ÎÚ¿ËÀ¼µÄ¶à¸ö¹Ù·½×éÖ¯ÔÙÒ»´ÎÔâµ½´ó¹æÄ£DDoS¹¥»÷
Ðû²¼Ê±¼ä 2022-02-25ÎÚ¿ËÀ¼µÄ¶à¸ö¹Ù·½×éÖ¯ÔÙÒ»´ÎÔâµ½´ó¹æÄ£DDoS¹¥»÷
¾ÝýÌå2ÔÂ23Èճƣ¬£¬£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼µÄ¶à¸ö¹Ù·½×éÖ¯ÔÙ´ÎÔâµ½´ó¹æÄ£DDoS¹¥»÷¡£¡£¡£´Ë´ÎÊܵ½¹¥»÷µÄ×éÖ¯°üÀ¨ÎÚ¿ËÀ¼Íâ½»²¿¡¢¹ú·À²¿¡¢ÄÚÕþ²¿¡¢Çå¾²¾ÖºÍÄڸ󣬣¬£¬£¬£¬£¬£¬ÒÔ¼°ÎÚ¿ËÀ¼×î´óµÄÒøÐÐPrivatbankºÍ¹ú¼Ò´¢±¸ÒøÐÐOschadbank¡£¡£¡£ÎÚ¿ËÀ¼SSSCIPÌåÏÖ£¬£¬£¬£¬£¬£¬£¬¹¥»÷»î¶¯µ¼Ö²¿·Öϵͳ²»¿ÉÓûòÖ»Äܶ϶ÏÐøÐøµØÊÂÇ飬£¬£¬£¬£¬£¬£¬ËûÃÇÕýÔÚÆð¾¢Ó¦¶Ô¹¥»÷²¢ÍøÂçÆÊÎöÐÅÏ¢¡£¡£¡£ÉÏÖÜ£¬£¬£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼µÄ¶à¸öÕþ¸®»ú¹¹ºÍÒøÐÐÔøÔâµ½DDoS¹¥»÷¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ukrainian-government-and-banks-once-again-hit-by-ddos-attacks/
DevOpsÔÚ¹Ù·½NPM¿âÖз¢Ã÷25¸ö¶ñÒâµÄJavaScript¿â
¾ÝýÌå2ÔÂ22ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Çå¾²¹«Ë¾DevOpsÔÚ¹Ù·½NPM¿âÖз¢Ã÷ÁË25¸ö¶ñÒâµÄJavaScript¿â¡£¡£¡£ÕâЩ¶ñÒâµÄ¿âαװ³ÉÕýµ±Èí¼þ°ü£¬£¬£¬£¬£¬£¬£¬ÀýÈçcolors.js¡¢crypto-js¡¢discord.js¡¢marked ºÍnoblox.jsµÈ£¬£¬£¬£¬£¬£¬£¬Ä¿µÄÊÇ´ÓÄ¿µÄϵͳÖÐÇÔÈ¡DiscordÁîÅÆºÍÇéÐαäÁ¿¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÕâЩJavaScript¿âÒѱ»É¾³ý¡£¡£¡£ÔçÔÚ2021Äê12Ô·ݣ¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±¾ÍÔÚNPM¿âÖз¢Ã÷²¢É¾³ýÁË17¸öÀàËÆµÄ¶ñÒâ°ü¡£¡£¡£
https://thehackernews.com/2022/02/25-malicious-javascript-libraries.html
ÔÚÏßÉ̳ÇMelijoeµÄS3´æ´¢Í°ÉèÖùýʧй¶200GBÊý¾Ý
SafetyDetectivesÔÚ2ÔÂ21ÈÕ͸¶£¬£¬£¬£¬£¬£¬£¬¶ùͯ´ò°çÔÚÏßÉ̳ÇMelijoeµÄS3´æ´¢Í°ÉèÖùýʧ¡£¡£¡£´Ë´Îй¶Á˶à´ï200 GBµÄ½ü200Íò¸öÎļþ£¬£¬£¬£¬£¬£¬£¬Éæ¼°Ô¼20Íò¸öÓû§¡£¡£¡£Ñо¿Ö°Ô±×ܹ²·¢Ã÷ÁË3¸öÊý¾Ý¼¯£¬£¬£¬£¬£¬£¬£¬¹ØÓÚ¿Í»§µÄ¹ºÖÃÐÅÏ¢¡¢Æ«ºÃºÍÔ¸ÍûÇåµ¥£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢ÓʼþµØµã¡¢Ö§¸¶·½·¨ºÍËÍ»õÐÅÏ¢µÈ¡£¡£¡£¸Ã´æ´¢¿âÓÚ2021Äê11ÔÂ12ÈÕ±»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Ö±µ½2022Äê2ÔÂ18ÈղŻñµÃ±£»£»£»£»£»£»£»¤¡£¡£¡£
https://www.hackread.com/kids-luxury-clothing-store-melijoe-data-exposed/
