AvastÐû²¼ÓйØGoogle PlayÉ϶ñÒâÈí¼þµÄÆÊÎö±¨¸æ£»£»£»£»£»FBI³ÆºÚ¿ÍʹÓÃSonarQubeÇÔÈ¡Õþ¸®ºÍÆóÒµÔ´´úÂë
Ðû²¼Ê±¼ä 2020-10-28
ɱ¶¾Èí¼þÖÆÔìÉÌAvastÐû²¼ÓйØGoogle PlayÉ϶ñÒâÈí¼þµÄÆÊÎö±¨¸æ¡£¡£¡£¸Ã±¨¸æ³ÆGoogle PlayÊÐËÁÖÐÓÐ21¸öѬȾÁËHiddenAds¶ñÒâÈí¼þµÄAndroidÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬GoogleÒÑÓÚÖÜĩɾ³ýÁËÆäÖеÄ15¸ö¡£¡£¡£Avast¶ñÒâÈí¼þÆÊÎöʦÌåÏÖ£¬£¬£¬£¬£¬£¬ÕâЩӦÓÃÄ£ÄâÁËÊ¢ÐеÄÓÎÏ·£¬£¬£¬£¬£¬£¬Ò»µ©Óû§×°ÖÃÁËÕâЩӦÓ㬣¬£¬£¬£¬£¬HiddenAds¾Í»áÒþ²Ø¸ÃÓ¦ÓóÌÐòµÄͼ±êʹÓû§ÄÑÒÔ¾ÙÐÐɾ³ý£¬£¬£¬£¬£¬£¬È»ºó×îÏÈÓÃ¹ã¸æºäÕ¨Óû§¡£¡£¡£AvastÌåÏÖ£¬£¬£¬£¬£¬£¬×èÖ¹ÉÏÖÜÕâЩӦÓóÌÐòÒÑ´ï700Íò´ÎÏÂÔØÁ¿¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.avast.com/new-malware-apps-on-google-play-avast
2.FBI³ÆºÚ¿ÍʹÓÃSonarQubeÇÔÈ¡Õþ¸®ºÍÆóÒµÔ´´úÂë

Áª°îÊÓ²ì¾Ö£¨FBI£©³Æ£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃSonarQube´ÓÃÀ¹úÕþ¸®»ú¹¹ºÍÆóÒµÇÔÈ¡Êý¾Ý¡£¡£¡£SonarQubeÊÇÒ»¸ö¿ª·ÅÔ´´úÂëÆ½Ì¨£¬£¬£¬£¬£¬£¬ÓÃÓÚ×Ô¶¯´úÂëÖÊÁ¿ÉóºËºÍ¾²Ì¬ÆÊÎö£¬£¬£¬£¬£¬£¬ÒÔ·¢Ã÷ʹÓÃ27ÖÖ±à³ÌÓïÑÔ¿ª·¢µÄÏîÄ¿ÖеĹýʧºÍÇå¾²Îó²î¡£¡£¡£´Ó2020Äê4ÔÂ×îÏÈ£¬£¬£¬£¬£¬£¬FBI¾ÍÊӲ쵽ÃÀ¹úÕþ¸®»ú¹¹ºÍÊÖÒÕ¡¢½ðÈÚ¡¢ÁãÊÛ¡¢Ê³Îï¡¢µç×ÓÉÌÎñºÍÖÆÔìÒµ¹«Ë¾ÓÉÓÚSonarQube²»Çå¾²µ¼ÖµÄÔ´´úÂëй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Microsoft¡¢Adobe¡¢Lenovo¡¢AMD¡¢Qualcomm¡¢Motorola¡¢NintendoºÍµÏÊ¿ÄáµÈ¹«Ë¾¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/fbi-hackers-stole-government-source-code-via-sonarqube-instances/
3.ºÚ¿Í´ÓHarvest FinanceÇÔÈ¡¼ÛÖµ2400ÍòÃÀÔª¼ÓÃÜÇ®±Ò

ºÚ¿Í´ÓÊèɢʽ½ðÈÚЧÀÍ£¨DeFi£©Ð§ÀÍHarvest FinanceÖÐÇÔÈ¡Á˼ÛÖµÔ¼2400ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£Æ¾Ö¤¸Ã¹«Ë¾ÊӲ죬£¬£¬£¬£¬£¬ºÚ¿Í×ܹ²ÇÔÈ¡Á˼ÛÖµ1300ÍòÃÀÔªµÄUSD Coin£¨USDC£©ºÍ¼ÛÖµ1100ÍòÃÀÔªµÄTether£¨USDT£©¡£¡£¡£ÔÚ¹¥»÷±¬·¢Á½·ÖÖӺ󣬣¬£¬£¬£¬£¬ºÚ¿Í»¹Ïò¸Ãƽ̨ÍË»¹ÁË250ÍòÃÀÔª£¬£¬£¬£¬£¬£¬µ«ÆäÔµ¹ÊÔÓÉÈÔ²»ÇåÎú¡£¡£¡£Harvest FinanceÈϿɣ¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷ÊÇÓÉÓÚ×Ô¼ºµÄʧÎóΪ¹¥»÷ÕßÌṩÁËʱ»ú£¬£¬£¬£¬£¬£¬²¢ÐüÉÍ40ÍòÃÀÔªÒÔ½±ÀøÕÒµ½±»µÁ×ʽð²¢ËÍ»¹µÄÈË¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/hacker-steals-24-million-from-cryptocurrency-service-harvest-finance/
4.Áè¼Ý100¸öICC PRO½½¹àϵͳ̻¶£¬£¬£¬£¬£¬£¬Ö÷ÒªÂþÑÜÔÚÒÔÉ«ÁÐ

