Ó¢¹úÁè¼Ý5Íò¼ÒÖÐСÆóÒµ¿ÉÄÜÒòÍøÂç¹¥»÷µ¹±Õ£»£»£»£»£»£»¿ªÔ´Ä£ÄâÆ÷QEMUÎó²î¿Éµ¼ÖÂÐéÄâ»úÌÓÒÝ£»£»£»£»£»£»ImpervaÊý¾Ýй¶
Ðû²¼Ê±¼ä 2019-08-281.΢Èí³Æ¶àÖØÉí·ÝÑéÖ¤¿É×èÖ¹99.9%µÄÕË»§ÈëÇÖ
΢ÈíÌåÏÖΪÕÊ»§ÆôÓöàÖØÉí·ÝÑéÖ¤£¨MFA£©¿É×èÖ¹99.9£¥µÄ×Ô¶¯¹¥»÷¡£¡£¡£¡£¡£ÕâÏÒé²»µ«ÊÊÓÃÓÚMicrosoftÕÊ»§£¬£¬£¬£¬£¬£¬»¹ÊÊÓÃÓÚÆäËüÈκÎÔÚÏßÍøÕ¾»òЧÀÍ¡£¡£¡£¡£¡£Ê£ÓàµÄ0.1%´ú±íÁËʹÓÃÊÖÒÕ½â¾ö¼Æ»®²¶»ñMFAÁîÅÆµÄÖØ´ó¹¥»÷£¬£¬£¬£¬£¬£¬ÓëÒ»Ñùƽ³£µÄ½©Ê¬ÍøÂçײ¿â¹¥»÷Ïà±È£¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷ÈÔÏ൱ÓÐÊý¡£¡£¡£¡£¡£Î¢ÈíµÄ½áÂÛÊÇ»ùÓÚÆäÔÆÐ§ÀÍÌìÌì¶¼Ôâµ½µÄ½ü3ÒÚ´ÎÚ²ÆÐԵǼʵÑé¡£¡£¡£¡£¡£5Ô·ݹȸèÒ²½ÒÏþÁËÀàËÆÑÔÂÛ£¬£¬£¬£¬£¬£¬¹È¸èÌåÏÖΪÆäGoogleÕÊ»§Ìí¼ÓÕһص绰ºÅÂ루ÒÔ¼°¼ä½ÓÆôÓöÌÐÅMFA£©µÄÓû§¿ÉÒÔ×èÖ¹100%µÄ×ÔÄîͷеÈË¡¢99%µÄÅúÁ¿´¹ÂÚ¹¥»÷ÒÔ¼°66%µÄÕë¶ÔÐÔ¹¥»÷¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/microsoft-using-multi-factor-authentication-blocks-99-9-of-account-hacks/
2.Ó¢¹úÁè¼Ý5Íò¼ÒÖÐСÆóÒµ¿ÉÄÜÒòÍøÂç¹¥»÷µ¹±Õ
ƾ֤GallagherµÄ×îÐÂÑо¿£¬£¬£¬£¬£¬£¬Ó¢¹úÁè¼Ý5Íò¼ÒÖÐСÐÍÆóÒµ¿ÉÄÜÒòÍøÂç¹¥»÷µ¼ÖÂÐÝÒµ¡£¡£¡£¡£¡£Ñо¿·¢Ã÷È¥ÄêÓÐ140Íò¼ÒÆóÒµÔâÊÜÖØ´ó¹¥»÷£¬£¬£¬£¬£¬£¬×ܼƺÄ×Ê88ÒÚÓ¢°÷¡£¡£¡£¡£¡£½üËÄ·ÖÖ®Ò»£¨24£¥£©µÄÆóÒµÊÜΣ»£»£»£»£»£»úÊÂÎñµÄÓ°Ïì - ±ÈǰһÄêÔöÌíÁË5%¡£¡£¡£¡£¡£ËäÈ»ÊÜÓ°ÏìÆóÒµµÄƽ¾ù±¾Ç®ÎªÔ¼6400Ó¢°÷£¬£¬£¬£¬£¬£¬µ«17£¥µÄÊÜ·ÃÕßÌåÏÖËûÃDZ»ÆÈÆÆ·Ñ1ÍòÓ¢°÷ÒÔÉÏ£¬£¬£¬£¬£¬£¬½üÊ®·ÖÖ®Ò»£¨9£¥£©µÄÆóÒµÖ§¸¶Áè¼Ý2ÍòÓ¢°÷¡£¡£¡£¡£¡£ËÄ·ÖÖ®Ò»£¨23£¥£©µÄÖÐСÆóÒµ³ÆÈôÊÇΣ»£»£»£»£»£»úµ¼ÖÂËûÃÇÎÞ·¨ÉúÒ⣬£¬£¬£¬£¬£¬ËûÃǽ«Ö»ÄÜ´æ»îÒ»¸öÔ¡£¡£¡£¡£¡£GallagherÔ¤¼ÆÈôÊÇÔâÊÜÕâÑùµÄ¹¥»÷£¬£¬£¬£¬£¬£¬½ñÄêÓ¢¹úÓÐ5.7Íò¼ÒÖÐСÆóÒµ¿ÉÄÜÃæÁÙµ¹±ÕΣº¦¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/over-50000-uk-smes-could-collapse/
