ºÚ¿ÍʹÓõÚÈý·½Îó²îÇÔÈ¡ZAGG¿Í»§µÄÐÅÓÿ¨ÐÅÏ¢
Ðû²¼Ê±¼ä 2024-12-311. ºÚ¿ÍʹÓõÚÈý·½Îó²îÇÔÈ¡ZAGG¿Í»§µÄÐÅÓÿ¨ÐÅÏ¢
12ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ZAGG Inc.ÊÇÒ»¼Ò×ÅÃûµÄÏûºÄµç×ÓÅä¼þÖÆÔìÉÌ£¬£¬£¬£¬£¬£¬£¬£¬¿ËÈÕÔâÓöÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ¡£¡£¡£ºÚ¿ÍÈëÇÖÁ˸ù«Ë¾µç×ÓÉÌÎñÌṩÉÌBigCommerceµÄµÚÈý·½Ó¦ÓóÌÐòFreshClicks£¬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÆäÖÐ×¢ÈëÁ˶ñÒâ´úÂ룬£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÔÚ2024Äê10ÔÂ26ÈÕÖÁ11ÔÂ7ÈÕʱ´ú£¬£¬£¬£¬£¬£¬£¬£¬zagg.comÉϲ¿·Ö¹ºÎïÕßµÄÐÅÓÿ¨Êý¾Ý±»Ð¹Â¶¡£¡£¡£ÕâЩй¶µÄÊý¾Ý°üÀ¨¹ºÎïÕßµÄÐÕÃû¡¢µØµãºÍÖ§¸¶¿¨ÐÅÏ¢¡£¡£¡£BigCommerceÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬Æäϵͳ×Ô¼º²¢Î´ÊÜË𣬣¬£¬£¬£¬£¬£¬£¬¶øÊÇÔÚ·¢Ã÷FreshClicksÓ¦ÓÃÔâÈëÇֺ󣬣¬£¬£¬£¬£¬£¬£¬Á¬Ã¦½«Æä´Ó¿Í»§ÊÐËÁÖÐÐ¶ÔØ£¬£¬£¬£¬£¬£¬£¬£¬ÒÔɾ³ýËùÓÐÊÜѬȾµÄAPIºÍ¶ñÒâ´úÂë¡£¡£¡£ZAGGÒѽÓÄɵ÷½â²½·¥£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Í¨ÖªÁª°îÖ´·¨²¿·ÖºÍî¿Ïµ»ú¹¹£¬£¬£¬£¬£¬£¬£¬£¬²¢ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÃâ·ÑµÄ12¸öÔÂÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬£¬ZAGG»¹½¨ÒéÊÕ¼þÈËÇ×½ü¼à¿Ø½ðÈÚÕË»§»î¶¯£¬£¬£¬£¬£¬£¬£¬£¬ÉèÖÃڲƾ¯±¨£¬£¬£¬£¬£¬£¬£¬£¬²¢Ë¼Á¿¶³½áÐÅÓᣡ£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬£¬ZAGGÉÐδ͸¶ÏêϸÓм¸¶à¿Í»§Êܵ½ÁË´Ë´ÎÇå¾²Îó²îµÄÓ°Ïì¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-steal-zagg-customers-credit-cards-in-third-party-breach/
2. WPA3ÐÒé±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í¿É»ñÈ¡ÍøÂçÃÜÂë
12ÔÂ30ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÀÖ³ÉÁ¬ÏµÁËÖÐÐÄÈ˹¥»÷£¨MITM£©ºÍÉç»á¹¤³ÌѧÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬£¬ÈƹýÁË×îеÄWi-Fi±£»£»£»£»£»£»¤ÐÒéWPA3£¬£¬£¬£¬£¬£¬£¬£¬»ñÈ¡ÁËÍøÂçÃÜÂë¡£¡£¡£ÕâÏîÑо¿ÓÉÎ÷Ó¡¶È´óѧµÄKyle Chadee¡¢Wayne GoodridgeºÍKoffka