ÔÚÏßʹÃüÖÎÀíÍøÕ¾Trelloй¶´ó×ÚÓû§Êý¾Ý£»£»£»£»£»·¨¹ú¹¤Òµ¹«Ë¾Bouygues¼°5¼Ò״ʦÊÂÎñËùÔâµ½Maze¹¥»÷
Ðû²¼Ê±¼ä 2020-02-041.·¨¹ú¹¤Òµ¹«Ë¾Bouygues¼°5¼Ò״ʦÊÂÎñËùÔâµ½Maze¹¥»÷
·¨¹ú¹¤Òµ¹«Ë¾Bouygues Construction¼°Îå¼Ò״ʦÊÂÎñËù³ÉΪÀÕË÷Èí¼þMazeµÄ×îÐÂÊܺ¦Õߣ¬£¬£¬£¬£¬£¬£¬¾Ý³Æ¹¥»÷ÕßÇÔÈ¡ÁËËùÓÐÕâЩ¹«Ë¾µÄÃô¸ÐÄÚ²¿Êý¾Ý¡£¡£¡£Maze¹¥»÷ÕßÒѾÔÚÆäÍøÕ¾ÉÏÐû²¼ÁËÁ½¼Ò״ʦÊÂÎñËùµÄ¿Í»§Êý¾Ý£¬£¬£¬£¬£¬£¬£¬²¢ÔÊÐíºÜ¿ì»áÐû²¼ÆäËü¹«Ë¾µÄÊý¾Ý¡£¡£¡£BouyguesÔÚÉÏÖÜÎåÐû²¼ÁËÒ»·Ý¼ò¶ÌÉùÃ÷£¬£¬£¬£¬£¬£¬£¬ÈÏ¿ÉÔÚÆäÍøÂçÉϼì²âµ½ÀÕË÷²¡¶¾£¬£¬£¬£¬£¬£¬£¬µ«²¢Î´»ØÓ¦ÆäÒªº¦Êý¾ÝÊÇ·ñ±»µÁ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/maze-ransomware-law-firms-french/
2.Ó¢¹ú´ÈÉÆ»ú¹¹ÔâÍøÂçÚ²ÆËðʧÁè¼Ý100ÍòÃÀÔª
Ó¢¹úÉçÇø×¡·¿´ÈÉÆ»ú¹¹Red KiteÖܶþÐû²¼ËüÒѳÉÎªÍøÂçթƵÄÊܺ¦Õߣ¬£¬£¬£¬£¬£¬£¬·¸·¨·Ö×Óαװ³ÉÕæÕýµÄЧÀÍÌṩÉÌÆÈ¡ÁË93.2ÍòÓ¢°÷×ʽ𡣡£¡£Æ¾Ö¤¸Ã»ú¹¹µÄÐÎò£¬£¬£¬£¬£¬£¬£¬·¸·¨·Ö×ÓÄ£ÄâÁËÏòRed KiteÌṩЧÀ͵ÄÒÑÖªÁªÏµÈ˵ÄÓòÃûºÍµç×ÓÓʼþÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÔ±¹¤ÎóÒÔΪÕâÊÇÕæÕýµÄ¸ú½ø»á»°¡£¡£¡£¸Ã»ú¹¹»¹ÈÏ¿ÉÔ±¹¤Ã»ÓнÓÄÉÃ÷È·µÄÁ÷³Ì£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂΪ±ÜÃâÚ²ÆÐÔÉúÒâ¶øÊµÑéµÄ¸¶¿îÑéÖ¤Á÷³ÌÎÞЧ¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚ2019Äê8ÔÂÏÂÑ®£¬£¬£¬£¬£¬£¬£¬¾¯·½ÈÔÔڶԴ˾ÙÐÐÊӲ졣¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/red-kite-spoofing-scam/
3.Ç÷ÊÆ¿Æ¼¼ÐÞ¸´Æä·´Íþв¹¤¾ß°üÖеĶà¸öÎó²î