SonarSource·¢Ã÷Horde WebmailÖб£´æ9ÄêµÄXSSÎó²î
SonarSourceÔÚ2ÔÂ22ÈÕÅû¶ÁËHorde WebmailÖÐ×Ô2012Äêµ×Ò»Ö±±£´æµÄXSSÎó²îµÄϸ½Ú¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý¶ñÒâOpenOfficeÎĵµÊ¹ÓøÃÎó²î£¬£¬£¬£¬£¬£¬£¬µ±Horde½«Æäת»»ÎªXHTMLÔ¤ÀÀʱ£¬£¬£¬£¬£¬£¬£¬¾Í»áÖ´ÐиÃÎĵµÖеĶñÒâJavaScript£¬£¬£¬£¬£¬£¬£¬´Ó¶øµ¼Ö´洢ÐÍXSS¹¥»÷¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÓÃÀ´Ð®ÖÆÓû§µÄÓʼþÕÊ»§£¬£¬£¬£¬£¬£¬£¬ÉõÖÁÊÇ¿ØÖÆÕû¸öÓʼþЧÀÍÆ÷¡£¡£¡£×îºó£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹ÌṩÁËÓйØÔõÑù»º½â´ËÎó²îµÄ½¨Òé¡£¡£¡£
https://therecord.media/unpatched-bug-allows-takeover-of-horde-webmail-accounts-servers/
ÎÚ¿ËÀ¼¾¯·½µ·»ÙÒ»¸öÍøÂç´¹ÂÚÍŻﲢ¾Ð²¶5Ãû³ÉÔ±
¾Ý2ÔÂ22ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼¾¯·½ÆÆ»ñÁËÒ»¸öÍøÂç´¹ÂÚÍŻﲢ¾Ð²¶ÁËÆä5Ãû³ÉÔ±¡£¡£¡£¸ÃÍÅ»ïÓµÓÐ40¶à¸ö´¹ÂÚÍøÕ¾£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÁËÖÁÉÙ70000¶à¸öÄ¿µÄ²¢ÀÖ³ÉÇÔÈ¡ÁËËûÃǵÄÖ§¸¶¿¨ÐÅÏ¢¡£¡£¡£¾¯·½Ô¤¼Æ¸ÃÍÅ»ï×ܹ²Ôì³É500Íò¸ñÀï·òÄÉ£¨175000ÃÀÔª£©µÄ¾¼ÃËðʧ£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚûÊÕÁËÆä200Íò¸ñÀï·òÄÉ¡£¡£¡£±»¾Ð²¶µÄÏÓÒÉÈËÃæÁÙÎÚ¿ËÀ¼¡¶ÐÌ·¨¡·µÚ361ÌõµÚ2²¿·ÖºÍµÚ190ÌõµÚ3²¿·ÖµÄÐÌÊÂÖ¸¿Ø£¬£¬£¬£¬£¬£¬£¬×î¸ß¿ÉÅд¦8Äêî¿Ïµ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/police-bust-phishing-group-that-used-40-sites-to-steal-credit-cards/
ProofpointÐû²¼2021ÄêÍøÂç´¹ÂÚÌ¬ÊÆµÄÆÊÎö±¨¸æ
2ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬£¬ProofpointÐû²¼ÁË2021ÄêÍøÂç´¹ÂÚÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬È¥ÄêÁè¼Ý91%µÄÓ¢¹ú×éÖ¯±»´¹ÂÚ¹¥»÷ÈëÇÖ£¬£¬£¬£¬£¬£¬£¬78%µÄ×éÖ¯³ÉΪ»ùÓÚÓʼþµÄÀÕË÷¹¥»÷µÄÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬77%µÄ×éÖ¯Ôâµ½BEC¹¥»÷£¨Í¬±ÈÔöÌí18%£©¡£¡£¡£Ñ¬È¾ÀÕË÷Èí¼þµÄ×éÖ¯ÖУ¬£¬£¬£¬£¬£¬£¬60%Ö§¸¶ÁËÊê½ð£¬£¬£¬£¬£¬£¬£¬32%»¹ÌØÊâÖ§¸¶ÁË×ʽðÒÔÖØ»ñ¶ÔÊý¾ÝºÍϵͳµÄ»á¼ûȨÏÞ¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬£¬£¬£¬¹¥»÷µÄÊýÄ¿ºÍÀÖ³ÉÂʵÄÔöÌíÓëתÏò»ìÏýÊÂÇéģʽÓйأ¬£¬£¬£¬£¬£¬£¬È¥ÄêÓдó×ÚÔ±¹¤¾ÙÐÐÔ¶³Ì°ì¹«£¬£¬£¬£¬£¬£¬£¬µ«Ö»ÓÐÉÙÊý×éÖ¯¶ÔÔ±¹¤¾ÙÐÐÔ¶³ÌÊÂÇéµÄÇå¾²½ÌÓý¡£¡£¡£
