ÔÚÏßʹÃüÖÎÀíÍøÕ¾Trelloй¶´ó×ÚÓû§Êý¾Ý£»£»£»£»£»£»£»£»·¨¹ú¹¤Òµ¹«Ë¾Bouygues¼°5¼Ò״ʦÊÂÎñËùÔâµ½Maze¹¥»÷
Ðû²¼Ê±¼ä 2020-02-041.·¨¹ú¹¤Òµ¹«Ë¾Bouygues¼°5¼Ò״ʦÊÂÎñËùÔâµ½Maze¹¥»÷
·¨¹ú¹¤Òµ¹«Ë¾Bouygues Construction¼°Îå¼Ò״ʦÊÂÎñËù³ÉΪÀÕË÷Èí¼þMazeµÄ×îÐÂÊܺ¦Õߣ¬£¬£¬¾Ý³Æ¹¥»÷ÕßÇÔÈ¡ÁËËùÓÐÕâЩ¹«Ë¾µÄÃô¸ÐÄÚ²¿Êý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£Maze¹¥»÷ÕßÒѾÔÚÆäÍøÕ¾ÉÏÐû²¼ÁËÁ½¼Ò״ʦÊÂÎñËùµÄ¿Í»§Êý¾Ý£¬£¬£¬²¢ÔÊÐíºÜ¿ì»áÐû²¼ÆäËü¹«Ë¾µÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£BouyguesÔÚÉÏÖÜÎåÐû²¼ÁËÒ»·Ý¼ò¶ÌÉùÃ÷£¬£¬£¬ÈÏ¿ÉÔÚÆäÍøÂçÉϼì²âµ½ÀÕË÷²¡¶¾£¬£¬£¬µ«²¢Î´»ØÓ¦ÆäÒªº¦Êý¾ÝÊÇ·ñ±»µÁ¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/maze-ransomware-law-firms-french/
2.Ó¢¹ú´ÈÉÆ»ú¹¹ÔâÍøÂçÚ²ÆËðʧÁè¼Ý100ÍòÃÀÔª
Ó¢¹úÉçÇø×¡·¿´ÈÉÆ»ú¹¹Red KiteÖܶþÐû²¼ËüÒѳÉÎªÍøÂçթƵÄÊܺ¦Õߣ¬£¬£¬·¸·¨·Ö×Óαװ³ÉÕæÕýµÄЧÀÍÌṩÉÌÆÈ¡ÁË93.2ÍòÓ¢°÷×ʽ𡣡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤¸Ã»ú¹¹µÄÐÎò£¬£¬£¬·¸·¨·Ö×ÓÄ£ÄâÁËÏòRed KiteÌṩЧÀ͵ÄÒÑÖªÁªÏµÈ˵ÄÓòÃûºÍµç×ÓÓʼþÐÅÏ¢£¬£¬£¬µ¼ÖÂÔ±¹¤ÎóÒÔΪÕâÊÇÕæÕýµÄ¸ú½ø»á»°¡£¡£¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹»¹ÈÏ¿ÉÔ±¹¤Ã»ÓнÓÄÉÃ÷È·µÄÁ÷³Ì£¬£¬£¬µ¼ÖÂΪ±ÜÃâÚ²ÆÐÔÉúÒâ¶øÊµÑéµÄ¸¶¿îÑéÖ¤Á÷³ÌÎÞЧ¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚ2019Äê8ÔÂÏÂÑ®£¬£¬£¬¾¯·½ÈÔÔڶԴ˾ÙÐÐÊӲ졣¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/red-kite-spoofing-scam/
3.Ç÷ÊÆ¿Æ¼¼ÐÞ¸´Æä·´Íþв¹¤¾ß°üÖеĶà¸öÎó²î
