Ó¢¹úÁè¼Ý5Íò¼ÒÖÐСÆóÒµ¿ÉÄÜÒòÍøÂç¹¥»÷µ¹±Õ£»£» £»£»£»£»¿ªÔ´Ä£ÄâÆ÷QEMUÎó²î¿Éµ¼ÖÂÐéÄâ»úÌÓÒÝ£»£» £»£»£»£»ImpervaÊý¾Ýй¶

Ðû²¼Ê±¼ä 2019-08-28

1.΢Èí³Æ¶àÖØÉí·ÝÑéÖ¤¿É×èÖ¹99.9%µÄÕË»§ÈëÇÖ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


΢ÈíÌåÏÖΪÕÊ»§ÆôÓöàÖØÉí·ÝÑéÖ¤£¨MFA£©¿É×èÖ¹99.9£¥µÄ×Ô¶¯¹¥»÷¡£ ¡£¡£¡£¡£ÕâÏÒé²»µ«ÊÊÓÃÓÚMicrosoftÕÊ»§ £¬£¬£¬£¬£¬£¬»¹ÊÊÓÃÓÚÆäËüÈκÎÔÚÏßÍøÕ¾»òЧÀÍ¡£ ¡£¡£¡£¡£Ê£ÓàµÄ0.1%´ú±íÁËʹÓÃÊÖÒÕ½â¾ö¼Æ»®²¶»ñMFAÁîÅÆµÄÖØ´ó¹¥»÷ £¬£¬£¬£¬£¬£¬ÓëÒ»Ñùƽ³£µÄ½©Ê¬ÍøÂçײ¿â¹¥»÷Ïà±È £¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷ÈÔÏ൱ÓÐÊý¡£ ¡£¡£¡£¡£Î¢ÈíµÄ½áÂÛÊÇ»ùÓÚÆäÔÆÐ§ÀÍÌìÌì¶¼Ôâµ½µÄ½ü3ÒÚ´ÎڲƭÐԵǼʵÑé¡£ ¡£¡£¡£¡£5Ô·ݹȸèÒ²½ÒÏþÁËÀàËÆÑÔÂÛ £¬£¬£¬£¬£¬£¬¹È¸èÌåÏÖΪÆäGoogleÕÊ»§Ìí¼ÓÕһص绰ºÅÂ루ÒÔ¼°¼ä½ÓÆôÓöÌÐÅMFA£©µÄÓû§¿ÉÒÔ×èÖ¹100%µÄ×ÔÄîͷеÈË¡¢99%µÄÅúÁ¿´¹ÂÚ¹¥»÷ÒÔ¼°66%µÄÕë¶ÔÐÔ¹¥»÷¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-using-multi-factor-authentication-blocks-99-9-of-account-hacks/


2.Ó¢¹úÁè¼Ý5Íò¼ÒÖÐСÆóÒµ¿ÉÄÜÒòÍøÂç¹¥»÷µ¹±Õ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ƾ֤GallagherµÄ×îÐÂÑо¿ £¬£¬£¬£¬£¬£¬Ó¢¹úÁè¼Ý5Íò¼ÒÖÐСÐÍÆóÒµ¿ÉÄÜÒòÍøÂç¹¥»÷µ¼ÖÂÐÝÒµ¡£ ¡£¡£¡£¡£Ñо¿·¢Ã÷È¥ÄêÓÐ140Íò¼ÒÆóÒµÔâÊÜÖØ´ó¹¥»÷ £¬£¬£¬£¬£¬£¬×ܼƺÄ×Ê88ÒÚÓ¢°÷¡£ ¡£¡£¡£¡£½üËÄ·ÖÖ®Ò»£¨24£¥£©µÄÆóÒµÊÜΣ»£» £»£»£»£»úÊÂÎñµÄÓ°Ïì - ±ÈǰһÄêÔöÌíÁË5%¡£ ¡£¡£¡£¡£ËäÈ»ÊÜÓ°ÏìÆóÒµµÄƽ¾ù±¾Ç®ÎªÔ¼6400Ó¢°÷ £¬£¬£¬£¬£¬£¬µ«17£¥µÄÊÜ·ÃÕßÌåÏÖËûÃDZ»ÆÈÆÆ·Ñ1ÍòÓ¢°÷ÒÔÉÏ £¬£¬£¬£¬£¬£¬½üÊ®·ÖÖ®Ò»£¨9£¥£©µÄÆóÒµÖ§¸¶Áè¼Ý2ÍòÓ¢°÷¡£ ¡£¡£¡£¡£ËÄ·ÖÖ®Ò»£¨23£¥£©µÄÖÐСÆóÒµ³ÆÈôÊÇΣ»£» £»£»£»£»úµ¼ÖÂËûÃÇÎÞ·¨ÉúÒâ £¬£¬£¬£¬£¬£¬ËûÃǽ«Ö»ÄÜ´æ»îÒ»¸öÔ¡£ ¡£¡£¡£¡£GallagherÔ¤¼ÆÈôÊÇÔâÊÜÕâÑùµÄ¹¥»÷ £¬£¬£¬£¬£¬£¬½ñÄêÓ¢¹úÓÐ5.7Íò¼ÒÖÐСÆóÒµ¿ÉÄÜÃæÁÙµ¹±ÕΣº¦¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/over-50000-uk-smes-could-collapse/


