CiscoÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´Æä¶à¿î²úÆ·ÖеÄ8¸öÎó²î

Ðû²¼Ê±¼ä 2022-08-05
1¡¢CiscoÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´Æä¶à¿î²úÆ·ÖеÄ8¸öÎó²î

      

8ÔÂ3ÈÕ£¬£¬£¬£¬£¬CiscoÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬×ܼÆÐÞ¸´ÁË8¸öÎó²î¡£¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬½ÏΪÑÏÖØµÄÊÇCisco Small Business RVϵÁзÓÉÆ÷ÖеÄÎó²îCVE-2022-20842£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬£¬£¬£¬¿É±»Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÓÃÀ´Ö´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬»òʹװ±¸ÒâÍâÖØÆô´Ó¶øµ¼Ö¾ܾøÐ§ÀÍ(DoS)£»£»£»ÉÐÓÐWeb¹ýÂËÆ÷Êý¾Ý¿â¸üй¦Ð§ÖеÄÏÂÁî×¢ÈëÎó²î£¨CVE-2022-20827£©ºÍ¿ª·Å¼´²å¼´ÓÃ(PnP)Ä£¿£¿£¿£¿£¿éÏÂÁî×¢ÈëÎó²î£¨CVE-2022-20841£©£¬£¬£¬£¬£¬ÒÔÉÏÈý¸öÎó²î¾ùΪÊäÈëÑé֤ȱ·¦µ¼ÖµÄ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬»¹ÐÞ¸´ÁËWebex MeetingsºÍÉí·ÝЧÀÍÒýÇæµÈ²úÆ·ÖеĶà¸öÎó²î¡£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2022/08/cisco-business-routers-found-vulnerable.html


2¡¢µÂ¹ú¹¤ÉÌЭ»á³ÆÆäÔâµ½´ó¹æÄ£¹¥»÷±»ÆÈ¹Ø±ÕËùÓÐϵͳ

      

¾ÝýÌå8ÔÂ4ÈÕ±¨µÀ£¬£¬£¬£¬£¬µÂ¹ú¹¤ÉÌЭ»á(DIHK)³ÆÆäÔâµ½ÁË´ó¹æÄ£µÄ¹¥»÷¡£¡£¡£¡£¡£¡£¡£DIHKÊÇÓÉ79¸ö´ú±íµÂ¹ú¹«Ë¾µÄÉÌ»á×é³ÉµÄͬÃË£¬£¬£¬£¬£¬ÓµÓÐÁè¼Ý300Íò»áÔ±¡£¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ÔÚ8ÔÂ3ÈÕ£¬£¬£¬£¬£¬Ð­»á±»ÆÈ¹Ø±ÕÆäËùÓÐITϵͳ£¬£¬£¬£¬£¬ÒÔ¼°Êý×ÖЧÀÍ¡¢µç»°ºÍµç×ÓÓʼþЧÀÍÆ÷À´Ó¦¶Ô´Ë´Î¹¥»÷¡£¡£¡£¡£¡£¡£¡£DIHKÉùÃ÷¹Ø±ÕϵͳÊÇÒ»ÖÖÔ¤·À²½·¥£¬£¬£¬£¬£¬Ò²ÊÇÈÃITÍŶÓÓÐʱ¼äÌá³ö½â¾ö¼Æ»®ºÍ½¨Éè·ÀÓùµÄ·½·¨¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¸Ã»ú¹¹ÕýÔÚÖð²½»Ö¸´Ò»Ð©Ð§ÀÍ£¬£¬£¬£¬£¬µ«ÎÞ·¨Õ¹ÍûÐèÒª¶à³¤Ê±¼ä¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/german-chambers-of-industry-and-commerce-hit-by-massive-cyberattack/


3¡¢RobinhoodÒòÎ¥·´Å¦Ô¼ÍøÂçÇå¾²¹æÔò±»·£¿£¿£¿£¿£¿î3000ÍòÃÀÔª

      

ýÌå8ÔÂ3Èճƣ¬£¬£¬£¬£¬RobinhoodµÄ¼ÓÃÜÇ®±Ò²¿·ÖÒòÎ¥·´ÍøÂçÇå¾²ºÍÏ´Ç®¹æÔò¶ø±»Å¦Ô¼½ðÈÚЧÀͲ¿·£¿£¿£¿£¿£¿î3000ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¡£Å¦Ô¼½ðÈÚЧÀͲ¿µÄÉùÃ÷ÌåÏÖ£¬£¬£¬£¬£¬Robinhood CryptoÍøÂçÇå¾²ÍýÏë±£´æÎÊÌ⣬£¬£¬£¬£¬Ã»ÓÐÍêÈ«½â¾öRHCµÄÔËӪΣº¦£¬£¬£¬£¬£¬²¢ÇÒ¸ÃÍýÏëÖеÄÏêϸÕþ²ß²»ÍêÈ«ÇкÏÍøÂçÇå¾²ºÍÐéÄâÇ®±Ò¹æÔòµÄ¼¸Ïî»®¶¨£¬£¬£¬£¬£¬ÇҸù«Ë¾µÄºÏ¹æÍýÏëºÍÉúÒâ¼à¿ØÏµÍ³Öеı£´æÈ±ÏÝ¡£¡£¡£¡£¡£¡£¡£³ýÁË3000ÍòÃÀÔªµÄ·£¿£¿£¿£¿£¿îÍ⣬£¬£¬£¬£¬¸Ã¹«Ë¾»¹ÐèÒªÔ¼ÇëÒ»Ãû×ÔÁ¦ÕÕÁÏÀ´ÖÜÈ«ÆÀ¹ÀRobinhood Crypto¹æÔòµÄ×ñÊØÇéÐΣ¬£¬£¬£¬£¬²¢ÐÞ¸´ÒÑ·¢Ã÷µÄȱÏݺÍÎ¥¹æÐÐΪ¡£¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/robinhood-crypto-penalized-30m-violating-ny-cybersecurity-regulations


