Ó¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©Ðû²¼Îó²îÅû¶ָÄÏ£»£»£»£»£»BlindSide¹¥»÷¿ÉʹÓÃCPUµÄÍÆ²âÖ´Ðй¦Ð§ÈƹýASLR
Ðû²¼Ê±¼ä 2020-09-161.Ó¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©Ðû²¼Îó²îÅû¶ָÄÏ

Ó¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©Ðû²¼ÁËÎó²îÅû¶ָÄÏ£¬£¬£¬£¬£¬£¬ÒÔ×ÊÖú¹«Ë¾ÊµÑéÎó²îÅû¶Á÷³Ì»òÔÚÒѾ½¨ÉèÎó²îÅû¶Á÷³ÌµÄÇéÐÎÏÂ¶ÔÆä¾ÙÐÐˢС£¡£¡£¡£¡£¡£¡£NCSCÌåÏÖ£¬£¬£¬£¬£¬£¬¸ÃÖ¸Äϲ¢²»ÊÇÒ»¸öÎó²îÅû¶µÄ¹æÔòÊֲᣬ£¬£¬£¬£¬£¬¶øÊÇΪ¸üºÃµÄʵÑéÌṩÁËÐëÒªµÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÆäÖ÷Òª·ÖΪÈý¸öÖ÷Òª²¿·Ö£¬£¬£¬£¬£¬£¬ÐÎòÁËÔõÑù½«ÍⲿÎó²îÐÅÏ¢¶¨Ïò¸øºÏÊʵÄÈË£¬£¬£¬£¬£¬£¬ÒÔ¼°±¨¸æÐè×ñÕչرÕÎó²îµÄ¿ò¼Ü±ê×¼¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/uk-government-releases-toolkit-to-easily-disclose-vulnerabilities/
2.Aqua SecurityÐû²¼2020ÄêCloud Native Threat±¨¸æ

Aqua Security¸ú×Ù²¢ÆÊÎöÁË2019Äê6ÔÂÖÁ2020Äê7ÔÂÖ®¼äµÄ16371Æð¹¥»÷£¬£¬£¬£¬£¬£¬Ðû²¼ÁË2020ÄêCloud Native Threat±¨¸æ¡£¡£¡£¡£¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬½ñÄêÄêÍ·Õë¶ÔÔÆÏµÍ³µÄ¹¥»÷ÔÚ¼¤Ôö£¬£¬£¬£¬£¬£¬Ïà±ÈÉÏÒ»ÄêÔöÌíÁË250£¥¡£¡£¡£¡£¡£¡£¡£ÔÚÕâЩ¹¥»÷ʱ´ú£¬£¬£¬£¬£¬£¬ºÚ¿ÍÊÔͼ»ñµÃ¶ÔÃÛ¹ÞЧÀÍÆ÷µÄ¿ØÖÆÈ¨£¬£¬£¬£¬£¬£¬È»ºóÏÂÔØ²¢°²ÅŶñÒâÈÝÆ÷¾µÏñ¡£¡£¡£¡£¡£¡£¡£AquaÌåÏÖ£¬£¬£¬£¬£¬£¬ÕâЩ¾µÏñÖÐÓÐ95£¥ÊÇÕë¶ÔÍÚ¿ó¼ÓÃÜÇ®±ÒµÄ£¬£¬£¬£¬£¬£¬¶øÆäÓàÔòÓÃÓÚÉèÖÃDDoS»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/vast-majority-of-cyber-attacks-on-cloud-servers-aim-to-mine-cryptocurrency/
3.BlindSide¹¥»÷¿ÉʹÓÃCPUµÄÍÆ²âÖ´Ðй¦Ð§ÈƹýASLR

ËÕÀèÊÀÁª°îÀí¹¤Ñ§ÔºµÈ´óѧµÄÑо¿Ö°Ô±·¢Ã÷ÁËеÄBlindSide¹¥»÷·½·¨£¬£¬£¬£¬£¬£¬Æä¿ÉʹÓÃCPUµÄÍÆ²âÖ´Ðй¦Ð§ÈƹýASLR¡£¡£¡£¡£¡£¡£¡£ÍƲâÖ´ÐÐÊÇÏÖ´ú´¦Öóͷ£Æ÷µÄÒ»ÖÖÌá¸ßÐÔÄܵĹ¦Ð§£¬£¬£¬£¬£¬£¬BlindSide¿ÉÒÔʹÓÃÈí¼þÓ¦ÓóÌÐòÖеÄÎó²î£¬£¬£¬£¬£¬£¬²¢ÔÚÍÆ²âÖ´ÐÐÓòÖÐÖØ¸´Ê¹ÓøÃÎó²î£¬£¬£¬£¬£¬£¬Öظ´Ì½²âÄڴ棬£¬£¬£¬£¬£¬Ö±µ½¹¥»÷ÕßÈÆ¹ýASLR¡£¡£¡£¡£¡£¡£¡£ÓÉÓڴ˹¥»÷±¬·¢ÔÚÍÆ²âÖ´ÐеĹæÄ£ÄÚ£¬£¬£¬£¬£¬£¬Òò´ËËùÓÐʧ°ÜµÄ̽²â¶¼»á±»ÑïÆú£¬£¬£¬£¬£¬£¬²¢²»»áÓ°ÏìCPU»òÆäÎȹÌÐÔ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/new-blindside-attack-uses-speculative-execution-to-bypass-aslr/
4.FBIÖÒÑÔÕë¶Ô½ðÈÚ»ú¹¹µÄƾ֤Ìî³ä¹¥»÷µÄÊýÄ¿¼¤Ôö

