¡¾ÍþвÇ鱨¡¿Çå¾²Ñо¿Ö°Ô±·¢Ã÷VIA C3 x86´¦Öóͷ£Æ÷±£´æºóÃÅ»úÖÆ
Çå¾²Ñо¿Ö°Ô±Christopher Domas·¢Ã÷VIA C3 x86´¦Öóͷ£Æ÷Öб£´æºóÃÅ»úÖÆ£¬£¬£¬£¬£¬¿ÉÔÊÐí¹¥»÷Õß´ÓÓû§Ä£Ê½ÌáȨµ½OSÄÚºËģʽ¡£¡£¡£¡£¡£¡£¡£¸Ã´¦Öóͷ£Æ÷ÊÇÓĘ́ÍåVIA Technologies IncÓÚ2001ÄêÖÁ2003Äê¼äÉú²úºÍÏúÊÛµÄCPUϵÁУ¬£¬£¬£¬£¬³£°²ÅÅÔÚPOS»ú¡¢ÖÇÄܵ绰ͤ¡¢ATM¡¢ÓÎÏ·×°±¸¡¢Ò½ÁÆ×°±¸ÒÔ¼°¹¤Òµ×Ô¶¯»¯×°±¸ÉÏ¡£¡£¡£¡£¡£¡£¡£Domas½«¸ÃºóÃÅ»úÖÆ³ÆÎªRosenbridge£¬£¬£¬£¬£¬µ«Ò²ÓÐÑо¿Ö°Ô±ÒÔΪ¸Ã»úÖÆ²¢²»ÊÇÒ»¸öÕæÕýµÄºóÃÅ£¬£¬£¬£¬£¬ÓÉÓÚVIA¹Ù·½ÎĵµÔøÌáµ½¸Ã»úÖÆ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/backdoor-mechanism-discovered-in-via-c3-x86-processors/
¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶÓÌá³öÕë¶ÔAndroid appµÄÐÂÐÍMan-in-the-Disk¹¥»÷
Check PointÑо¿ÍŶӷ¢Ã÷Android appµÄй¥»÷Ãæ£¬£¬£¬£¬£¬ÕâÖÖÃûΪMan-in-the-DiskµÄ¹¥»÷³¡¾°ÔÊÐí¹¥»÷Õß»á¼ûºÍ¸Ä¶¯Íⲿ´æ´¢ÉϵÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£Man-in-the-Disk¹¥»÷»ùÓÚÁ½¸öÊÂʵ£¬£¬£¬£¬£¬Ê×ÏÈ£¬£¬£¬£¬£¬ÈκÎÓ¦Óö¼¿ÉÒԸ͝ÆäËüÓ¦ÓõÄÍⲿ´æ´¢Êý¾Ý£¬£¬£¬£¬£¬Æä´Î£¬£¬£¬£¬£¬ÓÉÓÚÏÕЩËùÓÐapp¶¼ÒªÇó´ËȨÏÞ£¬£¬£¬£¬£¬Óû§Í¨³£»£»£»£»£»£»£»á²»¼ÓÏÓÒɵظøÓè´ËȨÏÞ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖËûÃÇ¿ÉÒÔÖ´ÐÐÁ½ÖÖÀàÐ͵Ĺ¥»÷£¬£¬£¬£¬£¬Ê¹ÆäËüappÍ߽⻣»£»£»£»£»£»ò½«ÆäËüapp¸üÐÂΪ¶ñÒâ°æ±¾¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://blog.checkpoint.com/2018/08/12/man-in-the-disk-a-new-attack-surface-for-android-apps/
¡¾Îó²î²¹¶¡¡¿Oracle¿ª·¢ÍŶÓÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´¸ßΣÎó²î£¨CVE-2018-3110£©
OracleÐÞ¸´ÆäÊý¾Ý¿â²úÆ·ÖеÄÒ»¸ö¸ßΣÎó²î£¨CVE-2018-3110£©£¬£¬£¬£¬£¬¾ÓÉÔ¶³ÌÉí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉʹÓøÃÎó²î½ÓÊÜÊý¾Ý¿â²¢½¨Éè¶Ôµ×²ãЧÀÍÆ÷µÄshell»á¼û¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚOracle Database ServerµÄJava VM×é¼þÖУ¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨WindowsÉϵÄ11.2.0.4¡¢12.2.0.1ºÍ12.1.0.2ÒÔ¼°Unix»òLinuxÉϵÄ12.1.0.2¡£¡£¡£¡£¡£¡£¡£½¨ÒéÓû§¾¡¿ì¾ÙÐиüС£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75310/hacking/cve-2018-3110-oracle-database.html