4¡¢Ô¼Äª35000¸öGitHub´æ´¢¿â±»¿Ë¡²¢Ìí¼Ó¶ñÒâ´úÂë

      

8ÔÂ3ÈÕ£¬£¬£¬£¬£¬Èí¼þ¿ª·¢Ö°Ô±Stephen LacyÉù³ÆÔÚGitHubÉÏ·¢Ã÷ÁËÔ¼35000¸ö´æ´¢¿â±»¿Ë¡²¢Ìí¼Ó¶ñÒâ´úÂë¡£¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿ª·¢Ö°Ô±James TuckerÖ¸³ö£¬£¬£¬£¬£¬°üÀ¨¶ñÒâURLµÄ¿Ë¡´æ´¢¿â²»µ«Ð¹Â¶ÁËÓû§µÄÇéÐαäÁ¿ £¬£¬£¬£¬£¬²¢ÇÒ»¹°üÀ¨Ò»¸öµ¥ÐкóÃÅ¡£¡£¡£¡£¡£¡£¡£ÆäÖоø´ó´ó¶¼¿Ë¡µÄ´æ´¢¿âÔÚÉϸöÔ±»¶ñÒâ´úÂë¸Ä¶¯£¬£¬£¬£¬£¬µ«Ò²µ½Ò»Ð©¿É×·Ëݵ½2015Äê¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬GitHubÍŶÓÒÑ´ÓÆäÆ½Ì¨ÉÑþ³ØýÁ˶ñÒâ¿Ë¡´æ´¢¿â¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/35-000-code-repos-not-hacked-but-clones-flood-github-to-serve-malware/


5¡¢Zscaler·¢Ã÷ʹÓÃAiTMÊÖÒպͶàÖÖÈÆ¹ýÕ½ÂԵĴ¹ÂÚ¹¥»÷

      

ZscalerÔÚ8ÔÂ2ÈÕÅû¶ÁËʹÓÃAiTMÊÖÒÕÒÔ¼°¶àÖÖÈÆ¹ýÕ½ÂԵĴó¹æÄ£ÍøÂç´¹Âڻ¡£¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯×îÏÈÓÚ2022Äê6Ô£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÃÀ¹ú¡¢Ó¢¹ú¡¢ÐÂÎ÷À¼ºÍ°Ä´óÀûÑǵĽðÈڿƼ¼¡¢´û¿î¡¢»á¼Æ¡¢°ü¹ÜºÍÁª°îÐÅÓÃÏàÖúÉç×éÖ¯¡£¡£¡£¡£¡£¡£¡£¹¥»÷»î¶¯Ê¹ÓÃÁË»ùÓÚÊðÀíµÄ×Ô½çËµÍøÂç´¹ÂÚ¹¤¾ß°üÈÆ¹ý¶àÒòËØÈÏÖ¤£¨MFA£©£¬£¬£¬£¬£¬Ê¹ÓÃÖÖÖÖαװºÍä¯ÀÀÆ÷Ö¸ÎÆÊÖÒÕÀ´Èƹý×Ô¶¯URLÆÊÎöϵͳ£¬£¬£¬£¬£¬Ê¹ÓÃURLÖØ¶¨ÏòÊÖÒÕÈÆ¹ýÆóÒµµç×ÓÓʼþURLÆÊÎö½â¾ö¼Æ»®£¬£¬£¬£¬£¬»¹Ê¹ÓÃÁËÕýµ±µÄÔÚÏß´úÂë±à¼­Ð§ÀÍ£¨ÈçCodeSandboxºÍGlitch£©¡£¡£¡£¡£¡£¡£¡£


https://www.zscaler.com/blogs/security-research/large-scale-aitm-attack-targeting-enterprise-users-microsoft-email-services


6¡¢KasperskyÐû²¼2022ÄêQ2 DDoS¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ

      

8ÔÂ3ÈÕ£¬£¬£¬£¬£¬KasperskyÐû²¼ÁË2022ÄêµÚ¶þ¼¾¶ÈDDoS¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬ÔÚµÚ¶þ¼¾¶È×ܹ²¼Í¼ÁË78558´ÎDDoS¹¥»÷£¬£¬£¬£¬£¬±ÈÉÏÒ»¼¾¶ÈϽµÁË13.72%¡£¡£¡£¡£¡£¡£¡£³¤Ê±¼ä£¨20Сʱ»ò¸ü³¤£©DDoS¹¥»÷µÄÕ¼±ÈϽµ£¬£¬£¬£¬£¬´ÓµÚÒ»¼¾¶ÈµÄ½ü20%½µÖÁÔ¼7%£¬£¬£¬£¬£¬4СʱµÄ½Ï¶ÌDDoS¹¥»÷Õ¼×ܹ¥»÷ÊýÄ¿µÄ95.24%¡£¡£¡£¡£¡£¡£¡£46.17%µÄ½©Ê¬ÍøÂçC2ЧÀÍÆ÷λÓÚÃÀ¹ú£¬£¬£¬£¬£¬Æä´ÎÊǺÉÀ¼£¨14.49%£©ºÍµÂ¹ú£¨9.11%£©¡£¡£¡£¡£¡£¡£¡£Ö÷ÒªµÄDDoS¹¥»÷ÊÖÒÕΪUDP flood£¬£¬£¬£¬£¬Õ¼±È62.53%£¬£¬£¬£¬£¬Æä´ÎÊÇSYN flood£¨20.25%£©¡£¡£¡£¡£¡£¡£¡£


https://securelist.com/ddos-attacks-in-q2-2022/107025/