RedgateÐû²¼2020Äê¶ÈÊý¾Ý¿â״̬¼à²â±¨¸æ£»£»£»£»ºÚ¿Í¹¥»÷½ü2000¼ÒMagentoÔÚÏßÊÐËÁ£¬£¬£¬ÒÔÇÔÊØÐÅÓÿ¨
Ðû²¼Ê±¼ä 2020-09-151.RedgateÐû²¼2020Äê¶ÈÊý¾Ý¿â״̬¼à²â±¨¸æ
Redgate×îÐÂÐû²¼ÁË2020Äê¶ÈÊý¾Ý¿â״̬¼à²â±¨¸æ¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬ÎÞÂÛÊÇÔÚ½ÓÄÉÊý¾Ý¿âDevOps·½Ã棬£¬£¬ÕÕ¾ÉÔÚʹÓÃ¼à¿ØÀ´¸ú×ÙÊý¾Ý¿âÐÔÄܺͰ²ÅÅ·½Ã棬£¬£¬½ðÈÚЧÀÍÐÐÒµµÄÌåÏÖ¶¼ÓÅÓÚÆäËûÐÐÒµ¡£¡£¡£ÆäÖУ¬£¬£¬61%µÄ½ðÈÚЧÀÍÐÐÒµÔ±¹¤Ã¿ÖܸüÐÂÖÁÉÙÒ»´ÎÊý¾Ý¿â£¬£¬£¬¶øÆäËûÐÐÒµÖ»ÓÐ43%µÄÔ±¹¤»áÕâÑù×ö¡£¡£¡£½ðÈÚЧÀ͵ÄЧÀÍÆ÷ÊýĿҲ¸ü¶à£¬£¬£¬36%µÄЧÀÍÆ÷ÓµÓÐ50µ½500¸öʵÀý£¬£¬£¬¶øÆäËû²¿·ÖÖ»ÓÐ26%¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.helpnetsecurity.com/2020/09/14/database-monitoring-improves-devops-success/
2.Êý¾ÝÖÐÐÄEquinixѬȾNetwalker£¬£¬£¬Ãô¸ÐÐÅÏ¢»òÒÑй¶
Êý¾ÝÍйÜÖÐÐÄEquinixÐû²¼ÉùÃ÷£¬£¬£¬ÌåÏÖÆäÐí¶àÄÚ²¿ÏµÍ³Ôâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬µ«ÆäΪ¿Í»§ÌṩЧÀ͵ÄÖ÷Òª½¹µã²¢Î´Êܵ½Ó°Ïì¡£¡£¡£Ö®ºó£¬£¬£¬ºÚ¿Í×éÖ¯NetwalkerÌåÏÖÆäÀÖ³ÉÈëÇÖÁËEquinix²¢Ðû²¼Á˱»µÁÊý¾ÝµÄ½ØÍ¼£¬£¬£¬ÒÔ´ËҪЮ֧¸¶450ÍòÃÀÔªµÄÊê½ð¡£¡£¡£´Ë´Î×ß©µÄÊý¾Ý°üÀ¨¹«Ë¾²ÆÎñÐÅÏ¢ºÍÊý¾ÝÖÐÐı¨¸æ¡£¡£¡£ÏÖÔÚÉв»ÇåÎú´Ë´Î¹¥»÷µÄǰÒòºó¹û£¬£¬£¬EquinixÌåÏÖÕýÔÚ¾ÙÐÐÊӲ졣¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/data-center-giant-equinix-discloses-ransomware-incident/
3.·ÇÖÞÈûÉà¶û¿ª·¢ÒøÐÐÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬¿Í»§ÐÅÏ¢¿ÉÄܱ»µÁ
·ÇÖÞÈûÉà¶ûÖÐÑëÒøÐУ¨CBS£©½ÒÏþÒ»·ÝÐÂÎÅÉùÃ÷£¬£¬£¬ÈûÉà¶û¿ª·¢ÒøÐУ¨DBS£©Ôâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬¿Í»§ÐÅÏ¢»òÒѱ»µÁ¡£¡£¡£´Ë´Î¹¥»÷±¬·¢ÓÚ2020Äê9ÔÂ9ÈÕ£¬£¬£¬ÏêϸÐÅÏ¢»¹ÔÚÊÓ²ìÖ®ÖС£¡£¡£ËäÈ»ÏÖÔÚÉв»ÇåÎú¹¥»÷ÕßÊÇ·ñÔÚ¼ÓÃÜÒøÐÐϵͳ֮ǰÇÔÈ¡ÁËÊý¾Ý£¬£¬£¬µ«Æ¾Ö¤¹¥»÷ÖÐʹÓõÄÀÕË÷Èí¼þÀàÐÍ£¬£¬£¬ºÜÓпÉÄܱ¬·¢ÕâÖÖÇéÐΡ£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/development-bank-of-seychelles-hit-by-ransomware-attack/
