DoorDashÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬½ü500ÍòÓû§ÐÅϢй¶£»£»£»£»£»£»Å·Ö޿տ͹«Ë¾ÔÚÒÑÍù12¸öÔÂÄÚÔâµ½4´ÎÖØ´óÍøÂç¹¥»÷
Ðû²¼Ê±¼ä 2019-09-27
ËͲÍЧÀÍDoorDashÐû²¼ÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬µ¼Ö½ü500ÍòÏûºÄÕß¡¢ËͲÍÔ±¼°²Í¹ÝÉÌÈ˵ÄСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£Æ¾Ö¤ÆäÍøÕ¾ÉÏÐû²¼µÄÇ徲֪ͨ£¬£¬£¬£¬£¬£¬Î´ÊÚȨµÄµÚÈý·½ÔÚ2019Äê5ÔÂ4ÈÕ»ñµÃÁË¸ÃÆ½Ì¨Óû§Êý¾ÝµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄÓû§½ö°üÀ¨ÔÚ2018Äê4ÔÂ5ÈÕǰע²á¸Ãƽ̨µÄÓû§¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢ËÍ»õµØµã¡¢µç»°ºÅÂëºÍ¹þÏ£ÃÜÂëÒÔ¼°ÒøÐп¨ºóËÄλºÍ½ü10ÍòËͲÍÔ±µÄ¼ÝÕÕºÅÂëµÈ¡£¡£¡£DoorDashÇ¿µ÷ûÓÐÍêÕûµÄÐÅÓÿ¨ÐÅÏ¢»òÍêÕûµÄÒøÐп¨ÕË»§ºÅÂëй¶¡£¡£¡£ÊÂÎñ±¬·¢µÄÔµ¹ÊÔÓÉÉв»ÇåÎú£¬£¬£¬£¬£¬£¬µ«DoorDashÌåÏÖÓëµÚÈý·½Ð§ÀÍÌṩÉÌÓйء£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/doordash-data-breach-impacts-personal-data-of-almost-5m-users/148724/2.ÎÖ´ï·áÒÆ¶¯Ó¦Óñ£´æÎó²îµ¼Ö²¿·Ö¿Í»§ÐÅϢй¶
ÐÂÎ÷À¼ÎÖ´ï·áµÄÒÆ¶¯appÔÚÖÜÈýÔçÉϵÄһС¶Îʱ¼äÄÚ·ºÆðÎó²î£¬£¬£¬£¬£¬£¬µ¼Ö¿ͻ§¿ÉÒÔ¿´µ½ÆäËû¿Í»§µÄÏêϸÐÅÏ¢¡£¡£¡£¸ÃappÖ¼ÔÚÖÎÀíÓû§µÄÎÖ´ï·áÕÊ»§£¬£¬£¬£¬£¬£¬²¢Ìṩ¶ÔÕ˵¥»ò¿ÉÓÃЧÀ͵ĿìËÙ»á¼û¡£¡£¡£¸Ã¹«Ë¾Ö¤ÊµÁËÕâÒ»ÊÂÎñ£¬£¬£¬£¬£¬£¬³ÆÕâÊÇÓÉÓÚÍýÏëÄÚµÄÓ¦ÓÃÉý¼¶Àú³Ì·ºÆð¹ýʧµ¼Öµģ¬£¬£¬£¬£¬£¬Ê¹µÃÓû§¹ýʧµØµÇ¼µ½ÆäËûÈ˵ÄÕË»§¡£¡£¡£¸ÃÎÊÌⲢδһÁ¬ºÜ³¤Ê±¼ä£¬£¬£¬£¬£¬£¬ÎÖ´ï·áÔÚ15·ÖÖÓºó¾Í»Ø¹öÁËÕâÒ»Éý¼¶¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÓм¸¶àÓû§µÄСÎÒ˽¼ÒÐÅÏ¢Òò´Ë¶ø¹ûÕæ£¬£¬£¬£¬£¬£¬ÎÖ´ï·áÌåÏÖÕýÔÚ½ôÆÈÆÀ¹ÀÊÜÓ°ÏìµÄÈËÊý¼°Ï¸½Ú£¬£¬£¬£¬£¬£¬²¢È·¶¨Í¨ÖªÕâЩ¿Í»§ÐèÒª½ÓÄɵİ취¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/vodafones-mobile-app-briefly-exposed-customer-information/3.iOS 13ºÍiPadOSÎó²î¿Éµ¼ÖµÚÈý·½¼üÅÌ»ñÈ¡ÍêÈ«»á¼ûȨÏÞ

Æ»¹û¹Ù·½Ðû²¼ÁËÒ»·ÝеÄÖ§³ÖÎĵµ£¬£¬£¬£¬£¬£¬ÖÒÑÔÓû§ÓйØiOS 13ºÍiPadOSµÚÈý·½¼üÅ̱£´æµÄÇå¾²Îó²î¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬Ò»Ð©µÚÈý·½¼üÅÌÈí¼þ×ÝȻδ±»Åú×¼ÍêÈ«»á¼ûȨÏÞÒ²¿ÉÄÜ»áÓÉÓÚiOS 13ºÍiPadOSÖеÄÎó²î¶ø±»ÊÚÓèÍêÈ«»á¼ûȨÏÞ¡£¡£¡£ÕâÒ»ÎÊÌâÓ°ÏìÁËiPhone¡¢iPad»òiPod touch×°ÖõļüÅÌ£¬£¬£¬£¬£¬£¬µ«²»Ó°ÏìÆ»¹ûµÄÄÚÖüüÅÌ£¬£¬£¬£¬£¬£¬Ò²²»»áÓ°ÏìδʹÓÃÍêÈ«»á¼ûȨÏ޵ĵÚÈý·½¼üÅÌ£¬£¬£¬£¬£¬£¬Æ»¹û½«ÔÚ¼´½«µ½À´µÄÈí¼þ¸üÐÂÖÐÐÞ¸´´ËÎó²î¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/bug-granting-full-access-keyboards/148638/4.Å·Ö޿տ͹«Ë¾ÔÚÒÑÍù12¸öÔÂÄÚÔâµ½4´ÎÖØ´óÍøÂç¹¥»÷