Áª°îÊÓ²ì¾Ö£¨FBI£©ÖÒÑÔÕë¶Ô½ðÈÚ»ú¹¹µÄƾ֤Ìî³ä¹¥»÷µÄÊýÄ¿¼¤Ôö¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ìî³äÊÇÏà¶Ô½ÏеÄÊõÓ£¬£¬£¬£¬£¬ÔçÏȺڿÍֻʹÓÃÕâÀ๥»÷Õë¶ÔÔÚÏßÓÎÏ·ºÍʳÎï¶©¹ºÕÊ»§¡£¡£¡£¡£¡£¡£¡£¿ÉÊÇËæ×ÅÕâÖÖÕ½ÂÔµÄÀֳɣ¬£¬£¬£¬£¬£¬¸ü¶àºÚ¿Í×é֯ת¶øÕë¶ÔÔÚÏßÒøÐÐЧÀͺͼÓÃÜÇ®±ÒÉúÒâËù£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡½ðÈÚ×ʲú¡£¡£¡£¡£¡£¡£¡£FBIÌåÏÖ£¬£¬£¬£¬£¬£¬×Ô2017ÄêÒÔÀ´£¬£¬£¬£¬£¬£¬ÆäÊÕµ½Á˽ü5ÍòÆðÕë¶ÔÃÀ¹ú½ðÈÚ»ú¹¹µÄƾ֤Ìî³ä¹¥»÷µ¼ÖµÄÕÊ»§ÐÅϢй¶ÊÂÎñµÄ±¨¸æ£¬£¬£¬£¬£¬£¬Êܺ¦Õß°üÀ¨ÒøÐС¢½ðÈÚЧÀÍÌṩÉÌ¡¢°ü¹Ü¹«Ë¾ºÍͶ×ʹ«Ë¾¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/fbi-says-credential-stuffing-attacks-are-behind-some-recent-bank-hacks/
5.Staples¹«Ë¾Ôâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬¿Í»§¶©µ¥Êý¾Ýй¶

°ì¹«ÁãÊÛ¹«Ë¾Staples·¢³öÁËÊý¾Ýй¶֪ͨÊ飬£¬£¬£¬£¬£¬ÉùÃ÷Æä9ÔÂ2ÈÕ×óÓÒÔâµ½Á˺ڿ͹¥»÷£¬£¬£¬£¬£¬£¬µ¼Ö¿ͻ§¶©µ¥Êý¾Ýй¶¡£¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñй¶µÄÐÅÏ¢°üÀ¨¿Í»§µÄÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢ÐÅÓÿ¨ºÅºóËÄλ¡¢²úÆ·±¾Ç®¡¢½»»õºÍ¶©¹ºµÄ²úÆ·¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Í¨Öª£¬£¬£¬£¬£¬£¬²¢Ã»ÓÐÃô¸ÐÊý¾Ý±»Ð¹Â¶£¬£¬£¬£¬£¬£¬°üÀ¨ÕÊ»§Æ¾Ö¤ºÍÍêÕûµÄÖ§¸¶¿¨Êý¾Ý¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/108271/data-breach/staples-data-breach.html
6.ºÚ¿ÍÈëÇÖÃÀ¹úÍËÎéÎäÊ¿ÊÂÎñ²¿£¬£¬£¬£¬£¬£¬ÇÔÈ¡4.6ÍòÎäÊ¿ÐÅÏ¢

ÍËÎéÎäÊ¿ÊÂÎñ²¿£¨VA£©ÌåÏÖ£¬£¬£¬£¬£¬£¬ÓÐδ¾ÊÚȨµÄÓû§»á¼ûÁËÓÉVA½ðÈÚЧÀÍÖÐÐÄ£¨FSC£©ÖÎÀíµÄÔÚÏßÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬»ñÈ¡ÁËԼĪ46000ÃûÍËÎéÎäÊ¿µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¸¥¼ªÄáÑÇÖÝÌåÏÖ£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÉí·ÝÑéÖ¤ÐÒéÀ´»á¼ûFSCÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬È»ºó×ªÒÆÁËÍËÎéÎäÊ¿ÖÎÀí¾ÖÔ±¾ÍýÏëÖ§¸¶¸øÒ½ÁƱ£½¡ÌṩÉÌÓÃÓÚÃÀ¹úÍËÎéÎäÊ¿µÄÒ½ÁƵĿî×Ó¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü¹ÙÔ±ÃÇÈÔÔÚÊÓ²ìÕâÆðÊÂÎñ£¬£¬£¬£¬£¬£¬µ«VAÒÔΪ£¬£¬£¬£¬£¬£¬ºÚ¿Í¿ÉÄÜ»¹ÇÔÈ¡ÁËÍËÎéÎäÊ¿µÄ¼Í¼£¬£¬£¬£¬£¬£¬°üÀ¨Éç»áÇå¾²ºÅÂë¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/department-of-veteran-affairs-discloses-breach-impacting-46000-veterans/


¾©¹«Íø°²±¸11010802024551ºÅ