DoorDashÔâºÚ¿ÍÈëÇÖ£¬£¬£¬ £¬£¬ £¬½ü500ÍòÓû§ÐÅϢй¶£»£»£»£»£»£»Å·Ö޿տ͹«Ë¾ÔÚÒÑÍù12¸öÔÂÄÚÔâµ½4´ÎÖØ´óÍøÂç¹¥»÷

Ðû²¼Ê±¼ä 2019-09-27
1.DoorDashÔâºÚ¿ÍÈëÇÖ£¬£¬£¬ £¬£¬ £¬½ü500ÍòÓû§ÐÅϢй¶

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

ËͲÍЧÀÍDoorDashÐû²¼ÔâºÚ¿ÍÈëÇÖ£¬£¬£¬ £¬£¬ £¬µ¼Ö½ü500ÍòÏûºÄÕß¡¢ËͲÍÔ±¼°²Í¹ÝÉÌÈ˵ÄСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£Æ¾Ö¤ÆäÍøÕ¾ÉÏÐû²¼µÄÇ徲֪ͨ£¬£¬£¬ £¬£¬ £¬Î´ÊÚȨµÄµÚÈý·½ÔÚ2019Äê5ÔÂ4ÈÕ»ñµÃÁË¸ÃÆ½Ì¨Óû§Êý¾ÝµÄ»á¼ûȨÏÞ£¬£¬£¬ £¬£¬ £¬ÊÜÓ°ÏìµÄÓû§½ö°üÀ¨ÔÚ2018Äê4ÔÂ5ÈÕǰע²á¸Ãƽ̨µÄÓû§¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢ËÍ»õµØµã¡¢µç»°ºÅÂëºÍ¹þÏ£ÃÜÂëÒÔ¼°ÒøÐп¨ºóËÄλºÍ½ü10ÍòËͲÍÔ±µÄ¼ÝÕÕºÅÂëµÈ¡£¡£¡£DoorDashÇ¿µ÷ûÓÐÍêÕûµÄÐÅÓÿ¨ÐÅÏ¢»òÍêÕûµÄÒøÐп¨ÕË»§ºÅÂëй¶¡£¡£¡£ÊÂÎñ±¬·¢µÄÔµ¹ÊÔ­ÓÉÉв»ÇåÎú£¬£¬£¬ £¬£¬ £¬µ«DoorDashÌåÏÖÓëµÚÈý·½Ð§ÀÍÌṩÉÌÓйØ¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/doordash-data-breach-impacts-personal-data-of-almost-5m-users/148724/

2.ÎÖ´ï·áÒÆ¶¯Ó¦Óñ£´æÎó²îµ¼Ö²¿·Ö¿Í»§ÐÅϢй¶


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÐÂÎ÷À¼ÎÖ´ï·áµÄÒÆ¶¯appÔÚÖÜÈýÔçÉϵÄһС¶Îʱ¼äÄÚ·ºÆðÎó²î£¬£¬£¬ £¬£¬ £¬µ¼Ö¿ͻ§¿ÉÒÔ¿´µ½ÆäËû¿Í»§µÄÏêϸÐÅÏ¢¡£¡£¡£¸ÃappÖ¼ÔÚÖÎÀíÓû§µÄÎÖ´ï·áÕÊ»§£¬£¬£¬ £¬£¬ £¬²¢Ìṩ¶ÔÕ˵¥»ò¿ÉÓÃЧÀ͵ĿìËÙ»á¼û¡£¡£¡£¸Ã¹«Ë¾Ö¤ÊµÁËÕâÒ»ÊÂÎñ£¬£¬£¬ £¬£¬ £¬³ÆÕâÊÇÓÉÓÚÍýÏëÄÚµÄÓ¦ÓÃÉý¼¶Àú³Ì·ºÆð¹ýʧµ¼Öµģ¬£¬£¬ £¬£¬ £¬Ê¹µÃÓû§¹ýʧµØµÇ¼µ½ÆäËûÈ˵ÄÕË»§¡£¡£¡£¸ÃÎÊÌⲢδһÁ¬ºÜ³¤Ê±¼ä£¬£¬£¬ £¬£¬ £¬ÎÖ´ï·áÔÚ15·ÖÖÓºó¾Í»Ø¹öÁËÕâÒ»Éý¼¶¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÓм¸¶àÓû§µÄСÎÒ˽¼ÒÐÅÏ¢Òò´Ë¶ø¹ûÕæ£¬£¬£¬ £¬£¬ £¬ÎÖ´ï·áÌåÏÖÕýÔÚ½ôÆÈÆÀ¹ÀÊÜÓ°ÏìµÄÈËÊý¼°Ï¸½Ú£¬£¬£¬ £¬£¬ £¬²¢È·¶¨Í¨ÖªÕâЩ¿Í»§ÐèÒª½ÓÄɵİ취¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/vodafones-mobile-app-briefly-exposed-customer-information/

