ºÚ¿Í¿ÉʹÓü¤¹âÈëÇÖGoogleÖÇÄÜÓïÒôÖúÊÖ£»£»£»ÒÁÀ¿ËÕþ¸®Çжϻ¥ÁªÍø£¬£¬£¬£¬£¬ÓÃÓÚ×èÖ¹¿¹Òé»î¶¯
Ðû²¼Ê±¼ä 2019-11-06
½üÆÚ£¬£¬£¬£¬£¬ÈÕ±¾µç×ÓͨѶ´óѧºÍÃÜЪ¸ù´óѧµÄÑо¿Ö°Ô±·¢Ã÷¿Éͨ¹ý¼¤¹âÈëÇֹȸ衢ƻ¹ûºÍÑÇÂíÑ·µÄÖÇÄÜÓïÒô×°±¸¡£¡£¡£¡£¡£ÕâÖÖ±»³ÆÎª¡°¹âÏÂÁµÄ¹¥»÷¿Éͨ¹ýÏòʹÓÃ΢»úµçϵͳ£¨MEMS£©µÄÂó¿Ë·çÉÏ·¢É伤¹âÊøÊµÏÖ£¬£¬£¬£¬£¬Í¨¹ýµ÷ÖÆ¹âÊøµÄÇ¿¶È£¬£¬£¬£¬£¬¿ÉÒÔÓÕÆMEMS±¬·¢ÓëÒôƵÏÂÁîÏàͬµÄµçÐźţ¬£¬£¬£¬£¬×îÔ¶ÉõÖÁ¿ÉÒÔ´Ó110Ã×Íâ¹¥»÷¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄ×°±¸°üÀ¨¹È¸èHome¡¢Nest Cam¡¢ÑÇÂíÑ·Echo¡¢Fire Cube TV¡¢iPhone¡¢ÈýÐÇGalaxy S9¡¢¹È¸èPixelºÍiPad¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¤Êµ¸Ã¹¥»÷ÉõÖÁ¿ÉÒÔ·¿ª³µ¿âÃÅ»ò½âËøºâÓîÃÅ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/using-light-beams-to-control-google-apple-amazon-assistants/2¡¢ÒÁÀ¿ËÕþ¸®Çжϻ¥ÁªÍø£¬£¬£¬£¬£¬ÓÃÓÚ×èÖ¹¿¹Òé»î¶¯
¾ÝNetBlocks±¨µÀ£¬£¬£¬£¬£¬´ÓÍâµØÊ±¼ä11ÔÂ5ÈÕ00:00×îÏÈ£¬£¬£¬£¬£¬ÒÁÀ¿ËÊ×¶¼°Í¸ñ´ïºÍÒÁÀ¿Ë´ó²¿·ÖµØÇøµÄ»¥ÁªÍø½ÓÈëÒѱ»Çжϣ¬£¬£¬£¬£¬ÌìÏÂÁªÍøË®Æ½ÒѲ»µ½Ò»Ñùƽ³£Ë®Æ½µÄ19%£¬£¬£¬£¬£¬°Í¸ñ´ï¸÷µØÊýÍòÍòÓû§ÏÂÏߣ¬£¬£¬£¬£¬°ÍÊ¿À¡¢¿¨¶û°ÍÀºÍÆäËûÉú³ÝÖÐÐͼÊÜÓ°Ïì¡£¡£¡£¡£¡£ÍøÂçÕÉÁ¿Êý¾ÝÅú×¢ÕâÊÇÆù½ñΪֹÔÚÒÁÀ¿ËÊӲ쵽µÄ×îÑÏÖØµÄ¶ÏÍøÇéÐΣ¬£¬£¬£¬£¬¶ø´ËǰÔÚÓп¹Òé»î¶¯±¬·¢Ê±£¬£¬£¬£¬£¬ÒÁÀ¿ËÕþ¸®Ôø½ÓÄɹý¶ÏÍø²½·¥¡£¡£¡£¡£¡£×Ô½ñÄê10Ô³õÒÔÀ´£¬£¬£¬£¬£¬ÒÁÀ¿ËÒ»Ö±Êܵ½ÌìÏÂÐÔ¿¹Òé»î¶¯µÄ¹¥»÷¡£¡£¡£¡£¡£¾Ý±¨µÀ£¬£¬£¬£¬£¬¿¹ÒéÃñÖÚµÄËßÇó°üÀ¨ÏÖÕþ¸®ÏĄ̂£¬£¬£¬£¬£¬¾ÙÐо¼ÃˢУ¬£¬£¬£¬£¬¸ÄÉÆÉúÑÄÌõ¼þºÍÉç»á¸£Àû£¬£¬£¬£¬£¬¿¢ÊÂÃÓÀõȡ£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://netblocks.org/reports/iraq-shuts-down-internet-again-as-protests-intensify-Q8oOWz8n3¡¢Ó¡¶ÈVedantu¹«Ë¾Êý¾Ýй¶ӰÏì68.7ÍòÓû§