Çå¾²¹«Ë¾Security Joes·¢Ã÷Áè¼Ý100¸öICC PRO½½¹àϵͳ̻¶£¬£¬£¬£¬£¬£¬ÆäÖÐÌ©°ëÂþÑÜÔÚÒÔÉ«ÁС£¡£¡£Security JoesÌåÏÖÓû§ÔÚ×°ÖÃICC PROϵͳʱδ¸ü¸ÄĬÈϳö³§ÉèÖ㬣¬£¬£¬£¬£¬Òò´Ë¿ÉʹÓÃShodanµÈÎïÁªÍøËÑË÷ÒýÇæÇáËɵØÕÒµ½ËüÃÇ¡£¡£¡£¹¥»÷ÕßÔÚÕÒµ½¿É»á¼ûµÄICC PROϵͳºó£¬£¬£¬£¬£¬£¬Í¨¹ýÊäÈëĬÈÏÖÎÀíÔ±Óû§Ãû¼´¿É»á¼ûÖÇÄܽ½¹à¿ØÖÆÃæ°å£¬£¬£¬£¬£¬£¬È»ºóÔÝÍ£»£»£»£»£»ò×èÖ¹½½Ë®¡¢¸ü¸ÄÉèÖᢿØÖÆÔËË͵½±ÃµÄË®Á¿ºÍѹÁ¦¡¢»òͨ¹ýɾ³ýÓû§À´Ëø¶¨½½¹àϵͳ¡£¡£¡£ÕâЩϽµµÍè¼ÝÒ»°ëλÓÚÒÔÉ«ÁУ¬£¬£¬£¬£¬£¬ÆäÓàµÄÂþÑÜÔÚÈ«Çò¸÷µØ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/over-100-irrigation-systems-left-exposed-online-without-a-password/
5.Nando's¿Í»§Ô⵽ƾ֤Ìî³ä¹¥»÷µ¼Ö´ó×Ú×ʽ𱻵Á

Nando's¿Í»§Ô⵽ƾ֤Ìî³ä¹¥»÷µ¼Ö´ó×Ú×ʽ𱻵Á¡£¡£¡£Nando'sÊÇÖ÷ҪλÓÚÓ¢¹úºÍÅ·ÖÞ¶¼»áµÄ¼¦ÈâÁ¬Ëø²ÍÌü£¬£¬£¬£¬£¬£¬ÓÚÉÏÖÜÎåÔâµ½ÁËÆ¾Ö¤Ìî³ä¹¥»÷¡£¡£¡£¸Ã²ÍÌü³ÆÆäϵͳ²¢Î´Ôâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬ºÚ¿Í´ÓÆäËûµØ·½ÇÔÈ¡ÁËÆä¿Í»§µÄµç×ÓÓʼþµØµãºÍÃÜÂ룬£¬£¬£¬£¬£¬²¢»á¼ûËûÃǵÄNando'sÕÊ»§£¬£¬£¬£¬£¬£¬ÆäÖÐÒ»ÃûÊܺ¦Õß±»µÁÁËԼĪ870ÃÀÔª¡£¡£¡£Akamai³Æ£¬£¬£¬£¬£¬£¬ÔÚ2018Äê7ÔÂÖÁ½ñÄê6ÔÂÖ®¼ä£¬£¬£¬£¬£¬£¬×ܹ²±¬·¢ÁËÁè¼Ý1000ÒÚÆðƾ֤Ìî³ä¹¥»÷£¬£¬£¬£¬£¬£¬ÆäÖÐ640ÒÚÆðÕë¶ÔÁãÊÛ¡¢ÂÃÓκÍÂùÝÐÐÒµ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/nandos-hackers-customer-accounts/160527/
6.ÃÀ¹úÂÉËùFragomenÔâµ½¹¥»÷µ¼Ö¹ȸèÔ±¹¤ÐÅϢй¶

ÃÀ¹úÒÆÃñ״ʦÊÂÎñËùFragomenÔâµ½¹¥»÷µ¼Ö¹ȸèÔ±¹¤ÐÅϢй¶¡£¡£¡£¸Ã¹«Ë¾Ðû²¼Í¨Öª³Æ£¬£¬£¬£¬£¬£¬ÆäÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ºÚ¿Í»á¼ûÁ˰üÀ¨I-9¾ÍÒµÑé֤ЧÀÍСÎÒ˽¼ÒÐÅÏ¢µÄÎļþ£¬£¬£¬£¬£¬£¬Éæ¼°µ½Á˹ȸèÔ±¹¤ºÍǰԱ¹¤¡£¡£¡£´Ë´ÎÊÂÎñй¶ÁËÔ±¹¤µÄÈ«Ãû¡¢Óʼĵص㡢³öÉúÈÕÆÚ¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢Éç»á°ü¹ÜºÅ¡¢»¤ÕÕºÅÂëºÍÆäËûÒÆÃñ±êʶ·û¡£¡£¡£FragomenΪËùÓÐÊÜÓ°ÏìµÄGoogleÔ±¹¤ÌṩÁËÒ»ÄêµÄÃâ·ÑÐÅÓÃ¼à¿Ø¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/google-employees-personal-info-exposed-in-law-firm-data-breach/


¾©¹«Íø°²±¸11010802024551ºÅ