Ç÷ÊÆ¿Æ¼¼Ðû²¼·´Íþв¹¤¾ß°ü£¨ATTK£©µÄÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÓëÔÚ2019Äê10ÔÂÐÞ¸´µÄÒ»¸öÎó²îÓйصĸü¶àÎó²î¡£¡£¡£È¥ÄêÇå¾²Ñо¿Ô±John Page·¢Ã÷ATTKÊܵ½Îó²î£¨CVE-2019-9491£©µÄÓ°Ï죬£¬£¬£¬£¬£¬£¬Ô¶³Ì¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²îÔÚÏàͬµÄĿ¼ÖÐÖ²ÈëÃûΪcmd.exe»òRegedit.exeµÄ¶ñÒâÎļþÀ´ÒÔÌáÉýµÄÌØÈ¨Ö´ÐÐí§Òâ´úÂë¡£¡£¡£¸ÃÎó²îÔÚÈ¥Äê10Ôµİ汾1.62.0.1223ÖоÙÐÐÁËÐÞ²¹£¬£¬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±Stefan Kanthak·¢Ã÷ÁËÆäËüÈýÖÖÀàËÆµÄ¹¥»÷ÒªÁ죨°üÀ¨CVE-2019-20358ºÍCVE-2019-20358£©£¬£¬£¬£¬£¬£¬£¬Ç÷ÊÆ¿Æ¼¼ÔÚÉÏÖÜÐû²¼ÁËа汾1.62.0.1228ÐÞ¸´ÕâЩÎó²î¡£¡£¡£Ê¹ÓÃÕâЩÎó²îÐèÒªÎïÀí»òÔ¶³Ì»á¼ûÄ¿µÄϵͳ£¬£¬£¬£¬£¬£¬£¬µ«Ç÷ÊÆ¿Æ¼¼½¨Òé¿Í»§¾¡¿ì×°Öò¹¶¡¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/trend-micro-patches-more-vulnerabilities-anti-threat-toolkit
4.ºÚ¿ÍÆð¾¢Ê¹ÓÃNSC²úÆ·Îó²îɨÃè²¢Ð®ÖÆÖÇÄÜÃŽûϵ
ƾ֤Çå¾²³§ÉÌSonicWallµÄÒ»·Ý±¨¸æ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚÆð¾¢Ê¹ÓÃÎó²î£¨CVE-2019-7256£©À´ËÑË÷²¢Ð®ÖÆ»¥ÁªÍøÉϵÄÖÇÄÜÃŽûϵͳ£¬£¬£¬£¬£¬£¬£¬²¢ÓÃÓÚÌᳫDDoS¹¥»÷¡£¡£¡£¹¥»÷ÕßÃé×¼µÄ×°±¸ÊÇNortekÇå¾²Óë¿ØÖÆ£¨NSC£©²úÆ·Linear eMerge E3£¬£¬£¬£¬£¬£¬£¬¸Ã²úÆ·±»¹éΪӲ¼þÖֱ𡰻á¼û¿ØÖÆÏµÍ³¡±£¬£¬£¬£¬£¬£¬£¬³£±»×°ÖÃÔÚ¹«Ë¾×ܲ¿¡¢¹¤³§»ò¹¤ÒµÔ°ÇøÖС£¡£¡£2019Äê5ÔÂApplied RiskÅû¶ÁËÓйØÓ°ÏìNSC Linear eMerge E3×°±¸µÄÊ®¸öÎó²îµÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬Ö»¹ÜÓÐÁù¸öÎó²îµÄÑÏÖØÐÔ£¨CVSSv3£©µÃ·ÖΪ9.8»òÂú·Ö10·Ö£¬£¬£¬£¬£¬£¬£¬µ«NSCδÄÜÌṩ²¹¶¡¡£¡£¡£ºÚ¿ÍÕýÔÚʹÓõÄÎó²îÊÇÆäÖеÄÒ»¸öÔ¶³ÌÏÂÁîÖ´ÐÐÎó²î£¨CVE-2019-7256£©£¬£¬£¬£¬£¬£¬£¬ÆäCVSSv3µÃ·ÖΪ10·Ö¡£¡£¡£Ñо¿Ö°Ô±Í¨¹ýShodanËÑË÷ÒýÇæ·¢Ã÷ÓÐ2375¸öeMerge×°±¸Ì»Â¶ÔÚ»¥ÁªÍøÉÏ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/hackers-are-hijacking-smart-building-access-systems-to-launch-ddos-attacks/
