Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄÎó²î £»£»£»£»Apodis PharmaÊý¾Ý¿âÉèÖùýʧй¶1.7TBÉñÃØÊý¾Ý

Ðû²¼Ê±¼ä 2020-12-02
1.Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄÎó²î


1.jpg


Cisco TalosÅû¶WebKitä¯ÀÀÆ÷ÒýÇæ±£´æ¶à¸öÑÏÖØµÄÎó²î¡£¡£¡£¡£¡£ ¡£ÕâЩÎó²îÓëWebKitµÄWebSocket¡¢AudioSourceProviderGStreamerºÍImageDecoderGStreamer¹¦Ð§ÓйØ¡£¡£¡£¡£¡£ ¡£»®·ÖΪWebSocket´úÂëÖ´ÐÐÎó²î£¨CVE-2020-13543£©£¬£¬£¬£¬¿Éͨ¹ý´¥·¢ÊͷźóʹÓÃÎó²îÀ´Ô¶³ÌÖ´ÐдúÂë £»£»£»£»ImageDecoderGStreamerÊͷźóʹÓÃÎó²î£¨CVE-2020-13584£©£¬£¬£¬£¬¿Éµ¼ÖÂÔ¶³ÌÖ´ÐдúÂ룬£¬£¬£¬ÒÔ¼°±»×·×ÙΪCVE-2020-13543µÄÎó²î¡£¡£¡£¡£¡£ ¡£    


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/webkit-vulnerabilities-allow-remote-code-execution-malicious-websites


2.Ô½ÄÏ×éÖ¯BismuthÃé×¼·¨¹úºÍÔ½ÄϵÄÕþ¸®»ú¹¹ºÍ¹«Ë¾


2.jpg


΢Èí·¢Ã÷Ô½ÄϺڿÍ×éÖ¯BismuthÃé×¼·¨¹úºÍÔ½ÄϵÄÕþ¸®»ú¹¹ºÍ¹«Ë¾¡£¡£¡£¡£¡£ ¡£¸ÃÍÅ»ï×Ô2012ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬²¢ÒÔ´úºÅAPT32ºÍOceanLotusµÈΪÈËËùÖª¡£¡£¡£¡£¡£ ¡£ÆäÖ÷Òª¿ªÕ¹Õë¶Ôº£ÄÚÍâµÄÖØ´óºÚ¿Í»î¶¯£¬£¬£¬£¬Ä¿µÄÊÇÍøÂçÐÅÏ¢ÒÔ×ÊÖúÆäÕþ¸®´¦Öóͷ£ÕþÖΡ¢¾­¼ÃºÍÍâ½»Õþ²ß¾öÒé¡£¡£¡£¡£¡£ ¡£µ«Î¢Èí·¢Ã÷£¬£¬£¬£¬ÔÚ2020Äê7ÔÂÖÁ2020Äê8Ô£¬£¬£¬£¬¸Ã×éÖ¯ÔÚÕë¶Ô·¨¹úºÍÔ½ÄϵÄÕþ¸®»ú¹¹ºÍ¹«Ë¾µÄ¹¥»÷ÖÐ×îÏÈʹÓÃMoneroÍÚ¿óÈí¼þ£¬£¬£¬£¬ÏÖÔÚÉв»ÇåÎúÆäΪºÎ¾ÙÐд˸ü¸Ä¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-links-vietnamese-state-hackers-to-crypto-mining-malware-campaign/


3.Ñо¿ÍŶӷ¢Ã÷GotkitÓëREvilµÄÏàÖúͬ°é¹ØÏµÖØÉú


3.jpg


Ñо¿ÍŶӷ¢Ã÷£¬£¬£¬£¬ÔÚ³¤´ïÒ»ÄêµÄÐÝÏ¢ºó£¬£¬£¬£¬ÐÅÏ¢ÇÔȡľÂíGootkitÓëREvilÒ»ÆðÔÚÕë¶ÔµÂ¹úµÄÐÂÕ½ÕùÖÐÖØÉú¡£¡£¡£¡£¡£ ¡£Ôڴ˴ι¥»÷»î¶¯ÖУ¬£¬£¬£¬ºÚ¿Í¹¥»÷WordPressÍøÕ¾£¬£¬£¬£¬²¢Ê¹ÓÃSEO²¡¶¾Ïò»á¼ûÕßչʾαÔìµÄÂÛ̳Ìû×Ó£¬£¬£¬£¬²¢¸½ÓжñÒâ±í¸ñ»òÏÂÔØµÄÁ´½Ó¡£¡£¡£¡£¡£ ¡£µ±Óû§µã»÷Á´½Óʱ£¬£¬£¬£¬½«ÏÂÔØÒ»¸ö°üÀ¨»ìÏýµÄJSÎļþµÄZIPÎļþ£¬£¬£¬£¬¸ÃÎļþ½«×°ÖÃGootkit¶ñÒâÈí¼þ»òREvilÀÕË÷Èí¼þ¡£¡£¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬Ê¹ÓÃÁË»ìÏýµÄÓÐÓÃÔØºÉ¿É½«ÆäÆÊÎö³ÉƬ¶Ï´æ´¢ÔÚ×¢²á±íÖУ¬£¬£¬£¬Ê¹µÃÇå¾²Èí¼þ¸üÄѼì²âµ½¸Ã¶ñÒâ¸ºÔØ¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/gootkit-malware-returns-to-life-alongside-revil-ransomware/


