1¡¢Ñо¿ÍŶÓÐû²¼Sextortionڲƻ±¨¸æ£¬£¬£¬£¬Áè¼Ý2ÒÚÓʼþÕË»§³ÉΪĿµÄ
Cofense LabsÔÚ6Ô·ݷ¢Ã÷Ò»¸öÖ÷Òª·Ö·¢sextortionÚ²ÆÓʼþµÄ½©Ê¬ÍøÂ磬£¬£¬£¬¸Ã½©Ê¬ÍøÂçûÓÐÊÔͼ´ÓÊÜѬȾµÄÅÌËã»úÖÐÇÔȡеÄÊý¾Ý¼¯£¬£¬£¬£¬¶øÊÇÖØ¸´Ê¹ÓÃ֮ǰй¶µÄÊý¾Ý¼¯¡£¡£¡£¡£¡£ÕâЩÊý¾Ý¼¯×îÔç¿É×·ËÝÖÁ10Äêǰ£¬£¬£¬£¬Æ¾Ö¤Ñо¿Ö°Ô±Ðû²¼µÄÊý¾Ý¿â£¬£¬£¬£¬¹²ÓÐÁè¼Ý2ÒÚ¸öµç×ÓÓʼþÕË»§³ÉΪ¸Ã½©Ê¬ÍøÂçµÄ¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£Cofense»¹ÆÀ¹À³Æ½ñÄêsextortion»î¶¯µÄ±ÈÌØ±ÒÇ®°üÒѾÎüÊÕµ½ÁËÁè¼Ý150ÍòÃÀÔªµÄ¸¶¿î¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://cofense.com/cofense-labs-publishes-database-200-million-compromised-accounts-targeted-sextortion-email-campaigns/
2¡¢CafePressÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬Áè¼Ý2300ÍòÓû§µÄÐÅϢй¶
Êý¾ÝÐ¹Â¶Í¨ÖªÍøÕ¾HIBP³ÆCafePressÓÚ2019Äê2ÔÂÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬Áè¼Ý2300ÍòÓû§µÄСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨µç×ÓÓʼþµØµã¡¢ÐÕÃû¡¢ÃÜÂë¡¢µç»°ºÅÂëÒÔ¼°×¡Ö·¡£¡£¡£¡£¡£Æ¾Ö¤Çå¾²Ñо¿Ô±Jim ScottµÄ±íÊö£¬£¬£¬£¬½üÒ»°ëµÄÓû§ÃÜÂëÊÇͨ¹ýbase64 SHA1±àÂëµÄ£¬£¬£¬£¬ÕâÊÇÒ»¸ö½ÏÈõµÄ¼ÓÃÜËã·¨£¬£¬£¬£¬ÁíÒ»°ëÓû§ÔòÊÇͨ¹ýFacebookºÍÑÇÂíÑ·Æ·¼¶Èý·½ÁîÅÆ¾ÙÐеǼ¡£¡£¡£¡£¡£BleepingComputer·¢Ã÷Ô¼49.3Íò¸öCafePressÕË»§Êý¾ÝÔÚºÚ¿ÍÂÛ̳ÉϳöÊÛ£¬£¬£¬£¬ÏÖÔÚÉв»ÇåÎúËüÃÇÊÇ·ñÓëͳһÊÂÎñÓйء£¡£¡£¡£¡£×èÖ¹ÏÖÔÚCafePressÉÐδÐû²¼ÈκÎÉùÃ÷»ò֪ͨ£¬£¬£¬£¬µ«Óû§ÔڵǼʱ±»Ç¿ÖÆÒªÇóÖØÖÃÃÜÂë¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.forbes.com/sites/daveywinder/2019/08/05/cafepress-hacked-23m-accounts-compromised-is-yours-one-of-them/#1c5b34a7407e
3¡¢PresbyterianÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬½ü18.3Íò»¼ÕßÐÅϢй¶
PresbyterianÒ½ÁÆÐ§ÀÍÖÐÐÄÔÚÆä²¿·ÖÔ±¹¤Êܵ½´¹ÂÚ¹¥»÷ºóÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Æ¾Ö¤¸ÃÒ½ÁÆÖÐÐÄÐû²¼µÄͨ¸æ£¬£¬£¬£¬¹²Óнü18.3Íò»¼ÕßµÄÐÅϢй¶£¬£¬£¬£¬°üÀ¨ËûÃǵÄÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂëÒÔ¼°ÁÙ´²ÐÅÏ¢µÈ¡£¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚ5ÔÂ9ÈÕ×óÓÒ£¬£¬£¬£¬PresbyterianÓÚ6ÔÂ6ÈÕ¼ì²âµ½ÁËÕâÒ»ÊÂÎñ¡£¡£¡£¡£¡£¸ÃÒ½ÁÆÖÐÐÄËæ¼´Í¨ÖªÁËÁª°îÖ´·¨²¿·Ö²¢Õö¿ª½øÒ»²½µÄÊӲ졣¡£¡£¡£¡£ÎªÁ˱ÜÃâ´ËÀàÊÂÎñÔٴα¬·¢£¬£¬£¬£¬Presbyterian½ÓÄÉÁׯü¶àÇå¾²²½·¥±£»£»£»£»£»£»¤ÆäÓʼþϵͳ£¬£¬£¬£¬²¢¶ÔÔ±¹¤¾ÙÐÐÇ¿ÖÆÐÔÇå¾²Åàѵ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.phs.org/Pages/data-security.aspx
