AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ12¸öÎó²î£»£»£»£»£»Ñо¿Ö°Ô±·¢Ã÷TeamTNT¿ÉʹÓÃWeave Scope½ÓÊÜÔÆÖ÷»ú
Ðû²¼Ê±¼ä 2020-09-101.AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ12¸öÎó²î
AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÒÑÐÞ¸´Ó°ÏìÆäAdobe InDesign¡¢Adobe FramemakerºÍAdobe Experience Manager²úÆ·ÖеÄ12¸ö´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£´Ë´Î¸üÐÂÐÞ¸´ÁËAdobe InDesignÖÐÒòÄÚ´æË𻵵¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-9727¡¢CVE-2020-9728¡¢CVE-2020-9729¡¢CVE-2020-9730ºÍCVE-2020-9731£©£¬£¬£¬£¬£¬£¬£¬FramemakerÖÐÔ½½ç¶ÁÈ¡µ¼ÖµĴúÂëÖ´ÐÐÎó²î£¨CVE-2020-9726£©ºÍ»ùÓÚ¿ÍÕ»µÄ»º³åÇøÒç³öµÄ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-9725 £©£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Experience ManagerÖеĶà¸öXSSÎó²î¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-vulnerabilities-in-indesign-and-framemaker/
2.IntelÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÆäAMTÖÐÑÏÖØµÄÌáȨÎó²î
IntelÐû²¼9Ô·ÝÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´ÁË9¸öÎó²î¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ×îÑÏÖØµÄÎó²îΪӰÏìÁË×Ô¶¯ÖÎÀíÊÖÒÕ£¨AMT£©µÄÌáȨÎó²î£¨CVE-2020-8758£©£¬£¬£¬£¬£¬£¬£¬CVSSµÃ·ÖΪ9.8¡£¡£¡£¡£¡£¸ÃÎó²îÊÇÓÉÓÚÍøÂç×ÓϵͳÖв»Êʵ±µÄ»º³åÇøÏÞÖÆËùÖ£¬£¬£¬£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚÆóÒµÍøÂçÉÏÉý¼¶AMTϵͳÉϵÄȨÏÞ¡£¡£¡£¡£¡£¹ØÓÚδÉèÖÃAMTµÄIntel vProϵͳÓû§À´Ëµ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÈÔ¿Éͨ¹ýÍâµØ»á¼û¸ÃϵͳµÄÈÏÖ¤Óû§¾ÙÐÐÌáȨ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/intel-fixes-critical-flaw-in-corporate-remote-management-platform/
3.Ñо¿Ö°Ô±·¢Ã÷TeamTNT¿ÉʹÓÃWeave Scope½ÓÊÜÔÆÖ÷»ú
IntezerµÄÑо¿Ö°Ô±·¢Ã÷ºÚ¿Í×éÖ¯TeamTNTʹÓÿªÔ´¹¤¾ßWeave Scope£¬£¬£¬£¬£¬£¬£¬¿ÉÍêÈ«½ÓÊÜÄ¿µÄµÄÔÆÖ÷»ú¡£¡£¡£¡£¡£¾ÝIntezerÐÎò£¬£¬£¬£¬£¬£¬£¬TeamTNTÊ×ÏÈͨ¹ýÒ»¸ö̻¶µÄDocker API½øÈëÄ¿µÄϵͳ£¬£¬£¬£¬£¬£¬£¬ÒÔ½¨ÉèÒ»¸öÇå½àµÄUbuntuÈÝÆ÷£¬£¬£¬£¬£¬£¬£¬²¢½«ÆäÉèÖõ½Êܺ¦ÕßЧÀÍÆ÷ÉÏ£¬£¬£¬£¬£¬£¬£¬´Ó¶ø»ñµÃ¶ÔÖ÷»úÉϵÄÎļþµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬£¬£¬Æä½«ÉèÖÃÒ»¸öÃûΪhildeµÄÍâµØÓû§£¬£¬£¬£¬£¬£¬£¬²¢¾ÙÐÐÌáȨÒÔͨ¹ýSSHÅþÁ¬µ½Ð§ÀÍÆ÷¡£¡£¡£¡£¡£×îºó×°ÖÃWeave Scope£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ý¶Ë¿Ú4040ÅþÁ¬µ½Weave ScopeÏÔʾ½çÃæ²¢»ñµÃ¿ØÖÆÈ¨¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hackers-use-legit-tool-to-take-over-docker-kubernetes-platforms/