4.Ñо¿ÍŶӷ¢Ã÷¿Éͨ¹ýαÔìPayPal±íµ¥ÇÔÈ¡Óû§ÐÅÏ¢


4.jpg


Ñо¿ÍŶӷ¢Ã÷еÄÐÅÓÿ¨ÇÔÈ¡Æ÷¿Éͨ¹ýαÔìPayPal±íµ¥ÇÔÈ¡Óû§ÐÅÏ¢¡£¡£¡£¡£¡£ ¡£¸ÃÇÔÈ¡Æ÷ÊÇ»ùÓÚJavaScriptµÄ¾ç±¾£¬£¬£¬£¬ÓÃÓÚ×¢Èëµ½µçÉÌÆ½Ì¨µÄ½áÕÊÒ³ÃæÖС£¡£¡£¡£¡£ ¡£¸Ã¾ç±¾Í¨¹ýÒþдÊõ±»Òþ²ØÔÚ±»Íйܵ½ÊÜѬȾÊÐËÁµÄЧÀÍÆ÷ÉϵÄÓ³ÏñÖС£¡£¡£¡£¡£ ¡£È»ºó£¬£¬£¬£¬Ëü»áʹÓÃÖ®Ç°ÍøÂçµÄ¶©µ¥Êý¾ÝÀ´Ô¤ÌîαÔìµÄPayPalÖ§¸¶±íµ¥£¬£¬£¬£¬ÔÙ½«Êܺ¦ÕßÖØ¶¨Ïòµ½PayPalµÄ¶©µ¥Ò³Ãæ¡£¡£¡£¡£¡£ ¡£Ò»µ©Êܺ¦ÕßÊäÈëÁ˸¶¿îÐÅÏ¢²¢µã»÷ÁËÌá½»°´Å¥£¬£¬£¬£¬¸ÃÇÔÈ¡Æ÷»á½«ÆäËùÓÐÐÅÏ¢´«»Øµ½¹¥»÷ÕßµÄЧÀÍÆ÷¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/credit-card-skimmer-fills-fake-paypal-forms-with-stolen-order-info/


5.ResearchAndMarketsÐû²¼Î´À´5ÄêSD-WANÊг¡Õ¹Íû±¨¸æ


5.jpg


ResearchAndMarketsÐû²¼ÁËδÀ´5ÄêSD-WANÊг¡Õ¹Íû±¨¸æ¡£¡£¡£¡£¡£ ¡£±¨¸æÔ¤¼Æ£¬£¬£¬£¬È«ÇòSD-WANÊг¡¹æÄ£½«´Ó2020ÄêµÄ19ÒÚÃÀÔªÔöÌíµ½2025ÄêµÄ84ÒÚÃÀÔª£¬£¬£¬£¬ÔÚ´Ëʱ´úµÄ¸´ºÏÄêÔöÌíÂÊ£¨CAGR£©Îª34.5£¥¡£¡£¡£¡£¡£ ¡£°´×éÖ¯¹æÄ £»£»£»£»®·Ö£¬£¬£¬£¬ÖÐСÐÍÆóÒµ½«Õ¼Óиü¸ßµÄÊг¡·Ý¶î¡£¡£¡£¡£¡£ ¡£ÓÉÓÚ¸ü¶àµÄSD-WAN½â¾ö¼Æ»®»ùÓÚÔÆ£¬£¬£¬£¬Ìá¸ßÁËÆä¿ÉÔâÊÜÐÔ£¬£¬£¬£¬Ê¹ÖÐСÆóÒµ¶ÔSD-WAN½â¾ö¼Æ»®µÄÐèÇóÔöÌí¡£¡£¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬ÆóÒµÕýתÏò»ùÓÚÔÆµÄÓ¦ÓóÌÐò£¬£¬£¬£¬Òò´ËÔ¤¼ÆÔư²ÅŽ«ÔÚδÀ´Ö÷µ¼Êг¡¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.researchandmarkets.com/reports/5137053/software-defined-wide-area-network-sd-wan


6.Apodis PharmaÊý¾Ý¿âÉèÖùýʧй¶1.7TBÉñÃØÊý¾Ý


6.jpg


CyberNews·¢Ã÷Apodis PharmaµÄElasticSearchÊý¾Ý¿âÉèÖùýʧ£¬£¬£¬£¬Ð¹Â¶Áè¼Ý1.7TBµÄÉñÃØÊý¾Ý¡£¡£¡£¡£¡£ ¡£Apodis PharmaÊÇÒ»¼ÒΪҩ·¿¡¢Ò½ÁÆ»ú¹¹µÈ¹«Ë¾ÌṩÊý×Ö¹©Ó¦Á´ÖÎÀíÆ½Ì¨ºÍÈí¼þ½â¾ö¼Æ»®µÄ¹«Ë¾¡£¡£¡£¡£¡£ ¡£¸ÃÊý¾Ý¿â°üÀ¨´ó×ÚÓëÓªÒµÏà¹ØµÄÉñÃØÊý¾Ý£¬£¬£¬£¬°üÀ¨Ò©Æ·×°ÔËÊý¾ÝºÍ´æ´¢×´Ì¬¡¢Æä25000¶à¸öÏàÖúͬ°éºÍ¿Í»§µÄµµ°¸¡¢²úÆ·ÊýÄ¿ºÍIDµÈ²úÆ·Êý¾Ý¡¢ÏúÊÛÈÕÆÚºÍ¼ÛÇ®µÈÏúÊÛÐÅÏ¢¡¢¿Í»§¼°Ô±¹¤ÐÕÃûµÈÓû§Êý¾Ý¡¢ÏûºÄÕߺͿͻ§Êý¾ÝµÄ¿ÉÊÓ»¯ºÍÆÊÎöÊý¾Ý¡£¡£¡£¡£¡£ ¡£¸ÃÊý¾Ý¿âÒÑÓÚ11ÔÂ17ÈÕ±»± £»£»£»£»¤ÆðÀ´¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/111756/data-breach/apodis-pharma-data-leak.html