¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180731
Ðû²¼Ê±¼ä 2018-07-31¡¾Êý¾Ýй¶¡¿Ó¢¹úµç×ÓÉÌÎñЧÀÍÉÌÊý¾Ý¿âй¶£¬£¬£¬£¬Ô¼140ÍòÓû§ÊÜÓ°Ïì
Ñо¿Ö°Ô±Taylor Ralston·¢Ã÷Ó¢¹úµç×ÓÉÌÎñЧÀÍÉÌFashion NexusµÄÒ»¸öÊý¾Ý¿â¿É¹ûÕæ»á¼û£¬£¬£¬£¬¶à¸ö´ò°çºÍÅäÊÎÍøÕ¾µÄÓû§ÐÅϢй¶£¬£¬£¬£¬°üÀ¨Jaded London¡¢AX ParisºÍElle Belle AttireµÈÆ·ÅÆ¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨Ô¼140ÍòÓû§µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬°üÀ¨MD5¹þÏ£ÃÜÂë¡¢ÐÕÃû¡¢µç×ÓÓʼþµØµãºÍµç»°ºÅÂëµÈ¡£¡£¡£¡£¡£Ã»Óм£ÏóÅú×¢Óû§µÄÒøÐп¨ÐÅÏ¢±£´æÎ£º¦¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.grahamcluley.com/online-fashion-shoppers-exposed-ecommerce-breach/
¡¾Êý¾Ýй¶¡¿Boys Town¹ú¼ÒÑо¿Ò½ÔºÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬Áè¼Ý10ÍòÃû»¼ÕߺÍÔ±¹¤µÄÐÅϢй¶
Boys Town¹ú¼ÒÑо¿Ò½ÔºÐû²¼Í¨Öª³Æ¸Ã×éÖ¯ÓÚ2018Äê5ÔÂ23ÈÕÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬Áè¼Ý10ÍòÃû»¼ÕߺÍÔ±¹¤µÄÐÅϢй¶¡£¡£¡£¡£¡£Õâ¿ÉÄÜÊÇÓйضùͯҽÁÆÐ§À͵Ä×î´ó¹æÄ£µÄÊý¾Ýй¶¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç±£ºÅÂë¡¢Õï¶Ï»òÖÎÁÆÐÅÏ¢¡¢ÒøÐÐÕ˺š¢Óû§ÃûºÍÃÜÂëµÈÐÅÏ¢¡£¡£¡£¡£¡£¹¥»÷ÕßÈëÇÖÁ˸Ã×éÖ¯Ô±¹¤µÄµç×ÓÓʼþÕÊ»§£¬£¬£¬£¬²¢Í¨¹ýδÊÚȨ»á¼û»ñÈ¡ÁËÕâЩÐÅÏ¢¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/07/data-breach-healthcare.html
¡¾¹¥»÷ÊÂÎñ¡¿KickICOƽ̨ÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬¼ÛÖµÔ¼770ÍòÃÀÔªµÄÁîÅÆ±»ÇÔ
ICOƽ̨KickICOÔâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬Áè¼Ý7000ÍòKICKÁîÅÆ±»ÇÔ£¨¼ÛÖµÔ¼770ÍòÃÀÔª£©¡£¡£¡£¡£¡£Æ¾Ö¤KickICOÊ×ϯִÐйÙAnti DanilevskiµÄ˵·¨£¬£¬£¬£¬¸Ã¹¥»÷ÊÂÎñ±¬·¢ÔÚ7ÔÂ26ÈÕÐÇÆÚËĵÄUTCʱ¼ä09:04¡£¡£¡£¡£¡£¹¥»÷Õß»ñÈ¡ÁË¿ª·¢Ö°Ô±µÄ˽Կ£¬£¬£¬£¬²¢ÐÞ¸ÄÖÇÄܺÏÔ¼µÄÐÐΪ£¬£¬£¬£¬´Ý»ÙÁË40¸öµØµãÖеÄKICKÁîÅÆÈ»ºóÔÚ40¸ö×Ô¼ºµÄÇ®°üÖн¨ÉèµÈÁ¿µÄÐÂÁîÅÆ¡£¡£¡£¡£¡£KickICO¿ª·¢Ö°Ô±ÏÖÔÚÒÑÖØÐ»ñµÃÖÇÄܺÏÔ¼µÄ»á¼ûȨ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/kickico-platform-loses-77-million-in-recent-hack/
¡¾¶ñÒâÈí¼þ¡¿Ñо¿ÍŶÓÔÚGoogle PlayÖз¢Ã÷145¸öѬȾ¶ñÒâÈí¼þµÄapp
Palo Alto NetworksµÄUnit 42Ñо¿ÍŶÓÔÚGoogle PlayÖз¢Ã÷145¸öappѬȾ¶ñÒâµÄWindows¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£¡£´ó´ó¶¼ÊÜѬȾµÄappÔÚ2017Äê10ÔÂÖÁ11ÔÂÖ®¼äÐû²¼µ½Google Play£¬£¬£¬£¬Óм¸¸öappµÄ×°ÖôÎÊýÁè¼Ý1000´Î²¢ÇÒ»ñµÃÁË4ÐÇÆÀ¼¶¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬ÊÜѬȾµÄapkÎļþ²»»á¶ÔAndroid×°±¸×é³ÉÈκÎÍþв£¬£¬£¬£¬ÓÉÓÚÕâЩ¶ñÒâPEÎļþÖ»ÄÜÔÚWindowsÉÏÔËÐС£¡£¡£¡£¡£ÕâÅú×¢appµÄ¿ª·¢Ö°Ô±Êܵ½Á˶ñÒâÈí¼þµÄѬȾ£¬£¬£¬£¬Õâ¿ÉÄܱ»ÓÃÀ´Ìᳫ¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://researchcenter.paloaltonetworks.com/2018/07/unit42-hidden-devil-development-life-cycle-google-play-apps-infected-windows-executable-files/
¡¾Çå¾²²¥±¨¡¿Æ¾Ö¤×îеÄÑо¿Áè¼ÝÒ»°ëµÄÃÀ¹úÕþ¸®»ú¹¹ÒÑÍêȫʵÑéDMARC±ê×¼
ƾ֤AgariµÄÑо¿£¬£¬£¬£¬Áè¼ÝÒ»°ëµÄÃÀ¹úÕþ¸®»ú¹¹ÒÑÍêȫʵÑéDMARCµç×ÓÓʼþÇå¾²±ê×¼¡£¡£¡£¡£¡£ÃÀDHSÔÚ2017ÄêÊ®ÔÂÖÐÑ®Ðû²¼ÁËBOD 18-01£¬£¬£¬£¬ÒªÇóËùÓÐÁª°î»ú¹¹Öƶ©ÍýÏ벢ʵÑéÍøÒ³ºÍµç×ÓÓʼþÇå¾²ÊÖÒÕ£¬£¬£¬£¬ÈçHTTPS¡¢STARTTLSºÍDMARC¡£¡£¡£¡£¡£AgariÒ»Ö±ÔÚ¼à¿Ø1000¶à¸öÕþ¸®ÓòÃû£¬£¬£¬£¬ÒÔ¼ì²âÆä״̬¡£¡£¡£¡£¡£×èÖ¹2018Äê7ÔÂ15ÈÕ£¬£¬£¬£¬922¸öÕþ¸®ÓòÃû£¨Õ¼×ÜÊýµÄ81%£©ÒÑÆôÓÃÁËDMARC£¬£¬£¬£¬Ô¼600¸öÓòÃû£¨Õ¼52%£©ÒÑÖÆ¶©ÁËrejectÕ½ÂÔ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/dmarc-fully-implemented-half-us-government-agencies
¡¾ÍþвÇ鱨¡¿ÃÀ¹úÕþ¸®Ðû²¼ÖÒÑÔ£ºÐ¡ÐÄÕë¶ÔÆóÒµµÄ¹ú¼Ò¼¶¹©Ó¦Á´¹¥»÷
ÃÀ¹úÕþ¸®ÖÒÑÔÕë¶ÔÆóÒµµÄ¹ú¼Ò¼¶¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£¡£Æ¾Ö¤ÃÀNCSCµÄ±¨¸æ£¬£¬£¬£¬Ëæ×ÅÈ˹¤ÖÇÄܺÍÎïÁªÍøµÈÐÂÊÖÒÕÔÚÍøÂçÖÐÒýÈëеÄÎó²î£¬£¬£¬£¬ÍøÂçÇå¾²ÉçÇø²¢Ã»ÓÐ×öºÃÓ¦¶ÔµÄ×¼±¸£¬£¬£¬£¬Èí¼þ¹©Ó¦Á´¹¥»÷½«³ÉΪ×î´óµÄÐÂÐËÍþв֮һ¡£¡£¡£¡£¡£NCSC³Æ2017ÄêÊÇÒ»¸ö·ÖË®Á룬£¬£¬£¬ÓÉÓÚÔÚÕâÒ»Ä걬·¢ÁË7ÆðÖØ´óµÄ¹©Ó¦Á´¹¥»÷ÊÂÎñ£¬£¬£¬£¬¶øÔÚ֮ǰµÄÈýÄêÖ»±¬·¢ÁË4Æð¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/us-warns-of-supply-chain-attacks/