5.ÐÂMagecart¹¥»÷À˳±Ö÷ÒªÕë¶Ôµç×ÓÉÌÎñÍø
Ñо¿Ö°Ô±·¢Ã÷Ò»¸öMagecart·¸·¨ÍŻﲻµ«Ñ¬È¾Á˶«¾©°ÂÔË»áÃÅÆ±¾ÏúÉ̵ÄÍøÕ¾£¬£¬£¬£¬£¬£¬£¬»¹ÌᳫÁËÕë¶Ôµç×ÓÉÌÎñÍøÕ¾µÄ¹¥»÷À˳±¡£¡£¡£ÉϸöÔÂÇå¾²Ñо¿Ô±Jacob PimentalºÍMax Kersten·¢Ã÷°ÂÔË»áÃÅÆ±¾ÏúÉÌÍøÕ¾olympictickets2020[.]com¼°Å·ÖÞ±ÃÅÆ±¾ÏúÉÌÍøÕ¾eurotickets2020[.]com¾ùѬȾÁËMagecart´úÂ룬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâ´úÂ뽫ËùÓб»µÁÐÅÏ¢·¢Ë͵½opendoorcdn[.]com¡£¡£¡£ÔÚ¼ÌÐøÊÓ²ìÀú³ÌÖУ¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷¶à¸öÍøÕ¾×ÔÈ¥Äê10ÔÂÒÔÀ´¾ùѬȾÁËͳһMagecart´úÂ룬£¬£¬£¬£¬£¬£¬°üÀ¨supremeproducts[.]co.uk¡¢partsplaceinc[.]com¡¢zhik[.]comµÈ¡£¡£¡£¶ñÒâ´úÂëÓɶíÂÞ˹ÍйÜЧÀÍÌṩÉÌSelectelÍйܣ¬£¬£¬£¬£¬£¬£¬ÏÖÔÚOpendoorCDNÓòÃûÒѱ»ÔÝͣЧÀÍ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/magecart-group-jumps-from-olympic-ticket-website-to-new-wave-of-e-commerce-shops/
6.ÔÚÏßʹÃüÖÎÀíÍøÕ¾Trelloй¶´ó×ÚÓû§Êý¾Ý
ƾ֤Naked SecurityµÄÒ»·Ý±¨¸æ£¬£¬£¬£¬£¬£¬£¬ÔÚÏßʹÃüÖÎÀíÍøÕ¾Trelloй¶ÁË´ó×ÚÓû§µÄ˽ÈËÊý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢ÐÔÄÜÆÀ¼¶ºÍ¹«Ë¾ÅàѵÊÓÆµµÈ¡£¡£¡£Ð¹Â¶µÄÔµ¹ÊÔÓÉÊDz¿·ÖÓû§¹ýʧµØ½«ÆäTrelloÃæ°åÉèÖÃΪpublic£¬£¬£¬£¬£¬£¬£¬ÕâʹµÃÈκÎÈ˶¼¿ÉÒÔÉó²éÆäÖеÄÄÚÈÝ£¬£¬£¬£¬£¬£¬£¬ÉõÖÁGoogleÖ®ÀàµÄËÑË÷ÒýÇæ¿ÉÒÔ½«Ãæ°åÖеÄÄÚÈÝÄÉÈëË÷Òý£¬£¬£¬£¬£¬£¬£¬½öÐèҪͨ¹ýÒ»ÖÖ³ÆÎª¡°dork¡±µÄÌØÊâÀàÐͼ´¿ÉËÑË÷µ½¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.techworm.net/2020/02/trello-search-exposes-private-data.html