Ç÷ÊÆ¿Æ¼¼Ðû²¼·´Íþв¹¤¾ß°ü£¨ATTK£©µÄÇå¾²¸üУ¬£¬£¬ÐÞ¸´ÓëÔÚ2019Äê10ÔÂÐÞ¸´µÄÒ»¸öÎó²îÓйصĸü¶àÎó²î¡£¡£¡£¡£¡£¡£¡£¡£È¥ÄêÇå¾²Ñо¿Ô±John Page·¢Ã÷ATTKÊܵ½Îó²î£¨CVE-2019-9491£©µÄÓ°Ï죬£¬£¬Ô¶³Ì¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²îÔÚÏàͬµÄĿ¼ÖÐÖ²ÈëÃûΪcmd.exe»òRegedit.exeµÄ¶ñÒâÎļþÀ´ÒÔÌáÉýµÄÌØÈ¨Ö´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔÚÈ¥Äê10Ôµİ汾1.62.0.1223ÖоÙÐÐÁËÐÞ²¹£¬£¬£¬µ«Ñо¿Ö°Ô±Stefan Kanthak·¢Ã÷ÁËÆäËüÈýÖÖÀàËÆµÄ¹¥»÷ÒªÁ죨°üÀ¨CVE-2019-20358ºÍCVE-2019-20358£©£¬£¬£¬Ç÷ÊÆ¿Æ¼¼ÔÚÉÏÖÜÐû²¼ÁËа汾1.62.0.1228ÐÞ¸´ÕâЩÎó²î¡£¡£¡£¡£¡£¡£¡£¡£Ê¹ÓÃÕâЩÎó²îÐèÒªÎïÀí»òÔ¶³Ì»á¼ûÄ¿µÄϵͳ£¬£¬£¬µ«Ç÷ÊÆ¿Æ¼¼½¨Òé¿Í»§¾¡¿ì×°Öò¹¶¡¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/trend-micro-patches-more-vulnerabilities-anti-threat-toolkit
4.ºÚ¿ÍÆð¾¢Ê¹ÓÃNSC²úÆ·Îó²îɨÃè²¢Ð®ÖÆÖÇÄÜÃŽûϵ
ƾ֤Çå¾²³§ÉÌSonicWallµÄÒ»·Ý±¨¸æ£¬£¬£¬ºÚ¿ÍÕýÔÚÆð¾¢Ê¹ÓÃÎó²î£¨CVE-2019-7256£©À´ËÑË÷²¢Ð®ÖÆ»¥ÁªÍøÉϵÄÖÇÄÜÃŽûϵͳ£¬£¬£¬²¢ÓÃÓÚÌᳫDDoS¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÃé×¼µÄ×°±¸ÊÇNortekÇå¾²Óë¿ØÖÆ£¨NSC£©²úÆ·Linear eMerge E3£¬£¬£¬¸Ã²úÆ·±»¹éΪӲ¼þÖֱ𡰻á¼û¿ØÖÆÏµÍ³¡±£¬£¬£¬³£±»×°ÖÃÔÚ¹«Ë¾×ܲ¿¡¢¹¤³§»ò¹¤ÒµÔ°ÇøÖС£¡£¡£¡£¡£¡£¡£¡£2019Äê5ÔÂApplied RiskÅû¶ÁËÓйØÓ°ÏìNSC Linear eMerge E3×°±¸µÄÊ®¸öÎó²îµÄÏêϸÐÅÏ¢£¬£¬£¬Ö»¹ÜÓÐÁù¸öÎó²îµÄÑÏÖØÐÔ£¨CVSSv3£©µÃ·ÖΪ9.8»òÂú·Ö10·Ö£¬£¬£¬µ«NSCδÄÜÌṩ²¹¶¡¡£¡£¡£¡£¡£¡£¡£¡£ºÚ¿ÍÕýÔÚʹÓõÄÎó²îÊÇÆäÖеÄÒ»¸öÔ¶³ÌÏÂÁîÖ´ÐÐÎó²î£¨CVE-2019-7256£©£¬£¬£¬ÆäCVSSv3µÃ·ÖΪ10·Ö¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Í¨¹ýShodanËÑË÷ÒýÇæ·¢Ã÷ÓÐ2375¸öeMerge×°±¸Ì»Â¶ÔÚ»¥ÁªÍøÉÏ¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/hackers-are-hijacking-smart-building-access-systems-to-launch-ddos-attacks/