3.iOS 13ºÍiPadOSÎó²î¿Éµ¼ÖµÚÈý·½¼üÅÌ»ñÈ¡ÍêÈ«»á¼ûȨÏÞ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

Æ»¹û¹Ù·½Ðû²¼ÁËÒ»·ÝеÄÖ§³ÖÎĵµ£¬£¬£¬ £¬£¬ £¬ÖÒÑÔÓû§ÓйØiOS 13ºÍiPadOSµÚÈý·½¼üÅ̱£´æµÄÇå¾²Îó²î¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬ £¬£¬ £¬Ò»Ð©µÚÈý·½¼üÅÌÈí¼þ×ÝȻδ±»Åú×¼ÍêÈ«»á¼ûȨÏÞÒ²¿ÉÄÜ»áÓÉÓÚiOS 13ºÍiPadOSÖеÄÎó²î¶ø±»ÊÚÓèÍêÈ«»á¼ûȨÏÞ¡£¡£¡£ÕâÒ»ÎÊÌâÓ°ÏìÁËiPhone¡¢iPad»òiPod touch×°ÖõļüÅÌ£¬£¬£¬ £¬£¬ £¬µ«²»Ó°ÏìÆ»¹ûµÄÄÚÖüüÅÌ£¬£¬£¬ £¬£¬ £¬Ò²²»»áÓ°ÏìδʹÓÃÍêÈ«»á¼ûȨÏ޵ĵÚÈý·½¼üÅÌ£¬£¬£¬ £¬£¬ £¬Æ»¹û½«ÔÚ¼´½«µ½À´µÄÈí¼þ¸üÐÂÖÐÐÞ¸´´ËÎó²î¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://threatpost.com/bug-granting-full-access-keyboards/148638/

4.Å·Ö޿տ͹«Ë¾ÔÚÒÑÍù12¸öÔÂÄÚÔâµ½4´ÎÖØ´óÍøÂç¹¥»÷


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤·¨ÐÂÉ籨µÀ£¬£¬£¬ £¬£¬ £¬Å·ÖÞ¿ÕÖпͳµ¹«Ë¾ÔÚÒÑÍù12¸öÔÂÖÐÖÁÉÙÔâµ½4´ÎÖØ´óÍøÂç¹¥»÷¡£¡£¡£2019ÄêÍ·£¬£¬£¬ £¬£¬ £¬¿Õ¿ÍÐû³ÆÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ £¬£¬ £¬ºÚ¿ÍÈëÇÖÁ˸ù«Ë¾µÄ¡°ÉÌÓú½ÐÐÓªÒµ¡±ÏµÍ³²¢»ñµÃÁ˲¿·ÖÔ±¹¤Òþ˽ÐÅÏ¢µÄ»á¼ûȨÏÞ¡£¡£¡£·¨ÐÂÉ籨µÀ³Æ¸ÃÊÂÎñÊÇÈ¥Äê¾ÙÐеÄÒ»Ïî¸ü´ó¹æÄ£Ðж¯µÄÒ»²¿·Ö¡£¡£¡£ÔÚÕâһϵÁй©Ó¦Á´¹¥»÷ÖУ¬£¬£¬ £¬£¬ £¬¹¥»÷Õß»¹Õë¶ÔÁËÓ¢¹ú·¢ÄîÍ·ÖÆÔìÉÌRolls-RoyceºÍ·¨¹úÊÖÒÕ×Éѯ¹«Ë¾¼°¹©Ó¦ÉÌExpleo£¬£¬£¬ £¬£¬ £¬ÒÔ¼°ÁíÍâÁ½¼Ò·¨¹ú¿Õ¿Í³Ð°üÉÌ¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/91744/hacking/airbus-suppliers-attacks.html