3.Ñо¿Ö°Ô±ÔÚ613¸öÈÈÃÅÍøÕ¾ÉÏ·¢Ã÷µã»÷Ð®ÖÆ¾ç±¾
ÔÚ±¾ÔÂÔçЩʱ¼ä½ÒÏþµÄһƪÂÛÎÄÖУ¬£¬£¬£¬£¬£¬Î¢ÈíÑо¿Ôº¡¢Ïã¸ÛÖÐÎÄ´óѧ¡¢Ê×¶û¹úÁ¢´óѧºÍ±öϦ·¨ÄáÑÇÖÝÁ¢´óѧµÄѧÕßÃÇ·¢Ã÷613¸öÈÈÃÅÍøÕ¾Ñ¬È¾Á˵ã»÷Ð®ÖÆ¾ç±¾¡£¡£¡£¡£¡£Ñо¿ÍŶӿª·¢ÁËÒ»¸öÃûΪObserverµÄ¹¤¾ß£¬£¬£¬£¬£¬£¬ÓÃÓÚɨÃèAlexa Top 250000×îÊܽӴýÍøÕ¾ÁÐ±í£¬£¬£¬£¬£¬£¬¼ì²âÊÇ·ñ±£´æÈýÖÖÀàÐ͵ĶñÒâ¾ç±¾£º³¬Á´½Óµã»÷Ð®ÖÆ£»£»£»£»£»£»µ¥»÷ÊÂÎñ´¦Öóͷ£Ð®ÖÆ£»£»£»£»£»£»Í¨¹ýÊÓ¾õÓÕÆµã»÷Ð®ÖÆ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±¼ì²âµ½437¸öµÚÈý·½¾ç±¾Ð®ÖÆÁË613¸öÈÈÃÅÍøÕ¾µÄÓû§µã»÷£¬£¬£¬£¬£¬£¬ÕâÐ©ÍøÕ¾ÌìÌìµÄ»á¼ûÁ¿´ï½ü4300Íò´Î¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/clickjacking-scripts-found-on-613-popular-sites-academics-say/
4.з¸·¨ÍÅ»ïLYCEUMÃé׼ʯÓͺÍ×ÔÈ»Æø¹«Ë¾
Ñо¿Ö°Ô±·¢Ã÷Ò»¸öǰËùδ֪µÄз¸·¨ÍÅ»ïLYCEUM£¬£¬£¬£¬£¬£¬LYCEUMÔÚ2019Äê±»ÊӲ쵽ÏòʯÓͺÍ×ÔÈ»Æø¹«Ë¾·¢ËÍ´øÓжñÒâExcel¸½¼þµÄ´¹ÂÚÓʼþ¡£¡£¡£¡£¡£¸Ã¸½¼þÓÃÓÚ·Ö·¢DanBot£¬£¬£¬£¬£¬£¬Ò»¸ö¿ÉÇÔȡƾ֤¡¢ÕË»§ÐÅÏ¢ÒÔ¼°¼üÅ̼ͼµÄжñÒâÈí¼þ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪLYCEUMÔçÔÚ2018Äê4Ô¾Í×îÏÈ»îÔ¾£¬£¬£¬£¬£¬£¬ÆäÓòÃû×¢²áÐÐΪÅú×¢ÎúÒ»¸öÕë¶ÔÄÏ·ÇÄ¿µÄµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£2019Äê2Ô£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷¸Ã×éÖ¯µÄ¶ñÒ⹤¾ß°üÕë¶ÔÇå¾²³§É̹«¹²É¨ÃèЧÀ͵Ŀª·¢ºÍ²âÊԻÓÐËùÔöÌí¡£¡£¡£¡£¡£2019Äê5Ô£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯Õë¶ÔÖж«µØÇøµÄʯÓͺÍ×ÔÈ»Æø¹«Ë¾ÌᳫÁËÒ»ÂÖ¹¥»÷»î¶¯¡£¡£¡£¡£¡£ËäȻûÓгä·ÖµÄÖ¤¾Ý¾ÙÐйéÒò£¬£¬£¬£¬£¬£¬µ«LYCEUMʹÓõļ¸ÖÖÒªÁìÀàËÆÓÚÓëÒÁÀÊÕþ¸®±£´æÁªÏµµÄAPT×éÖ¯Cobalt Gypsy¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/oil-and-gas-firms-targeted-by-new-lyceum-threat-group/147705/