5.ÐÂMagecart¹¥»÷À˳±Ö÷ÒªÕë¶Ôµç×ÓÉÌÎñÍø
Ñо¿Ö°Ô±·¢Ã÷Ò»¸öMagecart·¸·¨ÍŻﲻµ«Ñ¬È¾Á˶«¾©°ÂÔË»áÃÅÆ±¾ÏúÉ̵ÄÍøÕ¾£¬£¬£¬»¹ÌᳫÁËÕë¶Ôµç×ÓÉÌÎñÍøÕ¾µÄ¹¥»÷À˳±¡£¡£¡£¡£¡£¡£¡£¡£ÉϸöÔÂÇå¾²Ñо¿Ô±Jacob PimentalºÍMax Kersten·¢Ã÷°ÂÔË»áÃÅÆ±¾ÏúÉÌÍøÕ¾olympictickets2020[.]com¼°Å·ÖÞ±ÃÅÆ±¾ÏúÉÌÍøÕ¾eurotickets2020[.]com¾ùѬȾÁËMagecart´úÂ룬£¬£¬¸Ã¶ñÒâ´úÂ뽫ËùÓб»µÁÐÅÏ¢·¢Ë͵½opendoorcdn[.]com¡£¡£¡£¡£¡£¡£¡£¡£ÔÚ¼ÌÐøÊÓ²ìÀú³ÌÖУ¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷¶à¸öÍøÕ¾×ÔÈ¥Äê10ÔÂÒÔÀ´¾ùѬȾÁËͳһMagecart´úÂ룬£¬£¬°üÀ¨supremeproducts[.]co.uk¡¢partsplaceinc[.]com¡¢zhik[.]comµÈ¡£¡£¡£¡£¡£¡£¡£¡£¶ñÒâ´úÂëÓɶíÂÞ˹ÍйÜЧÀÍÌṩÉÌSelectelÍйܣ¬£¬£¬ÏÖÔÚOpendoorCDNÓòÃûÒѱ»ÔÝͣЧÀÍ¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/magecart-group-jumps-from-olympic-ticket-website-to-new-wave-of-e-commerce-shops/
6.ÔÚÏßʹÃüÖÎÀíÍøÕ¾Trelloй¶´ó×ÚÓû§Êý¾Ý
ƾ֤Naked SecurityµÄÒ»·Ý±¨¸æ£¬£¬£¬ÔÚÏßʹÃüÖÎÀíÍøÕ¾Trelloй¶ÁË´ó×ÚÓû§µÄ˽ÈËÊý¾Ý£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢ÐÔÄÜÆÀ¼¶ºÍ¹«Ë¾ÅàѵÊÓÆµµÈ¡£¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÔµ¹ÊÔÓÉÊDz¿·ÖÓû§¹ýʧµØ½«ÆäTrelloÃæ°åÉèÖÃΪpublic£¬£¬£¬ÕâʹµÃÈκÎÈ˶¼¿ÉÒÔÉó²éÆäÖеÄÄÚÈÝ£¬£¬£¬ÉõÖÁGoogleÖ®ÀàµÄËÑË÷ÒýÇæ¿ÉÒÔ½«Ãæ°åÖеÄÄÚÈÝÄÉÈëË÷Òý£¬£¬£¬½öÐèҪͨ¹ýÒ»ÖÖ³ÆÎª¡°dork¡±µÄÌØÊâÀàÐͼ´¿ÉËÑË÷µ½¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.techworm.net/2020/02/trello-search-exposes-private-data.html


¾©¹«Íø°²±¸11010802024551ºÅ