¡¾Çå¾²²¥±¨¡¿Wi-FiͬÃËÕýʽÐû²¼ÐÂÒ»´úÇå¾²±ê×¼WPA3£¬£¬£¬£¬£¬£¬¿É½øÒ»²½Ìá¸ßÍøÂçÇå¾²ÐÔ
±¾ÖÜÒ»Wi-FiͬÃËÕýʽÐû²¼ÐÂÒ»´úÇå¾²±ê×¼WPA3£¬£¬£¬£¬£¬£¬WPA3ÊÇÓÃÓÚWi-FiÅþÁ¬µÄÓû§Éí·ÝÑéÖ¤ÊÖÒÕµÄ×îа汾¡£¡£¡£¡£¡£¡£WPA3ÓÐÁ½ÖÖÇ徲ģʽ£¬£¬£¬£¬£¬£¬WPA3-PersonalºÍWPA3-Enterprise£¬£¬£¬£¬£¬£¬ÕâÁ½ÖÖÇ徲ģʽµÄÖ÷񻂿±ðÔÚÓÚÉí·ÝÑéÖ¤½×¶Î¡£¡£¡£¡£¡£¡£¹ØÓÚÆóÒµ¡¢Õþ¸®ºÍ½ðÈÚÍøÂçÖÐʹÓõÄ×°±¸£¬£¬£¬£¬£¬£¬½¨ÒéʹÓÃWPA3-EnterpriseÇ徲ģʽ£¬£¬£¬£¬£¬£¬WPA3-PersonalÔòÊÇÃæÏòͨË×СÎÒ˽¼ÒÓû§¡£¡£¡£¡£¡£¡£Wi-FiͬÃËÌåÏÖWPA3µÄSAEËã·¨Äܹ»µÖÓù±©Á¦¹¥»÷£¬£¬£¬£¬£¬£¬WPA3½«ÔÚ¶à´Îʧ°ÜʵÑéºó×èÖ¹ÈÏÖ¤ÇëÇ󡣡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/new-wpa3-wi-fi-standard-released/
¡¾ÍþвÇ鱨¡¿Çå¾²Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶Ô¶«ÄÏÑǵĹ¥»÷»î¶¯Rancor
Palo Alto NetworksµÄUnit 42Ñо¿ÍŶÓÊӲ쵽Õë¶Ô¶«ÄÏÑǵÄһϵÁй¥»÷»î¶¯£¬£¬£¬£¬£¬£¬Æä¶ñÒâÈí¼þµÄ·Ö·¢ºÍÄ¿µÄµÄÑ¡Ôñ¾ßÓи߶ÈÕë¶ÔÐÔ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ¸Ã¹¥»÷ÕßÊÇÒ»¸öδ֪µÄ×éÖ¯Rancor£¬£¬£¬£¬£¬£¬RancorÖ÷ҪʹÓÃÁ½¸ö¶ñÒâÈí¼þ¼Ò×壬£¬£¬£¬£¬£¬DDKONGºÍPLAINTEE¡£¡£¡£¡£¡£¡£DDKONGÊÇÆäÖ÷ÒªµÄ¶ñÒâÈí¼þ¹¤¾ß£¬£¬£¬£¬£¬£¬PLAINTEEËÆºõÊÇÐÂÔöÌíµÄ¹¤¾ß¡£¡£¡£¡£¡£¡£Æä¹¥»÷Ä¿µÄ°üÀ¨µ«²»ÏÞÓÚÐÂ¼ÓÆÂºÍ¼íÆÒÕ¯¡£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷»î¶¯´Ó´¹ÂÚÐÅÏ¢×îÏÈ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÔΪÆäÖ÷ÒªÕë¶ÔÕþÖÎʵÌå¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://researchcenter.paloaltonetworks.com/2018/06/unit42-rancor-targeted-attacks-south-east-asia-using-plaintee-ddkong-malware-families/
¡¾ÍþвÇ鱨¡¿Ñо¿Ö°Ô±³Æ2017ÄêµÄÿһ¸ö¼ÓÃÜÇ®±ÒICOƽ¾ù°üÀ¨5¸öÇå¾²Îó²î
Positive.com·¢Ã÷2017ÄêµÄÿһ¸ö¼ÓÃÜÇ®±ÒICOƽ¾ù±£´æ5¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬´ó´ó¶¼Îó²î¶¼ÊÇÔÚICO×Ô¼ºµÄÖÇÄܺÏÔ¼Öз¢Ã÷µÄ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ2017ÄêËùÓеÄICOÒÆ¶¯Ó¦Óö¼±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÁíÍâÈý·ÖÖ®Ò»µÄÎó²î·ºÆðÔÚICOµÄwebÓ¦ÓÃÖУ¬£¬£¬£¬£¬£¬Îó²î¹æÄ£°üÀ¨´úÂë×¢È롢ЧÀÍÆ÷Ãô¸ÐÊý¾Ýй¶¡¢²»Çå¾²µÄÊý¾Ý´«ÊäÒÔ¼°í§ÒâÎļþ¶ÁÈ¡µÈ¡£¡£¡£¡£¡£¡£ICO×éÖ¯ÕßÍùÍùûÓÐΪÆäÏîĿע²áÉ罻ýÌåÕË»§£¬£¬£¬£¬£¬£¬Ê¹ÆäÓû§Ò×ÊÜÉç½»¹¤³ÌºÍ´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£×îºó£¬£¬£¬£¬£¬£¬ICO×éÖ¯ÕßÍùÍùδÄÜΪÆäÃô¸ÐÕË»§ÆôÓÃË«ÒòËØÈÏÖ¤£¬£¬£¬£¬£¬£¬µ¼Ö¹¥»÷Õß¿ÉÄÜÐ®ÖÆ¹Ù·½ÍøÕ¾»òÇ®°ü¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/researchers-last-year-s-icos-had-five-security-vulnerabilities-on-average/