5.¿ªÔ´Ä£ÄâÆ÷QEMUÎó²î¿Éµ¼ÖÂÐéÄâ»úÌÓÒÝ
¿ªÔ´Ä£ÄâÆ÷QEMU±»ÆØ±£´æÒ»¸ö¿Éµ¼ÖÂÐéÄâ»úÌÓÒݵÄÎó²î£¨CVE-2019-14378£©¡£¡£¡£¡£¡£Ó¡¶ÈÑо¿Ô±Vishnu Devͨ¹ý´úÂëÉ󼯷¢Ã÷ÁËÕâ¸öÎó²î£¬£¬£¬£¬£¬£¬²¢ÔÚ²¹¶¡Ðû²¼ÖÜΧºóÅû¶ÁËÎó²îϸ½Ú¡£¡£¡£¡£¡£¸ÃÎó²îÊÇÓëSlirpÓйصĶѻº³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬£¬Æ¾Ö¤ºìñµÄÇ徲ͨ¸æ£¬£¬£¬£¬£¬£¬ip_reass()º¯ÊýÔÚÕûºÏ´«ÈëµÄÊý¾Ý°üʱ£¬£¬£¬£¬£¬£¬ÈôÊǵÚÒ»¸öƬ¶Ï´óÓÚm->m_dat[]»º³åÇø£¬£¬£¬£¬£¬£¬»á´¥·¢¸ÃÎó²î¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉʹÓôËÎó²îµ¼ÖÂQEMUÀú³ÌÍ߽⣬£¬£¬£¬£¬£¬±¬·¢¾Ü¾øÐ§ÀÍ»òÒÔQEMUÀú³ÌµÄȨÏÞÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£QEMU±»ÒÔΪÊÇVMwareµÄÃâ·ÑÌæ»»Æ·£¬£¬£¬£¬£¬£¬¿ÉÓÃÓÚ¶à¸öÖ÷ÒªµÄLinux¿¯Ðа棬£¬£¬£¬£¬£¬Xen¡¢VirtualBoxºÍKVM¶¼Ê¹ÓÃÁ˸ÃÈí¼þ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/code-execution-flaw-qemu-mostly-impacts-development-test-vms
6.ImpervaÔâÓöÊý¾Ýй¶£¬£¬£¬£¬£¬£¬WAF²úÆ·¿Í»§ÐÅÏ¢ÆØ¹â
Çå¾²³§ÉÌImpervaÅû¶һÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñµ¼ÖÂÆäWAF²úÆ·µÄ²¿·Ö¿Í»§Ãô¸ÐÐÅÏ¢ÆØ¹â¡£¡£¡£¡£¡£ImpervaÊ×ϯִÐйÙChris Hylen͸¶£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔÚ2019Äê8ÔÂ20ÈÕÏàʶµ½ÕâÒ»ÊÂÎñ£¬£¬£¬£¬£¬£¬ÆØ¹âµÄÊý¾Ý°üÀ¨2017Äê9ÔÂ15ÈÕ֮ǰע²áµÄËùÓÐCloud WAF¿Í»§µÄµç×ÓÓʼþµØµãºÍ¼ÓÑιþÏ£ÃÜÂ룬£¬£¬£¬£¬£¬ÒÔ¼°Óû§µÄAPIÃÜÔ¿ºÍSSLÖ¤Êé¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÉÐδ͸¶ÕâЩÊý¾ÝÊÇÔõÑùй¶µÄ£¬£¬£¬£¬£¬£¬Ò²Ã»ÓÐ͸¶ÆäЧÀÍÆ÷ÊÇ·ñÔâµ½ÈëÇÖ»òÕßÊÇÊý¾Ý¿âÒâÍâ̻¶ÔÚ¹«ÍøÉÏ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÈÔÔÚÊÓ²ì´ËÊÂÎñ£¬£¬£¬£¬£¬£¬²¢ÒÑÈ·±£Í¨ÖªËùÓÐÊÜÓ°ÏìµÄ¿Í»§¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/08/imperva-waf-breach.html