4.¶íÂÞ˹Áª°îͶƱʱ´úÔøÔâµ½À´×ÔÓ¢ÃÀµÈ¹ú¼ÒµÄDDoS¹¥»÷
¶íÂÞ˹ÔÚ±¾ÖÜÒ»µÄÍøÂçÇå¾²¾Û»áÉÏÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÆäÔÚ¶íÂÞ˹ÏÜ·¨ÐÞÕý°¸Í¶Æ±Ê±´ú£¨2020Äê6ÔÂ25ÈÕÖÁ7ÔÂ1ÈÕ£©£¬£¬£¬£¬£¬£¬£¬Ôâµ½ÁËÀ´×ÔÓ¢ÃÀµÈ¹ú¼ÒµÄDDoS¹¥»÷¡£¡£¡£¡£¡£¶íÂÞ˹Áª°î×ÜÍ³ÌØÊâ´ú±íÌåÏÖ£¬£¬£¬£¬£¬£¬£¬´Ë´Î»î¶¯¶ÔÖÐÑëÑ¡¾ÙίԱ»áºÍ¶íÂÞ˹ÆäËû¹ú¼Ò»ú¹¹µÄ»ù´¡ÉèÊ©¾ÙÐÐÁË´ó¹æÄ£Ï®»÷£¬£¬£¬£¬£¬£¬£¬ÃÀ¹ú¡¢Ó¢¹ú¡¢ÎÚ¿ËÀ¼ºÍһЩ¶ÀÁªÌå¹ú¼ÒÌᳫÁËÿÃë¸ß´ï24Íò¸öÇëÇóµÄDDoS¹¥»÷¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¶íÂÞ˹¹ÙÔ±±¨¸æ£¬£¬£¬£¬£¬£¬£¬ÆäÔÚ6ÔÂ27ÈÕÍíÉÏ»¹Ôâµ½Ò»´ÎÖØ´ó¹¥»÷£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÊÔͼͨ¹ý¼àÊÓÔÚÏßͶƱЧÀÍÀ´Ó°Ïìϵͳ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.ehackingnews.com/2020/09/ddos-attacks-from-usa-uk-ukraine-were.html
5.¹þÌØ¸£µÂÊÐITϵͳѬȾÀÕË÷Èí¼þµ¼Ö¸ÃÊпªÑ§ÍƳÙ
¹þÌØ¸£µÂÊÐITϵͳѬȾÀÕË÷Èí¼þµ¼Ö¸ÃÊпªÑ§ÍƳ١£¡£¡£¡£¡£Æ¾Ö¤¹þÌØ¸£µÂ¹«Á¢Ñ§Ð£Ðû²¼µÄÉùÃ÷£¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ¹¥»÷Ó°ÏìÁËѧУµÄ¶à¸öÄÚ²¿ITϵͳ£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÆäЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£Ö»¹ÜÍâµØITÖ°Ô±Ò»Ö±ÔÚÆð¾¢»Ö¸´Ð§ÀÍ£¬£¬£¬£¬£¬£¬£¬¿ÉÊÇÒÀȻδÄÜÔÚÔ¤¶¨µÄ¿ªÑ§ÈÕʵʱÍê³É¡£¡£¡£¡£¡£¸ÃÊÐÓëУ³µ¹«Ë¾Í¨Ñ¶ËùÓõÄITϵͳҲÊܵ½Ó°Ï죬£¬£¬£¬£¬£¬£¬µ¼ÖÂѧУÎÞ·¨ÉèÖúͼàÊÓУ³µõè¾¶£¬£¬£¬£¬£¬£¬£¬Òò´Ë¸ÃУ¾öÒéÍÆ³Ù¿ªÑ§Ê±¼ä£¬£¬£¬£¬£¬£¬£¬Í¬Ê±ÔÝÍ£Ô¶³Ìѧϰ¿Î³Ì¡£¡£¡£¡£¡£ÍâµØITϵͳÐÞ¸´Ê±¼äÉÐδȷ¶¨£¬£¬£¬£¬£¬£¬£¬Òò´Ë²¢²»¿ÉÈ·¶¨ÐµĿªÑ§ÈÕÆÚ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/city-of-hartford-postpones-first-day-of-school-after-ransomware-attack/
6.°Í»ù˹̹µçÁ¦¹«Ë¾Ñ¬È¾Netwalkerµ¼ÖÂÔÚÏßЧÀÍÖÐÖ¹
°Í»ù˹̹×î´óµÄ˽È˵çÁ¦¹«Ë¾K-ElectricѬȾNetwalker£¬£¬£¬£¬£¬£¬£¬µ¼Ö¼ƷѺÍÔÚÏßЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£×Ô9ÔÂ7ºÅ£¬£¬£¬£¬£¬£¬£¬K-Electric¿Í»§×îÏÈÎÞ·¨»á¼ûÔÚÏßЧÀÍ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ò²ÔÚʵÑéͨ¹ýµÇ̨վµãÖØÐ·ÓÉÓû§£¬£¬£¬£¬£¬£¬£¬µ«ÒÀȻûÄܽâ¾öÎÊÌâ¡£¡£¡£¡£¡£ºóÓÉÍâµØÇå¾²¹«Ë¾µÃÖª£¬£¬£¬£¬£¬£¬£¬ÆäÔâµ½ÁËNetwalkerÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£´Ë´ÎÍøÂç¹¥»÷±¬·¢ÔÚ9ÔÂ7ÈÕÉÏÎ磬£¬£¬£¬£¬£¬£¬ËüÖ÷ÒªÕë¶ÔµÄÊÇK-ElectricµÄÔÚÏ߼ƷÑЧÀÍ£¬£¬£¬£¬£¬£¬£¬¶ø·ÇµçÁ¦¹©Ó¦ÏµÍ³£¬£¬£¬£¬£¬£¬£¬ÒÔ´ËË÷Òª385ÍòÃÀÔªµÄÊê½ð¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/netwalker-ransomware-hits-pakistans-largest-private-power-utility/