5.¼ÓÄôóÍøÂçÇå¾²ÖÐÐÄÖÒÑÔÀÕË÷Èí¼þTFlowerµÄбäÌå


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¼ÓÄôóÍøÂçÇå¾²ÖÐÐÄ£¨CCCS£©Ðû²¼ÓйØÀÕË÷Èí¼þTFlowerбäÖֵĹ¥»÷»î¶¯µÄ¾¯±¨¡£¡£¡£¸Ã±äÖÖÓÚ7ÔÂ30ÈÕ±»·¢Ã÷£¬£¬£¬ £¬£¬ £¬Ö÷Ҫͨ¹ýδ´ò²¹¶¡µÄÔ¶³Ì×ÀÃæÐ§ÀÍÈö²¥£¬£¬£¬ £¬£¬ £¬µ«Ò²¿ÉÄÜͨ¹ýÀ¬»øÓʼþ¡¢ÓÕÆ­ÐÔÏÂÔØ¡¢½©Ê¬ÍøÂç¡¢¶ñÒâ¹ã¸æ¡¢web×¢Èë¡¢Ðéα¸üлòÊÜѬȾµÄ×°ÖðüÈö²¥¡£¡£¡£ÔÚѬȾϵͳºó£¬£¬£¬ £¬£¬ £¬¸Ã±äÖÖ»áʵÑéͨ¹ýPowerShell Empire¡¢PSExecµÈ¹¤¾ßÔÚÍøÂçÉϺáÏòÒÆ¶¯¡£¡£¡£¸Ã±äÖÖ»áÏÈÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬ £¬£¬ £¬È»ºóɾ³ý¾íÓ°¸±±¾²¢½ûÓÃwin10ÖеĻָ´¹¦Ð§£¬£¬£¬ £¬£¬ £¬×îºóÐÞ¸Ä×¢²á±íÀ´»ñÈ¡³¤ÆÚÐÔ¼°¼ÓÃÜÓû§µÄÎļþ¡£¡£¡£CCCS½¨ÒéϵͳËùÓÐÕßÁ¬Ã¦Ó¦ÓÃ×îеÄÇå¾²²¹¶¡²¢ÔÚ»á¼ûÓʼþÖеÄÁ´½Ó»ò·­¿ª¸½¼þʱ¼á³ÖСÐÄ¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://cyber.gc.ca/en/alerts/tflower-ransomware-campaign

6.EmsisoftÐû²¼ÀÕË÷Èí¼þWannaCryFakeµÄ½âÃܹ¤¾ß


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


EmsisoftÑо¿Ö°Ô±Ðû²¼ÀÕË÷Èí¼þWannaCryFakeµÄÃ⺬»ìÃܹ¤¾ß¡£¡£¡£WannaCryFakeÊÇÒ»¿îʹÓÃAES-256¼ÓÃÜÊܺ¦ÕßÎļþµÄÀÕË÷Èí¼þ£¬£¬£¬ £¬£¬ £¬¸ÃÀÕË÷Èí¼þ»áÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.[<id>][recoverydata54@protonmail.com].WannaCryÀ©Õ¹Ãû¡£¡£¡£Æ¾Ö¤¹¥»÷ÕßµÄ˵·¨£¬£¬£¬ £¬£¬ £¬Êê½ðµÄ¼ÛÇ®ÓëÁªÏµËûÃǵÄËÙÂÊÓйأ¬£¬£¬ £¬£¬ £¬µ«Ñо¿Ö°Ô±ÌåÏÖÔÚÈκÎÇéÐÎ϶¼²»Ó¦¸ÃʵÑéÁªÏµ¹¥»÷Õß¡£¡£¡£¸Ã½âÃÜÆ÷¿É´ÓEmsisoft¹ÙÍøÉÏÏÂÔØ»ñµÃ¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/91715/malware/wannacryfake-ransomware-decryptor.html