KhanÍŶÓÍê³É£¬£¬£¬£¬£¬£¬£¬£¬Õ¹ÏÖÁËWPA3ÕâÒ»×îÐÂÎÞÏßÇå¾²±ê×¼±£´æµÄÇå¾²Îó²î¡£¡£¡£WPA3ÓÚ2018ÄêÍÆ³ö£¬£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÌî²¹WPA2µÄȱÏÝ£¬£¬£¬£¬£¬£¬£¬£¬Ìṩ¸üÇ¿µÄÇå¾²ÐÔ£¬£¬£¬£¬£¬£¬£¬£¬ÆäÒªº¦¹¦Ð§Ö®Ò»Îª¡°¶ÔµÈͬʱÈÏÖ¤¡±£¨SAE£©ÐÒ飬£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚµÖÓùÀëÏß×ֵ乥»÷¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃWPA3¹ý¶ÉģʽÖеÄÈõµã£¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ý½µ¼¶¹¥»÷¿É²¶»ñ²¿·ÖWPA3½»»¥ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬ÔÙÁ¬ÏµÉç»á¹¤³ÌѧÊÖÒÕ¼´¿É»Ö¸´ÍøÂçÃÜÂë¡£¡£¡£¹¥»÷Àú³Ì°üÀ¨½µ¼¶¹¥»÷²¶»ñÐÅÏ¢¡¢É¨³ýÓû§ÈÏÖ¤ÒÔ¼°½¨ÉèÐéαÕ˺ŽÓÈëµã»ñÈ¡ÃÜÂë¡£¡£¡£Ñо¿Ö°Ô±Ê¹ÓÃÊ÷Ý®ÅɺͿªÔ´¹¤¾ß½¨Éè¶ñÒâ½ÓÈëµã£¬£¬£¬£¬£¬£¬£¬£¬ÓÕʹÓû§ÊäÈëWi-FiÃÜÂë¾ÙÐÐÑéÖ¤¡£¡£¡£ÕâÏîÑо¿Òý·¢Á˶ÔWPA3Çå¾²ÐԵĵ£ÐÄ£¬£¬£¬£¬£¬£¬£¬£¬ÌØÊâÊÇÔÚÆä¹ý¶ÉģʽÏ£¬£¬£¬£¬£¬£¬£¬£¬Î´ÊµÑé±£»£»£»£»£»£»¤ÖÎÀíµÄÓû§Ò×Êܹ¥»÷£¬£¬£¬£¬£¬£¬£¬£¬ÇÒһЩװ±¸ÎÞ·¨ÅþÁ¬µ½WPA3ÍøÂ磬£¬£¬£¬£¬£¬£¬£¬ÓëWi-FiͬÃ˵Ä˵·¨Ïàì¶Ü¡£¡£¡£Ö»¹Ü¹¥»÷ÐèÌØ¶¨Ìõ¼þºÍÓû§½»»¥£¬£¬£¬£¬£¬£¬£¬£¬µ«ÈÔչʾÁ˱£»£»£»£»£»£»¤ÎÞÏßÍøÂçÃæÁÙµÄÌôÕ½¡£¡£¡£
https://cybersecuritynews.com/researchers-bypass-wpa3-password/#google_vignette
3. ΢Èí½ôÆÈÒªÇó.NET¿ª·¢Õ߸üÐÂÓ¦ÓóÌÐò
12ÔÂ30ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÕý½ôÆÈÒªÇó.NET¿ª·¢Ö°Ô±¸üÐÂËûÃǵÄÓ¦ÓóÌÐòºÍ¿ª·¢¹ÜµÀ£¬£¬£¬£¬£¬£¬£¬£¬×èֹʹÓü´½«ÒòCDNÌṩÉÌEdgioÐÝÒµ¶ø¹Ø±ÕµÄ¡°azureedge.net¡±ÓòÃûÀ´×°ÖÃ.NET×é¼þ¡£¡£¡£ÌØÊâÊÇ¡°dotnetcli.azureedge.net¡±ºÍ¡°dotnetbuilds.azureedge.net¡±ÕâÁ½¸öÓòÃû½«ÔÚδÀ´¼¸¸öÔÂÄÚÏÂÏߣ¬£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÓ°ÏìÒÀÀµËüÃǵÄÏîÄ¿¹¦Ð§¡£¡£¡£Î¢ÈíÚ¹ÊÍ£¬£¬£¬£¬£¬£¬£¬£¬ËûÃÇά»¤µÄ¶à¸öCDNʵÀýÖУ¬£¬£¬£¬£¬£¬£¬£¬²¿·ÖÒÔ¡°azureedge.net¡±×îºóµÄÓòÃûÓÉEdgioÍйܣ¬£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾¼´½«×èÖ¹ÔËÓª£¬£¬£¬£¬£¬£¬£¬£¬Òò´ËÐèҪǨá㵽еÄCDN²¢Ê¹ÓÃÐÂÓòÃû¡£¡£¡£Î¢Èí½¨Ò鿪·¢Ö°Ô±ËÑË÷²¢Ìæ»»´úÂë¡¢¾ç±¾ºÍÉèÖÃÖжÔazureedge.netµÄÒýÓÃΪbuilds.dotnet.microsoft.com¡£¡£¡£¹ý¶Éʱ´ú£¬£¬£¬£¬£¬£¬£¬£¬ÐÂÓòÃû½«ÓÉEdgio¡¢AkamaiºÍAzure Front