RedgateÐû²¼2020Äê¶ÈÊý¾Ý¿â״̬¼à²â±¨¸æ £»£»£»£»ºÚ¿Í¹¥»÷½ü2000¼ÒMagentoÔÚÏßÊÐËÁ£¬£¬ £¬ÒÔÇÔÊØÐÅÓÿ¨

Ðû²¼Ê±¼ä 2020-09-15

1.RedgateÐû²¼2020Äê¶ÈÊý¾Ý¿â״̬¼à²â±¨¸æ


1.png


Redgate×îÐÂÐû²¼ÁË2020Äê¶ÈÊý¾Ý¿â״̬¼à²â±¨¸æ¡£¡£¡£±¨¸æÏÔʾ£¬£¬ £¬ÎÞÂÛÊÇÔÚ½ÓÄÉÊý¾Ý¿âDevOps·½Ã棬£¬ £¬ÕÕ¾ÉÔÚʹÓÃ¼à¿ØÀ´¸ú×ÙÊý¾Ý¿âÐÔÄܺͰ²ÅÅ·½Ã棬£¬ £¬½ðÈÚЧÀÍÐÐÒµµÄÌåÏÖ¶¼ÓÅÓÚÆäËûÐÐÒµ¡£¡£¡£ÆäÖУ¬£¬ £¬61%µÄ½ðÈÚЧÀÍÐÐÒµÔ±¹¤Ã¿ÖܸüÐÂÖÁÉÙÒ»´ÎÊý¾Ý¿â£¬£¬ £¬¶øÆäËûÐÐÒµÖ»ÓÐ43%µÄÔ±¹¤»áÕâÑù×ö¡£¡£¡£½ðÈÚЧÀ͵ÄЧÀÍÆ÷ÊýĿҲ¸ü¶à£¬£¬ £¬36%µÄЧÀÍÆ÷ÓµÓÐ50µ½500¸öʵÀý£¬£¬ £¬¶øÆäËû²¿·ÖÖ»ÓÐ26%¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/09/14/database-monitoring-improves-devops-success/


2.Êý¾ÝÖÐÐÄEquinixѬȾNetwalker£¬£¬ £¬Ãô¸ÐÐÅÏ¢»òÒÑй¶


2.png


Êý¾ÝÍйÜÖÐÐÄEquinixÐû²¼ÉùÃ÷£¬£¬ £¬ÌåÏÖÆäÐí¶àÄÚ²¿ÏµÍ³Ôâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬µ«ÆäΪ¿Í»§ÌṩЧÀ͵ÄÖ÷Òª½¹µã²¢Î´Êܵ½Ó°Ïì¡£¡£¡£Ö®ºó£¬£¬ £¬ºÚ¿Í×éÖ¯NetwalkerÌåÏÖÆäÀÖ³ÉÈëÇÖÁËEquinix²¢Ðû²¼Á˱»µÁÊý¾ÝµÄ½ØÍ¼£¬£¬ £¬ÒÔ´ËҪЮ֧¸¶450ÍòÃÀÔªµÄÊê½ð¡£¡£¡£´Ë´Î×ß©µÄÊý¾Ý°üÀ¨¹«Ë¾²ÆÎñÐÅÏ¢ºÍÊý¾ÝÖÐÐı¨¸æ¡£¡£¡£ÏÖÔÚÉв»ÇåÎú´Ë´Î¹¥»÷µÄǰÒòºó¹û£¬£¬ £¬EquinixÌåÏÖÕýÔÚ¾ÙÐÐÊӲ졣¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/data-center-giant-equinix-discloses-ransomware-incident/


3.·ÇÖÞÈûÉà¶û¿ª·¢ÒøÐÐÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬¿Í»§ÐÅÏ¢¿ÉÄܱ»µÁ


3.png


·ÇÖÞÈûÉà¶ûÖÐÑëÒøÐУ¨CBS£©½ÒÏþÒ»·ÝÐÂÎÅÉùÃ÷£¬£¬ £¬ÈûÉà¶û¿ª·¢ÒøÐУ¨DBS£©Ôâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬ £¬¿Í»§ÐÅÏ¢»òÒѱ»µÁ¡£¡£¡£´Ë´Î¹¥»÷±¬·¢ÓÚ2020Äê9ÔÂ9ÈÕ£¬£¬ £¬ÏêϸÐÅÏ¢»¹ÔÚÊÓ²ìÖ®ÖС£¡£¡£ËäÈ»ÏÖÔÚÉв»ÇåÎú¹¥»÷ÕßÊÇ·ñÔÚ¼ÓÃÜÒøÐÐϵͳ֮ǰÇÔÈ¡ÁËÊý¾Ý£¬£¬ £¬µ«Æ¾Ö¤¹¥»÷ÖÐʹÓõÄÀÕË÷Èí¼þÀàÐÍ£¬£¬ £¬ºÜÓпÉÄܱ¬·¢ÕâÖÖÇéÐΡ£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/development-bank-of-seychelles-hit-by-ransomware-attack/