Ó¡¶È½ÌÓý¿Æ¼¼¹«Ë¾VedantuÔÚ¼¸¸öÔÂǰÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬µ«Ö±µ½ÏÖÔÚ²Å֪ͨ¿Í»§¡£¡£¡£¡£¡£¾ÝHaveIBeenPwned³Æ£¬£¬£¬£¬£¬¸ÃÊÂÎñ±¬·¢ÔÚ7Ô·ݣ¬£¬£¬£¬£¬µ¼ÖÂ68.7ÍòVedantuÓû§µÄСÎÒ˽¼ÒÊý¾Ýй¶¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾ÝÃûÌÃΪJSON£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµãºÍIPµØµã¡¢µç»°ºÅÂë¡¢ÐÔ±ðºÍ¹þÏ£ÃÜÂë¡£¡£¡£¡£¡£±¨¸æÖгÆÊÂÎñÔµ¹ÊÔÓÉ¿ÉÄÜÊÇMongoDBÊý¾Ý¿â̻¶£¬£¬£¬£¬£¬µ«ÉÐδ»ñµÃ֤ʵ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/attack-on-indian-ed-tech-firm/4¡¢PDF±à¼Æ÷Able2ExtractÐÞ¸´Á½¸öRCEÎó²î
˼¿ÆTalosÑо¿Ö°Ô±·¢Ã÷InvestintechµÄAble2Extract Professional¹¤¾ß±£´æÁ½¸öÄÚ´æËð»µÎó²î£¬£¬£¬£¬£¬¿Éµ¼ÖÂÔÚÄ¿µÄÅÌËã»úÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£Able2ExtractÊÇÊÊÓÃÓÚWindows¡¢MacºÍLinuxµÄ¿çƽ̨PDF±à¼¹¤¾ß£¬£¬£¬£¬£¬Æäרҵ°æÔÚ135¸ö¹ú¼Ò/µØÇøÓµÓÐÁè¼Ý25ÍòÃûÓû§¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷µÄÁ½¸öÎó²î£¨CVE-2019-5088ºÍCVE-2019-5089£©Ó°ÏìÁ˰汾14.0.7 x64£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÓÕʹÓû§·¿ª¶ñÒâJPEG»òBMPÎļþÀ´´¥·¢Îó²î¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ11ÔÂ1ÈÕÔÚа汾ÖÐÐÞ¸´ÁËÕâЩÎÊÌâ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/93424/hacking/able2extract-tool-flaws.html
5¡¢ÀÕË÷Èí¼þNemtyͨ¹ý½©Ê¬ÍøÂçTrikÈö²¥
ÈüÃÅÌú¿ËÑо¿Ö°Ô±ÊӲ쵽ÀÕË÷Èí¼þNemtyÕýÔÚÓë½©Ê¬ÍøÂçTrikÏàÖúÒÔÀ©´óÆäÓ°Ïì¹æÄ£¡£¡£¡£¡£¡£NemtyÊ״α»·¢Ã÷ÓÚ8Ô£¬£¬£¬£¬£¬¶øTrikÒѾ¾ßÓÐ10ÄêµÄÀúÊ·¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆNemtyÔì³ÉµÄѬȾ´ó´ó¶¼¶¼ÔÚº«¹ú£¨40%£©ºÍÖйú£¨36%£©·¢Ã÷£¬£¬£¬£¬£¬¶øÔÚ10Ô·Ýа汾µÄTrikÖ÷Ҫͨ¹ýSMBÐÒéʵÑéÅþÁ¬µ½Ä¿µÄÅÌËã»úµÄ139¶Ë¿Ú£¬£¬£¬£¬£¬È»ºóÈö²¥Nemty payload¡£¡£¡£¡£¡£NemtyµÄÄ¿½ñ°æ±¾ÊÇ1.6£¬£¬£¬£¬£¬ËäÈ»1.4ºÍ1.6¶¼ÒÑÓÐÃâ·ÑµÄ½âÃÜÆ÷£¬£¬£¬£¬£¬µ«½âÃÜÆ÷Éв»¿ÉÔÚËùÓеÄÀ©Õ¹ÃûÉÏʹÓᣡ£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.symantec.com/blogs/threat-intelligence/nemty-ransomware-trik-botnet
6¡¢¿¨°Í˹»ù·¢Ã÷Shadow BrokersÌá¼°µÄAPT
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/kaspersky-identifies-mysterious-apt-mentioned-in-2017-shadow-brokers-leak/