DoorÁªºÏÌṩЧÀÍ¡£¡£¡£CI/CDÍŶÓÐèÈ·±£GitHub ActionsºÍAzure DevOpsʹÃü¸üÐÂΪ֧³ÖÐÂÓòµÄ°æ±¾¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬ÐèÉèÖ÷À»ðǽÒÔÔÊÐíÀ´×ÔÐÂλÖõÄÁ÷Á¿¡£¡£¡£Ö»¹Ü΢ÈíÒÑÓµÓÐÕâЩÓòÃûµÄËùÓÐȨ£¬£¬£¬£¬£¬£¬£¬£¬µ«ÈÔÐè¾ÙÐÐÓòÃûǨá㣬£¬£¬£¬£¬£¬£¬£¬ÒÔ×èÖ¹ÔËÓªÖÐÖ¹µÄΣº¦¡£¡£¡£ÊÜÓ°ÏìµÄÓû§¿ÉÒÔ¹Ø×¢GitHubÒ³ÃæÉϵÄ״̬¸üС£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-issues-urgent-dev-warning-to-update-net-installer-link/
4. µÂ¿ËÈøË¹ÖÝÂó¿ËĬÀï´óѧ½ü1.8ÍòÈËСÎÒ˽¼ÒÐÅÏ¢Ôâй¶
12ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬µÂ¿ËÈøË¹Öݰ¢±ÈÁÖµÄÂó¿ËĬÀï´óѧ½üÆÚÔâÓöÁËÐÅϢй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬½ü18,000È˵ÄСÎÒ˽¼ÒÐÅÏ¢¿ÉÄÜÒѱ»Ð¹Â¶¡£¡£¡£¸ÃÊÂÎñÓÚ½ñÄê6ÔÂ20ÈÕ±»Ñ§Ð£·¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬ÆäʱѧУÒâʶµ½ÆäÍøÂç±£´æ¿ÉÒɻ¡£¡£¡£¾ÓÉÊӲ죬£¬£¬£¬£¬£¬£¬£¬È·ÈÏÒ»Ãûδ֪Éí·ÝµÄÐÐΪÕßÔÚ6ÔÂ18ÈÕÖÁ6ÔÂ20ÈÕʱ´ú»á¼ûÁËѧУµÄ²¿·Öϵͳ²¢¸´ÖÆÁËÎļþ¡£¡£¡£Âó¿ËĬÀï´óѧ¾ÓɽüÎå¸öÔµÄÊý¾ÝÆÊÎö£¬£¬£¬£¬£¬£¬£¬£¬·¢Ã÷¿ÉÄÜй¶µÄÐÅÏ¢°üÀ¨ÐÕÃûºÍÉç»á°ü¹ÜºÅÂë¡£¡£¡£¸Ã´óѧÒÑÏòÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÕýÔÚÔöÇ¿°ü¹Ü²½·¥ºÍÔ±¹¤Åàѵ¡£¡£¡£Ñ§Êõ»ú¹¹¾³£³ÉÎªÍøÂç¹¥»÷µÄÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚËüÃÇ´¦Öóͷ£´ó×ÚСÎÒ˽¼ÒÐÅÏ¢ºÍ¸ß¼ÛÖµÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬½üÄêÀ´ÒÑÓжàÆðÀàËÆÊÂÎñ±»±¨µÀ¡£¡£¡£
https://cybernews.com/news/texas-university-suffers-breach/
5. CISAÐÂÔöÎó²îCVE-2024-3393ÖÁÒÑÖª±»Ê¹ÓÃÎó²îĿ¼
12ÔÂ30ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬CISAÔÚÆäÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖÐÐÂÔöÁËÒ»¸öÃûΪCVE-2024-3393µÄÐÂÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÉæ¼°Palo Alto Networks