¡¾ÍþвÇ鱨¡¿Çå¾²Ñо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þThanatosµÄ½âÃܹ¤¾ß
˼¿ÆTalosÐû²¼ÀÕË÷Èí¼þThanatosµÄÃ⺬»ìÃܹ¤¾ß£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ßÔÚThanatos°æ±¾1ºÍ1.1ÒÔ¼°ÆäËüÒÑÖª°æ±¾É϶¼ÓÐÓᣡ£¡£¡£¡£¡£Thanatosͨ¹ýŲÓÃGetTickCount»ñȡϵͳÔËÐÐʱ¼äµÄºÁÃëÊý£¬£¬£¬£¬£¬£¬È»ºóÌìÉú¼ÓÃÜÃÜÔ¿£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃ(AES)-256¾ÙÐмÓÃÜ¡£¡£¡£¡£¡£¡£Òò´ËÆäÃÜÔ¿ÊÇÒ»¸ö32λµÄÖµ£¬£¬£¬£¬£¬£¬ÔÚÆ½¾ùÿÃë10Íò´ÎµÄ±©Á¦ÆÆ½âÏ£¨²âÊÔÐéÄâ»úµÄ»ù×¼£©£¬£¬£¬£¬£¬£¬»ñµÃÃÜÔ¿ÐèÒªÔ¼14·ÖÖÓµÄʱ¼ä¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://blog.talosintelligence.com/2018/06/ThanatosDecryptor.html
¡¾ÆÊÎö±¨¸æ¡¿Ñо¿ÍŶÓÐû²¼¹ØÓÚ¹ã¸æÈí¼þPbotµÄбäÌåµÄÆÊÎö±¨¸æ
¿¨°Í˹»ùʵÑéÊÒ·¢Ã÷¹ã¸æÈí¼þPBot£¨PythonBot£©µÄбäÌ壬£¬£¬£¬£¬£¬¸Ã±äÌåÊÔͼÔÚÓû§µÄä¯ÀÀÆ÷ÉÏ×°ÖÃ¹ã¸æ²å¼þ£¬£¬£¬£¬£¬£¬ÕâЩ²å¼þ»áÔÚÍøÒ³ÉÏÌí¼ÓÖÖÖÖ¹ã¸æ£¬£¬£¬£¬£¬£¬²¢½«Óû§Öض¨Ïòµ½¹ã¸æÍøÕ¾¡£¡£¡£¡£¡£¡£PBotµÄ¿ª·¢Ö°Ô±Ò»Ö±Ðû²¼¸Ã±äÌåµÄа汾£¬£¬£¬£¬£¬£¬Ã¿¸ö°æ±¾¶¼»áʹ¾ç±¾»ìÏý±äµÃÔ½·¢Öش󡣡£¡£¡£¡£¡£ÔÚ4Ô·ݿ¨°Í˹»ù¼ì²âµ½Áè¼Ý5Íò´Î×°ÖÃPBotµÄʵÑ飬£¬£¬£¬£¬£¬ÔÚ5Ô·ÝÕâÒ»Êý×ÖÉõÖÁ»¹ÔÚÔöÌí¡£¡£¡£¡£¡£¡£PBotÖ÷ÒªÕë¶Ô¶íÂÞ˹¡¢ÎÚ¿ËÀ¼ºÍ¹þÈø¿Ë˹̹µÄÓû§¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securelist.com/pbot-evolving-adware/86242/
¡¾Çå¾²Îó²î¡¿Ñо¿Ö°Ô±³ÆJolokiaµÄ¹ýʧÉèÖÿÉÄܵ¼ÖÂÐÅϢй¶»òDoS
Çå¾²Ñо¿Ö°Ô±Mat Mannion·¢Ã÷Jolokia Java Management Extensions£¨JMX£©±£´æÒ»Ð©Çå¾²Îó²î£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼Ö¾ܾøÐ§ÀÍ¡¢ÐÅϢй¶µÈÕë¶ÔJava WebЧÀÍÆ÷µÄDZÔÚ¹¥»÷¡£¡£¡£¡£¡£¡£Mannion³ÆJolokiaµÄĬÈÏÉèÖò¢²»Çå¾²£¬£¬£¬£¬£¬£¬Ã»ÓоÙÐÐÊʵ±ÉèÖõÄJolokia¿ÉÄܸøÍøÕ¾´øÀ´Î£º¦£¬£¬£¬£¬£¬£¬ÉõÖÁ°üÀ¨Ò»Ð©½ðÈÚ»ú¹¹µÄÍøÕ¾¡£¡£¡£¡£¡£¡£Mannion»¹Ðû²¼ÁËÕë¶ÔApache Tomcat 8µÄPoC¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://matmannion.com/jolokiapwn/