3.Ñо¿Ö°Ô±ÔÚ613¸öÈÈÃÅÍøÕ¾ÉÏ·¢Ã÷µã»÷Ð®ÖÆ¾ç±¾


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÔÚ±¾ÔÂÔçЩʱ¼ä½ÒÏþµÄһƪÂÛÎÄÖÐ £¬£¬£¬£¬£¬£¬Î¢ÈíÑо¿Ôº¡¢Ïã¸ÛÖÐÎÄ´óѧ¡¢Ê×¶û¹úÁ¢´óѧºÍ±öϦ·¨ÄáÑÇÖÝÁ¢´óѧµÄѧÕßÃÇ·¢Ã÷613¸öÈÈÃÅÍøÕ¾Ñ¬È¾Á˵ã»÷Ð®ÖÆ¾ç±¾¡£ ¡£¡£¡£¡£Ñо¿ÍŶӿª·¢ÁËÒ»¸öÃûΪObserverµÄ¹¤¾ß £¬£¬£¬£¬£¬£¬ÓÃÓÚɨÃèAlexa Top 250000×îÊܽӴýÍøÕ¾ÁÐ±í £¬£¬£¬£¬£¬£¬¼ì²âÊÇ·ñ±£´æÈýÖÖÀàÐ͵ĶñÒâ¾ç±¾£º³¬Á´½Óµã»÷Ð®ÖÆ£»£» £»£»£»£»µ¥»÷ÊÂÎñ´¦Öóͷ£Ð®ÖÆ£»£» £»£»£»£»Í¨¹ýÊÓ¾õÓÕÆ­µã»÷Ð®ÖÆ¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±¼ì²âµ½437¸öµÚÈý·½¾ç±¾Ð®ÖÆÁË613¸öÈÈÃÅÍøÕ¾µÄÓû§µã»÷ £¬£¬£¬£¬£¬£¬ÕâÐ©ÍøÕ¾ÌìÌìµÄ»á¼ûÁ¿´ï½ü4300Íò´Î¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/clickjacking-scripts-found-on-613-popular-sites-academics-say/


4.з¸·¨ÍÅ»ïLYCEUMÃé׼ʯÓͺÍ×ÔÈ»Æø¹«Ë¾


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ñо¿Ö°Ô±·¢Ã÷Ò»¸öǰËùδ֪µÄз¸·¨ÍÅ»ïLYCEUM £¬£¬£¬£¬£¬£¬LYCEUMÔÚ2019Äê±»ÊӲ쵽ÏòʯÓͺÍ×ÔÈ»Æø¹«Ë¾·¢ËÍ´øÓжñÒâExcel¸½¼þµÄ´¹ÂÚÓʼþ¡£ ¡£¡£¡£¡£¸Ã¸½¼þÓÃÓÚ·Ö·¢DanBot £¬£¬£¬£¬£¬£¬Ò»¸ö¿ÉÇÔȡƾ֤¡¢ÕË»§ÐÅÏ¢ÒÔ¼°¼üÅ̼ͼµÄжñÒâÈí¼þ¡£ ¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪLYCEUMÔçÔÚ2018Äê4Ô¾Í×îÏÈ»îÔ¾ £¬£¬£¬£¬£¬£¬ÆäÓòÃû×¢²áÐÐΪÅú×¢ÎúÒ»¸öÕë¶ÔÄÏ·ÇÄ¿µÄµÄ¹¥»÷»î¶¯¡£ ¡£¡£¡£¡£2019Äê2Ô £¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷¸Ã×éÖ¯µÄ¶ñÒ⹤¾ß°üÕë¶ÔÇå¾²³§É̹«¹²É¨ÃèЧÀ͵Ŀª·¢ºÍ²âÊԻÓÐËùÔöÌí¡£ ¡£¡£¡£¡£2019Äê5Ô £¬£¬£¬£¬£¬£¬¸Ã×éÖ¯Õë¶ÔÖж«µØÇøµÄʯÓͺÍ×ÔÈ»Æø¹«Ë¾ÌᳫÁËÒ»ÂÖ¹¥»÷»î¶¯¡£ ¡£¡£¡£¡£ËäȻûÓгä·ÖµÄÖ¤¾Ý¾ÙÐйéÒò £¬£¬£¬£¬£¬£¬µ«LYCEUMʹÓõļ¸ÖÖÒªÁìÀàËÆÓÚÓëÒÁÀÊÕþ¸®±£´æÁªÏµµÄAPT×éÖ¯Cobalt Gypsy¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/oil-and-gas-firms-targeted-by-new-lyceum-threat-group/147705/