ƾ֤·¨ÐÂÉ籨µÀ£¬£¬£¬£¬£¬£¬Å·ÖÞ¿ÕÖпͳµ¹«Ë¾ÔÚÒÑÍù12¸öÔÂÖÐÖÁÉÙÔâµ½4´ÎÖØ´óÍøÂç¹¥»÷¡£¡£¡£2019ÄêÍ·£¬£¬£¬£¬£¬£¬¿Õ¿ÍÐû³ÆÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÁ˸ù«Ë¾µÄ¡°ÉÌÓú½ÐÐÓªÒµ¡±ÏµÍ³²¢»ñµÃÁ˲¿·ÖÔ±¹¤Òþ˽ÐÅÏ¢µÄ»á¼ûȨÏÞ¡£¡£¡£·¨ÐÂÉ籨µÀ³Æ¸ÃÊÂÎñÊÇÈ¥Äê¾ÙÐеÄÒ»Ïî¸ü´ó¹æÄ£Ðж¯µÄÒ»²¿·Ö¡£¡£¡£ÔÚÕâһϵÁй©Ó¦Á´¹¥»÷ÖУ¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹Õë¶ÔÁËÓ¢¹ú·¢ÄîÍ·ÖÆÔìÉÌRolls-RoyceºÍ·¨¹úÊÖÒÕ×Éѯ¹«Ë¾¼°¹©Ó¦ÉÌExpleo£¬£¬£¬£¬£¬£¬ÒÔ¼°ÁíÍâÁ½¼Ò·¨¹ú¿Õ¿Í³Ð°üÉÌ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/91744/hacking/airbus-suppliers-attacks.html
5.¼ÓÄôóÍøÂçÇå¾²ÖÐÐÄÖÒÑÔÀÕË÷Èí¼þTFlowerµÄбäÌå
¼ÓÄôóÍøÂçÇå¾²ÖÐÐÄ£¨CCCS£©Ðû²¼ÓйØÀÕË÷Èí¼þTFlowerбäÖֵĹ¥»÷»î¶¯µÄ¾¯±¨¡£¡£¡£¸Ã±äÖÖÓÚ7ÔÂ30ÈÕ±»·¢Ã÷£¬£¬£¬£¬£¬£¬Ö÷Ҫͨ¹ýδ´ò²¹¶¡µÄÔ¶³Ì×ÀÃæÐ§ÀÍÈö²¥£¬£¬£¬£¬£¬£¬µ«Ò²¿ÉÄÜͨ¹ýÀ¬»øÓʼþ¡¢ÓÕÆÐÔÏÂÔØ¡¢½©Ê¬ÍøÂç¡¢¶ñÒâ¹ã¸æ¡¢web×¢Èë¡¢Ðéα¸üлòÊÜѬȾµÄ×°ÖðüÈö²¥¡£¡£¡£ÔÚѬȾϵͳºó£¬£¬£¬£¬£¬£¬¸Ã±äÖÖ»áʵÑéͨ¹ýPowerShell Empire¡¢PSExecµÈ¹¤¾ßÔÚÍøÂçÉϺáÏòÒÆ¶¯¡£¡£¡£¸Ã±äÖÖ»áÏÈÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬£¬È»ºóɾ³ý¾íÓ°¸±±¾²¢½ûÓÃwin10ÖеĻָ´¹¦Ð§£¬£¬£¬£¬£¬£¬×îºóÐÞ¸Ä×¢²á±íÀ´»ñÈ¡³¤ÆÚÐÔ¼°¼ÓÃÜÓû§µÄÎļþ¡£¡£¡£CCCS½¨ÒéϵͳËùÓÐÕßÁ¬Ã¦Ó¦ÓÃ×îеÄÇå¾²²¹¶¡²¢ÔÚ»á¼ûÓʼþÖеÄÁ´½Ó»ò·¿ª¸½¼þʱ¼á³ÖСÐÄ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://cyber.gc.ca/en/alerts/tflower-ransomware-campaign
6.EmsisoftÐû²¼ÀÕË÷Èí¼þWannaCryFakeµÄ½âÃܹ¤¾ß
EmsisoftÑо¿Ö°Ô±Ðû²¼ÀÕË÷Èí¼þWannaCryFakeµÄÃ⺬»ìÃܹ¤¾ß¡£¡£¡£WannaCryFakeÊÇÒ»¿îʹÓÃAES-256¼ÓÃÜÊܺ¦ÕßÎļþµÄÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬¸ÃÀÕË÷Èí¼þ»áÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.[<id>][recoverydata54@protonmail.com].WannaCryÀ©Õ¹Ãû¡£¡£¡£Æ¾Ö¤¹¥»÷ÕßµÄ˵·¨£¬£¬£¬£¬£¬£¬Êê½ðµÄ¼ÛÇ®ÓëÁªÏµËûÃǵÄËÙÂÊÓйأ¬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±ÌåÏÖÔÚÈκÎÇéÐÎ϶¼²»Ó¦¸ÃʵÑéÁªÏµ¹¥»÷Õß¡£¡£¡£¸Ã½âÃÜÆ÷¿É´ÓEmsisoft¹ÙÍøÉÏÏÂÔØ»ñµÃ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/91715/malware/wannacryfake-ransomware-decryptor.html