PAN-OSÖÐÃûÌùýʧµÄDNSÊý¾Ý°ü¡£¡£¡£´ËÀàÎó²î³£±»¶ñÒâÍøÂçÐÐΪÕßʹÓ㬣¬£¬£¬£¬£¬£¬£¬´ºÁª°îÆóÒµ×é³ÉÑÏÖØÍþв¡£¡£¡£¡¶²Ù×÷Ö¸Áî¡·22-01ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö»ú¹¹ÔÚ»®¶¨ÏÞÆÚÄÚÐÞ¸´ÒÑ·¢Ã÷µÄÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ±£»£»£»£»£»£»¤ÆäÍøÂçÃâÊÜ×Ô¶¯Íþв£¬£¬£¬£¬£¬£¬£¬£¬²¢½¨ÉèÁËÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬£¬£¬£¬£¬£¬£¬£¬×÷Ϊ´ºÁª°îÆóÒµÔì³ÉÖØ´óΣº¦µÄÒÑÖª³£¼ûÎó²îºÍ̻¶(CVE)µÄ¶¯Ì¬ÁÐ±í¡£¡£¡£Ö»¹Ü¸ÃÖ¸Áî½öÊÊÓÃÓÚÁª°îÃñÊÂÐÐÕþ²¿·Ö»ú¹¹£¬£¬£¬£¬£¬£¬£¬£¬µ«CISAÇ¿ÁÒ½¨ÒéËùÓÐ×éÖ¯ÓÅÏÈʵʱÐÞ¸´Ä¿Â¼ÖеÄÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ½µµÍÔâÊÜÍøÂç¹¥»÷µÄΣº¦¡£¡£¡£CISA½«¼ÌÐø½«ÇкÏÖ¸¶¨±ê×¼µÄÎó²îÌí¼Óµ½¸ÃĿ¼ÖУ¬£¬£¬£¬£¬£¬£¬£¬²¢ÒªÇóÓû§ÔÚʹÓñ¾²úƷʱ×ñÊØÏà¹ØÍ¨ÖªºÍÒþ˽ʹÓÃÕþ²ß¡£¡£¡£
https://www.cisa.gov/news-events/alerts/2024/12/30/cisa-adds-one-known-exploited-vulnerability-catalog
6. SekoiaÍŶÓÒýÁìÈ«ÇòÐж¯£¬£¬£¬£¬£¬£¬£¬£¬ÀÖ³Éɨ³ýÊýǧPlugXÈä³æÑ¬È¾ÏµÍ³
12ÔÂ29ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬SekoiaÍþв¼ì²âÓëÑо¿ÍŶÓΪÁ˹¥»÷ÓëMustang Panda×éÖ¯Ïà¹ØµÄPlugXÈ䳿¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬£¬½ÓÄÉÁËÒ»ÏîØ¨¹ÅδÓеÄÐж¯¡£¡£¡£¸ÃÐж¯Éæ¼°ÓëÀ´×Ô20¶à¸ö¹ú¼ÒµÄ¹ú¼ÒCERTºÍÖ´·¨»ú¹¹µÄÏàÖú£¬£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚɨ³ýÊýǧ¸öÊÜѬȾµÄϵͳ¡£¡£¡£SekoiaÍŶÓͨ¹ý¿ØÖÆPlugXÈä³æÊ¹ÓõÄÒªº¦IPµØµã£¬£¬£¬£¬£¬£¬£¬£¬ÆÊÎöÁ˶ñÒâÈí¼þµÄÐÐΪ²¢¿ª·¢ÁËÏû¶¾ÒªÁì¡£¡£¡£ËûÃÇ¿ª·¢ÁËÒ»¸öÓû§ÓѺõĽçÃæ£¬£¬£¬£¬£¬£¬£¬£¬Ê¹¼ÓÈë¹úÄܹ»»á¼ûÒªº¦Í³¼ÆÊý¾Ý¡¢¾«×¼ÕûÀíÄ¿µÄºÍÆô¶¯ÌìÏÂÏû¶¾¡£¡£¡£ÎªÁËÈ·±£Çå¾²£¬£¬£¬£¬£¬£¬£¬£¬¸Ã»î¶¯½ÓÄÉÁË×Ô»ÙÏÂÁî×÷ΪÖ÷ÒªÏû¶¾ÒªÁ죬£¬£¬£¬£¬£¬£¬£¬ÆäÖÐSekoiaµÄSinkhole³äµ±ÖÐÑëÖ¸»Óµã¡£¡£¡£Ð§¹û£¬£¬£¬£¬£¬£¬£¬£¬34¸ö¹ú¼ÒÊÕµ½ÁËÎó²îÈÕÖ¾£¬£¬£¬£¬£¬£¬£¬£¬22¸ö¹ú¼Ò¶ÔÏû¶¾Àú³ÌÌåÏÖ³öō֨ÐËȤ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚÇ¿ÓÐÁ¦µÄÖ´·¨¿ò¼ÜÖ§³ÖÏ£¬£¬£¬£¬£¬£¬£¬£¬10¸ö¹ú¼ÒÆð¾¢¼ÓÈëÁËÏû¶¾Ðж¯¡£¡£¡£Õâ´Î»î¶¯ÀÖ³ÉÏû³ýÁË5,539¸öIPµØµãÉϵÄÍþв£¬£¬£¬£¬£¬£¬£¬£¬¹²·¢ËÍÁË59,475¸öÏû¶¾ÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬£¬£¬£¬Ö¤ÊµÎúÖ÷ȨÏû¶¾¿´·¨µÄÓÐÓÃÐÔ¡£¡£¡£
https://securityonline.info/global-cyber-collaboration-takes-down-plugx-worm/


¾©¹«Íø°²±¸11010802024551ºÅ