¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20190126
Ðû²¼Ê±¼ä 2019-01-26¡¾ÆÊÎö±¨¸æ¡¿
˼¿ÆÐû²¼2019Êý¾ÝÒþ˽»ù×¼Ñо¿±¨¸æ£¬£¬£¬£¬Ì½ÌÖ×ñÊØGDPRµÄÓÅÊÆ
https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/dpbs-2019.pdfProofpointÐû²¼2019ÍøÂç´¹ÂÚ±¨¸æ£¬£¬£¬£¬Æ¾Ö¤´¹ÂÚ³ÉΪÖ÷ÒªÇ÷ÊÆ
https://www.proofpoint.com/us/resources/threat-reports/state-of-phish
¡¾ÍþвÇ鱨¡¿
Ñо¿ÍŶӷ¢Ã÷¶ñÒâÈí¼þGreyEnergyÓëZebrocyʹÓÃÏàͬµÄ»ù´¡ÉèÊ©https://ics-cert.kaspersky.com/reports/2019/01/24/greyenergys-overlap-with-zebrocy/
¡¾Êý¾Ýй¶¡¿
Ó¢¹úB£¦QÊÐËÁÒâÍâй¶7ÍòÆð͵ÇÔ°¸ÐÅÏ¢£¬£¬£¬£¬°üÀ¨ÏÓ·¸ÐÕÃûhttps://www.grahamcluley.com/bq-data-leak-exposes-information-on-70000-thefts-from-its-stores-including-names-of-suspected-offenders/
¡¾Çå¾²Îó²î¡¿
Python³£ÓÿâNumPy±£´æÉÐδÐÞ¸´µÄÔ¶³Ì´úÂëÖ´ÐÐÎó²îhttps://www.bleepingcomputer.com/news/security/numpy-is-awaiting-fix-for-critical-remote-code-execution-bug/
ÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí