¡¾Îó²î²¹¶¡¡¿Intel CPUÔÙ±»ÆØ¹â3¸öеıßÐŵÀ¹¥»÷Îó²îForeshadow
Çå¾²Ñо¿Ö°Ô±Åû¶ÁËÈý¸öÓ°ÏìIntel CPUµÄÇå¾²Îó²îµÄϸ½Ú£¬£¬£¬£¬£¬ÕâÈý¸öÎó²îÓë֮ǰµÄSpectreÊÇͳһÀàÎó²î£¬£¬£¬£¬£¬¶¼ÊÇʹÓÃÁËÏÖ´úCPUÆÕ±é¾ßÓеÄÍÆ²âÖ´Ðй¦Ð§À´ÊµÑé¹¥»÷¡£¡£¡£¡£ÕâЩÎó²îÏÖÔÚ±»ÃüÃûΪL1TF/Foreshadow(NG)£¬£¬£¬£¬£¬Îó²î±àºÅΪForeshadow£¨CVE-2018-3615£©ÒÔ¼°Foreshadow-NG£¨CVE-2018-3620ºÍCVE-2018-3646£©¡£¡£¡£¡£ÏÖÔÚÖ»ÓÐIntel CPUÊܵ½´ËÈý¸öÎó²îµÄÓ°Ïì¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/08/foreshadow-intel-processor-vulnerability.html
¡¾Îó²î²¹¶¡¡¿AdobeÐû²¼8ÔÂÇå¾²¸üУ¬£¬£¬£¬£¬¹²ÐÞ¸´11¸öÇå¾²Îó²î
AdobeÔÚ2018Äê8ÔµÄÇå¾²¸üÐÂÖÐÐÞ¸´ÁË11¸öÎó²î£¬£¬£¬£¬£¬Ó°ÏìÁËFlash Player¡¢Creative Cloud ¡¢Experience ManagerºÍAcrobat ReaderËÄ¿îÊ¢ÐеIJúÆ·¡£¡£¡£¡£ÆäÖÐAcrobat ReaderÖеÄÁ½¸öÎó²î£¨CVE-2018-12808ºÍCVE-2018-12799£©ÊǸßΣµÄí§Òâ´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£Ã»Óм£ÏóÅú×¢±¾ÔÂÇå¾²¸üÐÂÐÞ¸´µÄÎó²îÔÚÒ°Íâ±»Æð¾¢Ê¹Óᣡ£¡£¡£Adobe½¨ÒéÓû§ºÍÖÎÀíÔ±¾¡¿ìÏÂÔØºÍ×°ÖÃ×îеÄÐÞ¸´²¹¶¡¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/08/adobe-patch-updates.html
¡¾ÍþвÇ鱨¡¿Çå¾²Ñо¿Ö°Ô±ÑÝʾÔõÑù´ÓVPNÅþÁ¬Öлָ´HTTPÊý¾Ý
Çå¾²Ñо¿Ô±Ahamed NafeezÑÝʾ¿ÉÔÚijЩÌõ¼þÏ»ָ´Í¨¹ý¼ÓÃÜVPNÅþÁ¬·¢Ë͵ÄHTTPÁ÷Á¿µÄVORACLE¹¥»÷ÊÖÒÕ¡£¡£¡£¡£VORACLE×Ô¼º²¢²»ÊÇÒ»ÖÖÐµĹ¥»÷£¬£¬£¬£¬£¬¶øÊǾɵļÓÃܹ¥»÷£¨ÈçCRIME¡¢TIMEºÍBREACH£©µÄ±äÒìºÍ»ìÏý¡£¡£¡£¡£Nafeez³Æ¸Ã¹¥»÷½öÊÊÓÃÓÚ¹¹½¨ÔÚOpenVPNÐÒéÖ®ÉϵÄVPNЧÀÍ£¬£¬£¬£¬£¬ÓÉÓÚ¿ªÔ´µÄOpenVPNÐÒéµÄĬÈÏÉèÖÃÖª×ã¸Ã¹¥»÷µÄÌõ¼þ¡£¡£¡£¡£OpenVPNÔÚ½Óµ½±¨¸æºóÔÚÆäÎĵµÖÐÃ÷È·ÖÒÑÔÁ˸ÃΣº¦¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/voracle-attack-can-recover-http-data-from-vpn-connections/
¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶÓÅû¶¹ØÓÚIE 0day(CVE-2018-8373)µÄ¸ü¶àϸ½Ú
Ç÷ÊÆ¿Æ¼¼ZDIÍŶÓÅû¶Á˹ØÓÚIE 0day£¨CVE-2018-8373£©µÄ¸ü¶àϸ½Ú¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚ7ÔÂ11ÈÕ·¢Ã÷Á˸ÃÎó²î£¬£¬£¬£¬£¬ËäÈ»¸ÃÎó²îÓ°ÏìÁË×îа汾µÄWindowsÖеÄVBScriptÒýÇæ£¬£¬£¬£¬£¬µ«IE 11ûÓÐÊܵ½Ó°Ïì¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚÒ°Íâ·¢Ã÷ÁËʹÓøÃÎó²îµÄ¶ñÒâ¹¥»÷»î¶¯£¬£¬£¬£¬£¬ÆäÑù±¾Óë5Ô·ÝÐÞ¸´µÄVBScriptÒýÇæRCEÎó²î£¨CVE-2018-8174£©Ê¹ÓÃÁËÏàͬµÄ»ìÏýÊÖÒÕ¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪÕâÁ½¸öÎó²îµÄʹÓôúÂë¿ÉÄܳö×Ôͳһ×÷ÕßÖ®ÊÖ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/use-after-free-uaf-vulnerability-cve-2018-8373-in-vbscript-engine-affects-internet-explorer-to-run-shellcode/
¡¾Ö´ÂÉÀýÔò¡¿Ç°Î¢Èí¹¤³ÌʦÒò¼ÓÈëÀÕË÷Èí¼þRevetonµÄÏ´Ç®°¸±»ÅÐÐÌ18¸öÔÂ
ǰ΢ÈíÍøÂ繤³ÌʦRaymond Odigie Uadiale£¨41Ë꣩ÒòÉæ¼°ÀÕË÷Èí¼þRevetonµÄÏ´Ç®°¸±»ÅÐÈëÓü18¸öÔ¡£¡£¡£¡£Uadiale²»ÊÇÀÕË÷Èí¼þRevetonµÄÏÖʵ×÷Õߣ¬£¬£¬£¬£¬µ«Ëû×ÊÖúÀÕË÷Èí¼þµÄ×÷Õß½«´ÓÊܺ¦ÕßÄÇÀïÊÕÈ¡µÄÊê½ð¾ÙÐÐÏ´Ç®£¬£¬£¬£¬£¬²¢ÊÕÈ¡30%µÄÓöȣ¬£¬£¬£¬£¬Éæ°¸½ð¶îΪ93640ÃÀÔª¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/08/microsoft-reveton-ransomware.html
¡¾¹¥»÷ÊÂÎñ¡¿Ó¡¶ÈÒøÐÐCosmos BankÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬ÈýÌìÄÚËðʧÁè¼Ý1350ÍòÃÀÔª
ÉÏÖÜĩӡ¶ÈÒøÐÐCosmos BankÔâµ½ºÚ¿ÍµÄÈëÇÖ£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚÈýÌìÄÚÇÔÈ¡ÁËÁè¼Ý9.4ÒÚ¬±È£¨Ô¼1350ÍòÃÀÔª£©µÄ×ʽ𡣡£¡£¡£¾ÝÍâµØÃ½Ì屨µÀ£¬£¬£¬£¬£¬Ç°Á½´Î͵ÇÔ±¬·¢ÔÚ8ÔÂ11ÈÕÐÇÆÚÁù£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý28¸ö¹ú¼ÒµÄ14849±ÊATMÉúÒâÇÔÈ¡ÁËÔ¼1140ÍòÃÀÔª¡£¡£¡£¡£ËæºóÔÚ8ÔÂ13ÈÕÐÇÆÚÒ»£¬£¬£¬£¬£¬¹¥»÷ÕßÔÙ´Îͨ¹ýSWIFTϵͳÇÔÈ¡ÁËÔ¼200ÍòÃÀÔª¡£¡£¡£¡£ÏÖÔÚµÄÖ¤¾ÝÅú×¢¹¥»÷À´×Ô¼ÓÄô󣬣¬£¬£¬£¬¸ÃÒøÐÐÌåÏִ˴ι¥»÷µÄÊÖÒÕϸ½ÚÈÔÔÚ½øÒ»³ÌÐò²éÖ®ÖС£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/hackers-steal-135-million-across-three-days-from-indian-bank/