4.ÃÀ¹úÓÊÕþ²¿·ÖITϵͳ±£´æ¶à¸öÎó²î£¬£¬ £¬¿Éµ¼ÖÂÊý¾Ýй¶


4.jpg


ÃÀ¹úÓÊÕþ²¿·ÖµÄÒ»·ÝÉ󼯱¨¸æ·¢Ã÷£¬£¬ £¬¸Ã²¿·ÖµÄITϵͳ±£´æ¶à¸öÎó²î£¬£¬ £¬ÕâЩÎó²î¿ÉÄܱ»ºÚ¿ÍʹÓÃÀ´ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£î¿Ïµ»ú¹¹ÌåÏÖ£¬£¬ £¬ÕâЩÎó²îÖÐÓÐ12¸öÔÖÄÑÐԵ쬣¬ £¬ËüÃÇ¿ÉÄÜ»á¸ø¸Ã»ú¹¹´øÀ´ÖØ´óµÄ¾­¼ÃËðʧ£¬£¬ £¬ÆäÖаüÀ¨³£¼ûµÄ¡¢Òѱ»¹ûÕæÈýÄêµÄÎó²î¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬ £¬»¹Ã»ÓÐÈκÎÖ¤¾ÝÅú×¢ÕâЩÎó²îÒѱ»ºÚ¿ÍʹÓᣡ£¡£


Ô­ÎÄÁ´½Ó£º

https://www.cyberscoop.com/postal-service-inspector-general-cyber-vulnerabilities/


5.Ñо¿ÍŶӷ¢Ã÷ʹÓÃOffice 365 API´¹ÂÚ¹¥»÷»î¶¯


5.jpg


Ñо¿ÍŶӷ¢Ã÷Ò»ÖÖеÄÍøÂç´¹ÂÚ¹¥»÷»î¶¯£¬£¬ £¬¹¥»÷Õß¿ÉʹÓÃÉí·ÝÑéÖ¤APIʵʱÑéÖ¤Êܺ¦ÕßµÄOffice 365ƾ֤¡£¡£¡£´Ë´Î¹¥»÷ÖеĴ¹ÂÚÓʼþÖ¸ÏòÓëOffice 365µÇ¼ҳÏàͬµÄ´¹ÂÚÍøÕ¾£¬£¬ £¬²¢ÇÒÓû§ÃûÒÑÔ¤ÏÈÊäÈë¡£¡£¡£Ò»µ©Êܺ¦Õß½«Æäƾ֤ÊäÈëµ½ÍøÂç´¹ÂÚµÇÂ¼Ò³Ãæ£¬£¬ £¬Azure Active DirectoryµÇ¼ÈÕÖ¾¾Í»áÏÔʾÓëÔÚ¸½¼þÍøÒ³ÉÏÖ´ÐеÄXHRÇëÇóÏà¶ÔÓ¦µÄÁ¬Ã¦µÇ¼ʵÑé¡£¡£¡£ÈôÊÇÉí·ÝÑéÖ¤Àֳɣ¬£¬ £¬Ôò½«Óû§Öض¨Ïòµ½zoom.com¡£¡£¡£ÈôÊÇÉí·ÝÑé֤ʧ°Ü£¬£¬ £¬Ôò»á½«Óû§Öض¨Ïòµ½login.microsoftonline.com¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/office-365-phishing-attack-leverages-real-time-active-directory-validation/159188/


6.ºÚ¿Í¹¥»÷½ü2000¼ÒMagentoÔÚÏßÊÐËÁ£¬£¬ £¬ÒÔÇÔÊØÐÅÓÿ¨


6.jpg


ÉÏÖÜÄ©£¬£¬ £¬ÐÅÓÿ¨ÇÔȡԤ·À¹«Ë¾Sanguine Security·¢Ã÷ÔÚÒÑÍùËÄÌìÖкڿÍÈëÇÖÁË1904¼ÒMagentoÔÚÏßÊÐËÁ£¬£¬ £¬ÒÔÇÔÊØÐÅÓÿ¨¡£¡£¡£¹¥»÷ʼÓÚÉÏÖÜÎ壬£¬ £¬ÆäʱÓÐ10¼ÒÊÐËÁѬȾÁË´Óδ¼û¹ýµÄÐÅÓÿ¨ÇÔÈ¡¾ç±¾¡£¡£¡£Ö®ºó£¬£¬ £¬¹¥»÷ÔÚÖÜÁù¼¤Ôö£¬£¬ £¬ÓÐ1058¸öÕ¾µã±»ºÚ¿ÍÈëÇÖ£¬£¬ £¬ÔÚÖÜÈÕÓÐ603¸öÕ¾µã±»ÈëÇÖ£¬£¬ £¬ÖÜÒ»ÓÐ233¸ö±»ÈëÇÖ¡£¡£¡£Sanguine SecurityÌåÏÖ£¬£¬ £¬ÕâÊÇ×Ô2015Äê×îÏÈ¼à¿Øµç×ÓÉÌÎñÊÐËÁÒÔÀ´£¬£¬ £¬ËûÃÇËù¿´µ½µÄ×î´óµÄMagento¹¥»÷¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/magento-stores-hit-by-largest-automated-hacking-attack-since-2015/