4.ÃÀ¹úÓÊÕþ²¿·ÖITϵͳ±£´æ¶à¸öÎó²î£¬£¬£¬¿Éµ¼ÖÂÊý¾Ýй¶
ÃÀ¹úÓÊÕþ²¿·ÖµÄÒ»·ÝÉ󼯱¨¸æ·¢Ã÷£¬£¬£¬¸Ã²¿·ÖµÄITϵͳ±£´æ¶à¸öÎó²î£¬£¬£¬ÕâЩÎó²î¿ÉÄܱ»ºÚ¿ÍʹÓÃÀ´ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£î¿Ïµ»ú¹¹ÌåÏÖ£¬£¬£¬ÕâЩÎó²îÖÐÓÐ12¸öÔÖÄÑÐԵ쬣¬£¬ËüÃÇ¿ÉÄÜ»á¸ø¸Ã»ú¹¹´øÀ´ÖØ´óµÄ¾¼ÃËðʧ£¬£¬£¬ÆäÖаüÀ¨³£¼ûµÄ¡¢Òѱ»¹ûÕæÈýÄêµÄÎó²î¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬»¹Ã»ÓÐÈκÎÖ¤¾ÝÅú×¢ÕâЩÎó²îÒѱ»ºÚ¿ÍʹÓᣡ£¡£
ÔÎÄÁ´½Ó£º
https://www.cyberscoop.com/postal-service-inspector-general-cyber-vulnerabilities/
5.Ñо¿ÍŶӷ¢Ã÷ʹÓÃOffice 365 API´¹ÂÚ¹¥»÷»î¶¯
Ñо¿ÍŶӷ¢Ã÷Ò»ÖÖеÄÍøÂç´¹ÂÚ¹¥»÷»î¶¯£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÉí·ÝÑéÖ¤APIʵʱÑéÖ¤Êܺ¦ÕßµÄOffice 365ƾ֤¡£¡£¡£´Ë´Î¹¥»÷ÖеĴ¹ÂÚÓʼþÖ¸ÏòÓëOffice 365µÇ¼ҳÏàͬµÄ´¹ÂÚÍøÕ¾£¬£¬£¬²¢ÇÒÓû§ÃûÒÑÔ¤ÏÈÊäÈë¡£¡£¡£Ò»µ©Êܺ¦Õß½«Æäƾ֤ÊäÈëµ½ÍøÂç´¹ÂÚµÇÂ¼Ò³Ãæ£¬£¬£¬Azure Active DirectoryµÇ¼ÈÕÖ¾¾Í»áÏÔʾÓëÔÚ¸½¼þÍøÒ³ÉÏÖ´ÐеÄXHRÇëÇóÏà¶ÔÓ¦µÄÁ¬Ã¦µÇ¼ʵÑé¡£¡£¡£ÈôÊÇÉí·ÝÑéÖ¤Àֳɣ¬£¬£¬Ôò½«Óû§Öض¨Ïòµ½zoom.com¡£¡£¡£ÈôÊÇÉí·ÝÑé֤ʧ°Ü£¬£¬£¬Ôò»á½«Óû§Öض¨Ïòµ½login.microsoftonline.com¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/office-365-phishing-attack-leverages-real-time-active-directory-validation/159188/
6.ºÚ¿Í¹¥»÷½ü2000¼ÒMagentoÔÚÏßÊÐËÁ£¬£¬£¬ÒÔÇÔÊØÐÅÓÿ¨
ÉÏÖÜÄ©£¬£¬£¬ÐÅÓÿ¨ÇÔȡԤ·À¹«Ë¾Sanguine Security·¢Ã÷ÔÚÒÑÍùËÄÌìÖкڿÍÈëÇÖÁË1904¼ÒMagentoÔÚÏßÊÐËÁ£¬£¬£¬ÒÔÇÔÊØÐÅÓÿ¨¡£¡£¡£¹¥»÷ʼÓÚÉÏÖÜÎ壬£¬£¬ÆäʱÓÐ10¼ÒÊÐËÁѬȾÁË´Óδ¼û¹ýµÄÐÅÓÿ¨ÇÔÈ¡¾ç±¾¡£¡£¡£Ö®ºó£¬£¬£¬¹¥»÷ÔÚÖÜÁù¼¤Ôö£¬£¬£¬ÓÐ1058¸öÕ¾µã±»ºÚ¿ÍÈëÇÖ£¬£¬£¬ÔÚÖÜÈÕÓÐ603¸öÕ¾µã±»ÈëÇÖ£¬£¬£¬ÖÜÒ»ÓÐ233¸ö±»ÈëÇÖ¡£¡£¡£Sanguine SecurityÌåÏÖ£¬£¬£¬ÕâÊÇ×Ô2015Äê×îÏÈ¼à¿Øµç×ÓÉÌÎñÊÐËÁÒÔÀ´£¬£¬£¬ËûÃÇËù¿´µ½µÄ×î´óµÄMagento¹¥»÷¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/magento-stores-hit-by-largest-automated-hacking-attack-since-2015/