5.¿ªÔ´Ä£ÄâÆ÷QEMUÎó²î¿Éµ¼ÖÂÐéÄâ»úÌÓÒÝ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¿ªÔ´Ä£ÄâÆ÷QEMU±»ÆØ±£´æÒ»¸ö¿Éµ¼ÖÂÐéÄâ»úÌÓÒݵÄÎó²î£¨CVE-2019-14378£©¡£ ¡£¡£¡£¡£Ó¡¶ÈÑо¿Ô±Vishnu Devͨ¹ý´úÂëÉ󼯷¢Ã÷ÁËÕâ¸öÎó²î £¬£¬£¬£¬£¬£¬²¢ÔÚ²¹¶¡Ðû²¼ÖÜΧºóÅû¶ÁËÎó²îϸ½Ú¡£ ¡£¡£¡£¡£¸ÃÎó²îÊÇÓëSlirpÓйصĶѻº³åÇøÒç³öÎó²î £¬£¬£¬£¬£¬£¬Æ¾Ö¤ºìñµÄÇ徲ͨ¸æ £¬£¬£¬£¬£¬£¬ip_reass()º¯ÊýÔÚÕûºÏ´«ÈëµÄÊý¾Ý°üʱ £¬£¬£¬£¬£¬£¬ÈôÊǵÚÒ»¸öƬ¶Ï´óÓÚm->m_dat[]»º³åÇø £¬£¬£¬£¬£¬£¬»á´¥·¢¸ÃÎó²î¡£ ¡£¡£¡£¡£¹¥»÷Õß¿ÉʹÓôËÎó²îµ¼ÖÂQEMUÀú³ÌÍ߽⠣¬£¬£¬£¬£¬£¬±¬·¢¾Ü¾øÐ§ÀÍ»òÒÔQEMUÀú³ÌµÄȨÏÞÖ´ÐÐí§Òâ´úÂë¡£ ¡£¡£¡£¡£QEMU±»ÒÔΪÊÇVMwareµÄÃâ·ÑÌæ»»Æ· £¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚ¶à¸öÖ÷ÒªµÄLinux¿¯ÐÐ°æ £¬£¬£¬£¬£¬£¬Xen¡¢VirtualBoxºÍKVM¶¼Ê¹ÓÃÁ˸ÃÈí¼þ¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/code-execution-flaw-qemu-mostly-impacts-development-test-vms


6.ImpervaÔâÓöÊý¾Ýй¶ £¬£¬£¬£¬£¬£¬WAF²úÆ·¿Í»§ÐÅÏ¢ÆØ¹â


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Çå¾²³§ÉÌImpervaÅû¶һÆðÊý¾Ýй¶ÊÂÎñ £¬£¬£¬£¬£¬£¬¸ÃÊÂÎñµ¼ÖÂÆäWAF²úÆ·µÄ²¿·Ö¿Í»§Ãô¸ÐÐÅÏ¢ÆØ¹â¡£ ¡£¡£¡£¡£ImpervaÊ×ϯִÐйÙChris Hylen͸¶ £¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔÚ2019Äê8ÔÂ20ÈÕÏàʶµ½ÕâÒ»ÊÂÎñ £¬£¬£¬£¬£¬£¬ÆØ¹âµÄÊý¾Ý°üÀ¨2017Äê9ÔÂ15ÈÕ֮ǰע²áµÄËùÓÐCloud WAF¿Í»§µÄµç×ÓÓʼþµØµãºÍ¼ÓÑιþÏ£ÃÜÂë £¬£¬£¬£¬£¬£¬ÒÔ¼°Óû§µÄAPIÃÜÔ¿ºÍSSLÖ¤Êé¡£ ¡£¡£¡£¡£¸Ã¹«Ë¾ÉÐδ͸¶ÕâЩÊý¾ÝÊÇÔõÑùй¶µÄ £¬£¬£¬£¬£¬£¬Ò²Ã»ÓÐ͸¶ÆäЧÀÍÆ÷ÊÇ·ñÔâµ½ÈëÇÖ»òÕßÊÇÊý¾Ý¿âÒâÍâ̻¶ÔÚ¹«ÍøÉÏ¡£ ¡£¡£¡£¡£¸Ã¹«Ë¾ÈÔÔÚÊÓ²ì´ËÊÂÎñ £¬£¬£¬£¬£¬£¬²¢ÒÑÈ·±£Í¨ÖªËùÓÐÊÜÓ°ÏìµÄ¿Í»§¡£ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/08/imperva-waf-breach.html