¡¢ÃÀ¹ú¹ú¼ÒÇå¾²¾ÖÍýÏ뽨ÉèÐÂÍøÂçÇå¾²ÀíÊ»á
7ÔÂ23ÈÕÃÀ¹ú¹ú¼ÒÇå¾²¾Ö£¨NSA£©Ðû²¼ÍýÏ뽨ÉèÒ»¸öеÄÍøÂçÇå¾²·ÀÓù²¿·Ö£¬£¬£¬£¬£¬£¬£¬¸Ã²¿·Ö½«×¨×¢ÓÚ±£»£»£»£»£»¤ÃÀ¹úÃâÊÜÍâ¹úµÄÍøÂçÍþв¡£¡£¡£Ð²¿·Ö±»ÃüÃûÎªÍøÂçÇå¾²ÀíÊ»ᣨCybersecurity Directorate£©£¬£¬£¬£¬£¬£¬£¬½«ÓÚ10ÔÂ1ÈÕ×îÏÈÔËÓª¡£¡£¡£Æ¾Ö¤NSAµÄ˵·¨£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²ÀíÊ»áµÄ½ÇÉ«½«ÊǸÄÉÆÃÀ¹úÔÚº£ÄÚµÄÍøÂçÇå¾²Ì¬ÊÆ£¬£¬£¬£¬£¬£¬£¬ËüµÄÒ»ÏîÖ÷ÒªÊÂÇ齫ÊÇÇ鱨¹²ÏíºÍÎó²îÆÀ¹À¡£¡£¡£Anne Neuberger½«³ÉΪ¸Ã²¿·ÖµÄµÚÒ»Î»ÍøÂçÇå¾²×ܼࡣ¡£¡£Ëý½«Ö±½ÓÏòNSA¾Ö³¤Paul Nakasone½«¾ü»ã±¨ÊÂÇé¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/nsa-to-establish-a-defense-minded-division-named-the-cybersecurity-directorate/
6¡¢Ç°Î÷ÃÅ×ÓÌõÔ¼¹¤ÈÏ¿ÉÔÚ¹«Ë¾µç×Ó±í¸ñÖÐÖ²ÈëÂß¼Õ¨µ¯
ǰÎ÷ÃÅ×ÓÌõÔ¼¹¤David TinleyÈÏ¿ÉÔÚΪ¹«Ë¾½¨ÉèµÄµç×Ó±í¸ñÖÐÖ²ÈëÂß¼Õ¨µ¯£¬£¬£¬£¬£¬£¬£¬Ëû½«ÃæÁÙ×î¸ß10ÄêµÄî¿ÏµÒÔ¼°25ÍòÃÀÔªµÄ·£¿£¿£¿£¿î¡£¡£¡£Æ¾Ö¤Ïà¹Ø·¨Í¥Îļþ£¬£¬£¬£¬£¬£¬£¬TinleyΪÎ÷ÃÅ×ÓµÄMonroeville PAЧÀÍ´¦ÌṩÁ˽üÊ®ÄêµÄÈí¼þЧÀÍ£¬£¬£¬£¬£¬£¬£¬ËûÔÚ¸ø¹«Ë¾½¨ÉèÓÃÓÚÖÎÀí×°±¸¶©µ¥µÄµç×Ó±í¸ñʱֲÈëÁËÂß¼Õ¨µ¯£¬£¬£¬£¬£¬£¬£¬ÕâЩըµ¯»áÔÚÌØ¶¨ÈÕÆÚ´¥·¢£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÎļþÍ߽⡣¡£¡£Ã¿´ÎÍß½âʱTinley¶¼»áÊÕÈ¡ÓöÈÀ´ÐÞ¸´¸ÃÎļþ£¬£¬£¬£¬£¬£¬£¬Ö±µ½Á½ÄêºóÎ÷ÃÅ×Ó·¢Ã÷ÁËÂß¼Õ¨µ¯²¢Ìá³öÁËÖ¸¿Ø¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/siemens-contractor-pleads-guilty-to-planting-logic-bomb-in-company-spreadsheets/