4¡¢Aegon Life¹ÙÍø±£´æÎó²î£¬£¬£¬£¬µ¼ÖÂ1ÍòÃû¿Í»§µÄÒþ˽й¶
Ó¡¶È°ü¹Ü¹«Ë¾Aegon Life¹ÙÍø±£´æÎó²î£¬£¬£¬£¬µ¼ÖÂ×î¶à1ÍòÃû¿Í»§µÄСÎÒ˽¼ÒÊý¾Ý¿ÉÄÜй¶¡£¡£¡£¡£¡£ÕâЩÊý¾Ý°üÀ¨ÐÕÃû¡¢ÄêËê¡¢ÐÔ±ð¡¢ÊÖ»úºÅÂëÒÔ¼°ÄêÊÕÈë¡¢¿µ½¡Õ½ÂÔµÈÐÅÏ¢¡£¡£¡£¡£¡£¸ÃÎó²îÊ®·Ö¼òÆÓ£¬£¬£¬£¬µ±Óû§µÇ¼Aegon Life¹ÙÍøÊ±£¬£¬£¬£¬ÆäÌîÈëµÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢²¢Ã»ÓлñµÃ³ä·Ö±£»£»£»£»£»£»¤£¬£¬£¬£¬ÀýÈçÓû§ÔÚÁªÏµ±í¸ñ¡¢ÖÖÖÖ°ü¹Ü¼Æ»®ÅÌË㹤¾ßÖÐÌîÈëµÄÐÅÏ¢¡£¡£¡£¡£¡£ÔÚ7ÔÂÖÐÑ®½Óµ½Îó²î±¨¸æºó£¬£¬£¬£¬¸Ã¹«Ë¾ÒѾÐÞ¸´ÁËÎó²î¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÊÇ·ñÓÐÈκοͻ§Êý¾ÝÔâµ½ÀÄÓᣡ£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thewire.in/tech/aegon-life-insurance-data-leak
5¡¢GoogleºÍNASAÒòJiraЧÀÍÆ÷ÉèÖùýʧµ¼ÖÂÃô¸ÐÊý¾Ýй¶
JiraÊÇÒ»¸öÊ¢ÐеÄÏîÄ¿ÖÎÃ÷È·¾ö¼Æ»®£¬£¬£¬£¬Çå¾²Ñо¿Ô±Avinash Jain·¢Ã÷µ±ÔÚJira CloudÖн¨ÉèеÄfilterºÍdashboardʱ£¬£¬£¬£¬ÆäĬÈϿɼûÐÔÊÇ¡°ËùÓС±£¬£¬£¬£¬ÕâºÜÈÝÒ×±»Ã÷ȷΪ¡°ÆóÒµÄÚ²¿ËùÓÐÈË¡±µ«ÏÖʵÉÏËüÖ¸µÄÊÇ¡°»¥ÁªÍøÉϵÄËùÓÐÈË¡±¡£¡£¡£¡£¡£ÕâÖÖÉèÖùýʧʹµÃÐí¶à×éÖ¯µÄÃô¸ÐÏîÄ¿ÐÅÏ¢ÆØ¹â£¬£¬£¬£¬°üÀ¨Google¡¢Yahoo¡¢NASA¡¢Lenovo¡¢1Password¡¢ZendeskÒÔ¼°Õþ¸®»ú¹¹µÈ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/misconfigured-jira-servers-leak-info-on-users-and-projects/
6¡¢¸ßͨоƬ±£´æQualPwnÎó²î£¬£¬£¬£¬²¨¼°æçÁú855µÈ¶à¿îSoC
¸ßͨ¶à¿îSoCÊܵ½Á½¸öÎó²îµÄÓ°Ï죬£¬£¬£¬ÕâÁ½¸öÎó²î±»³ÆÎªQualPwn£¬£¬£¬£¬»®·ÖÊÇÓ°Ïì¸ßͨWLAN×é¼þ¼°AndroidÄں˵Ļº³åÇøÒç³öÎó²î£¨CVE-2019-10538£©ÒÔ¼°¸ßͨWLAN¼°Modem¹Ì¼þÖеĻº³åÇøÒç³öÎó²î£¨CVE-2019-10540£©¡£¡£¡£¡£¡£Æ¾Ö¤¸ßͨÐû²¼µÄÇ徲ͨ¸æ£¬£¬£¬£¬ºóÕßÓ°ÏìµÄ²úÆ·°üÀ¨SD 820¡¢SD 835¡¢SD 845¡¢SD 850¡¢SD 855µÈ20¶à¿îоƬ¡£¡£¡£¡£¡£¸ßͨºÍAndroidÍŶÓÒѾÐû²¼ÁËÏà¹ØÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/qualpwn-vulnerabilities-in-qualcomm-chips-let-hackers-compromise-android-devices/