¡¾Îó²î²¹¶¡¡¿Ñо¿Ö°Ô±Åû¶macOSÖеÄÐÂ0 day£¬£¬£¬£¬£¬¿Éͨ¹ýÄ£ÄâÊó±êµã»÷¼ÓÔØÄÚºËÀ©Õ¹
Digita SecurityÑо¿Ö°Ô±Patrick Wardle·¢Ã÷macOSÖеÄÒ»¸öÁãÈÕÎó²î£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÄ£ÄâÊó±êµã»÷ÈÆ¹ýϵͳµÄÇå¾²»úÖÆ£¬£¬£¬£¬£¬¼ÓÔØÏµÍ³ÄÚºËÀ©Õ¹¡£¡£¡£¡£¡£¡£¡£Æ»¹ûÔÚHigh SierraÖÐÍÆ³ö¡°Óû§Åú×¼ÄÚºËÀ©Õ¹¼ÓÔØ¡±µÄÈ«ÐÂÇå¾²¹¦Ð§À´ÔöÇ¿macOSµÄÇå¾²ÐÔ£¬£¬£¬£¬£¬¸Ã¹¦Ð§ÒªÇóÓû§ÔÚÇå¾²ÉèÖýçÃæÊÖ¶¯µã»÷¡°ÔÊÐí¡±°´Å¥À´Åú×¼¼ÓÔØÈκÎÄÚºËÀ©Õ¹¡£¡£¡£¡£¡£¡£¡£µ«Patrick·¢Ã÷Á½´Î¡°°´Ï¡±Êó±ê°´Å¥µÄÊÂÎñ»á±»ÏµÍ³Îóʶ±ðΪ¡°°´Ï¡±ºÍ¡°ËÉ¿ª¡±ÕâÒ»ÍêÕûµÄµã»÷²Ù×÷£¬£¬£¬£¬£¬´Ó¶øÍ»ÆÆÆäÇå¾²»úÖÆ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75293/hacking/synthetic-mouse-click-attack.html
¡¾Îó²î²¹¶¡¡¿Ë¼¿ÆÐû²¼IOSºÍIOS XEµÄÇå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´Õë¶ÔIKEÐÒéµÄÎó²î
˼¿ÆÐÞ¸´ÁËÆäIOSºÍIOS XEÖеÄÇå¾²Îó²î£¨CVE-2018-0131£©£¬£¬£¬£¬£¬¸ÃÎó²îÊÇÕë¶ÔIKE£¨InternetÃÜÔ¿½»Á÷£©ÐÒéµÄÐÂBleichenbacher oracle¼ÓÃܹ¥»÷µÄËĸöÎó²îÖ®Ò»£¬£¬£¬£¬£¬ÆäÓàÈý¸öÎó²îÊÇ»ªÎª£¨CVE-2017-17305£©¡¢Clavister£¨CVE-2018-8753£©ºÍZyXEL£¨CVE-2018-9129£©¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ë¼¿ÆµÄ˵·¨£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß»ñÈ¡IKEv1»á»°µÄ¼ÓÃÜËæ»úÊý£¬£¬£¬£¬£¬½ø¶ø»Ö¸´Í¨¹ýIPsec·¢Ë͵ÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/cisco-patches-its-operating-systems-against-new-ike-crypto-attack/
¡¾¶ñÒâÈí¼þ¡¿Çå¾²Ñо¿ÍŶÓÐû²¼¹ØÓÚÀÕË÷Èí¼þKeyPassµÄÆÊÎö±¨¸æ
¿¨°Í˹»ùʵÑéÊÒÐû²¼¹ØÓÚÀÕË÷Èí¼þKeyPassµÄÆÊÎö±¨¸æ£¬£¬£¬£¬£¬¸ÃÀÕË÷Èí¼þÔÚ8ÔÂ·ÝÆð¾¢¾ÙÐÐÈö²¥¡£¡£¡£¡£¡£¡£¡£¸ÃÑù±¾Ê¹ÓÃC++±àд£¬£¬£¬£¬£¬²¢Í¨¹ýMS Visual Studio¾ÙÐбàÒ룬£¬£¬£¬£¬ÆäʹÓÃÁËÀà¿âMFC¡¢BoostºÍCrypto ++£¬£¬£¬£¬£¬Ñù±¾µÄPEÍ·ÖаüÀ¨ÁË×î½üµÄ±àÒëÈÕÆÚ¡£¡£¡£¡£¡£¡£¡£Ã¿Ò»¸ö¼ÓÃܵÄÎļþ¶¼»á±»Ìí¼Ó.KEYPASSÀ©Õ¹Ãû¡£¡£¡£¡£¡£¡£¡£Æä¼ÓÃÜËã·¨ÊÇAES-256£¬£¬£¬£¬£¬Ê¹ÓÃCFBģʽ²¢ÇÒIVΪ0£¬£¬£¬£¬£¬ËùÓÐÎļþµÄ¼ÓÃÜÃÜÔ¿¶¼ÎªÏàͬµÄ32×Ö½ÚÃÜÔ¿¡£¡£¡£¡£¡£¡£¡£ÆäÓëC£¦CЧÀÍÆ÷µÄͨѶÊÇͨ¹ýHTTPÒÔJSONµÄÐÎʽ´«ÊäµÄ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securelist.com/keypass-ransomware/87412/