https://www.proofpoint.com/us/resources/threat-reports/state-of-phish
Çå¾²¹¤¾ß
Jatayu
ÒþÉí×ÔÁ¦PHP Web Shell£¬£¬£¬£¬£¬£¬£¬»ùÓÚHttp±êÍ·µÄÉí·ÝÑéÖ¤¡£¡£¡£
https://github.com/SpiderMate/Jatayu
Chain Reactor
ÊÇÒ»¸ö¿ªÔ´¹¤¾ß£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÔÚLinux»úеÉϲâÊÔ¼ì²âºÍÏìÓ¦ÁýÕÖÂÊ¡£¡£¡£
https://github.com/redcanaryco/chain-reactor
Boko
ÊÊÓÃÓÚmacOSµÄÓ¦ÓóÌÐòɨÃè³ÌÐò£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚËÑË÷ºÍʶ±ðDZÔÚdylibÐ®ÖÆºÍÈõdylibÎó²î£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Ó¦ÓÿÉÄܱ»ºóÃÅ»á¼ûµÄ¾ç±¾¡£¡£¡£
https://github.com/bashexplode/boko
Android Disassembler
ÊÇÒ»¿îÄܹ»ÆÊÎö¶àÖÖÀàÐÍÎļþµÄÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬£¬ÆÊÎöÊÖ»úÉϵĶñÒâÓ¦Óᣡ£¡£
https://github.com/KYHSGeekCode/Android-Disassembler
fastfinder
ÇáÁ¿¼¶¹¤¾ß£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÔÚ Windows ºÍ Linux ƽ̨ÉϾÙÐÐÍþв׷×Ù¡¢ÊµÊ±È¡Ö¤ºÍ·ÖÀà¡£¡£¡£
https://github.com/codeyourweb/fastfinder/
Çå¾²ÆÊÎö
GitHubÏòÉçÇø¿ª·ÅÇå¾²Êý¾Ý¿â
https://www.darkreading.com/application-security/github-opens-security-database-to-community-contributions
¹È¸èä¯ÀÀÆ÷ÔÊÐíÓû§ÔÚÉúÑĵÄÃÜÂëÖÐÌí¼Ó×¢ÊÍ
https://www.bleepingcomputer.com/news/google/google-chrome-to-allow-users-to-add-notes-to-saved-passwords/
д¹ÂÚÒªÁìʹÓÃÔ¶³Ì»á¼ûÈí¼þÈÆ¹ýMFA
https://www.bleepingcomputer.com/news/security/devious-phishing-method-bypasses-mfa-using-remote-access-software/
Áª°îÁãÐÅÈÎÕ½ÂÔºÍMicrosoftµÄ°²ÅÅÖ¸ÄÏ
https://www.microsoft.com/security/blog/2022/02/22/the-federal-zero-trust-strategy-and-microsofts-deployment-guidance-for-all/
ÌÀ¼Óº£µ×µçÀÂÐÞ¸´£¬£¬£¬£¬£¬£¬£¬Åç·¢ºó»¥ÁªÍøÖÕÓÚ»Ö¸´
https://therecord.media/tonga-submarine-cable-repaired-restoring-internet-after-eruption/
ASEC×î½ü·¢Ã÷αװ³É Microsoft µÄ´¹ÂÚÓʼþÔöÌí
https://asec.ahnlab.com/en/31994/