Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄÎó²î£»£»£» £» £»Apodis PharmaÊý¾Ý¿âÉèÖùýʧй¶1.7TBÉñÃØÊý¾Ý

Ðû²¼Ê±¼ä 2020-12-02
1.Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄÎó²î


1.jpg


Cisco TalosÅû¶WebKitä¯ÀÀÆ÷ÒýÇæ±£´æ¶à¸öÑÏÖØµÄÎó²î¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÓëWebKitµÄWebSocket¡¢AudioSourceProviderGStreamerºÍImageDecoderGStreamer¹¦Ð§ÓйØ¡£¡£¡£¡£¡£¡£»®·ÖΪWebSocket´úÂëÖ´ÐÐÎó²î£¨CVE-2020-13543£©£¬£¬£¬£¬£¬£¬¿Éͨ¹ý´¥·¢ÊͷźóʹÓÃÎó²îÀ´Ô¶³ÌÖ´ÐдúÂ룻£»£» £» £»ImageDecoderGStreamerÊͷźóʹÓÃÎó²î£¨CVE-2020-13584£©£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÔ¶³ÌÖ´ÐдúÂ룬£¬£¬£¬£¬£¬ÒÔ¼°±»×·×ÙΪCVE-2020-13543µÄÎó²î¡£¡£¡£¡£¡£¡£    


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/webkit-vulnerabilities-allow-remote-code-execution-malicious-websites


2.Ô½ÄÏ×éÖ¯BismuthÃé×¼·¨¹úºÍÔ½ÄϵÄÕþ¸®»ú¹¹ºÍ¹«Ë¾


2.jpg


΢Èí·¢Ã÷Ô½ÄϺڿÍ×éÖ¯BismuthÃé×¼·¨¹úºÍÔ½ÄϵÄÕþ¸®»ú¹¹ºÍ¹«Ë¾¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ï×Ô2012ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬£¬²¢ÒÔ´úºÅAPT32ºÍOceanLotusµÈΪÈËËùÖª¡£¡£¡£¡£¡£¡£ÆäÖ÷Òª¿ªÕ¹Õë¶Ôº£ÄÚÍâµÄÖØ´óºÚ¿Í»î¶¯£¬£¬£¬£¬£¬£¬Ä¿µÄÊÇÍøÂçÐÅÏ¢ÒÔ×ÊÖúÆäÕþ¸®´¦Öóͷ£ÕþÖΡ¢¾­¼ÃºÍÍâ½»Õþ²ß¾öÒé¡£¡£¡£¡£¡£¡£µ«Î¢Èí·¢Ã÷£¬£¬£¬£¬£¬£¬ÔÚ2020Äê7ÔÂÖÁ2020Äê8Ô£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÔÚÕë¶Ô·¨¹úºÍÔ½ÄϵÄÕþ¸®»ú¹¹ºÍ¹«Ë¾µÄ¹¥»÷ÖÐ×îÏÈʹÓÃMoneroÍÚ¿óÈí¼þ£¬£¬£¬£¬£¬£¬ÏÖÔÚÉв»ÇåÎúÆäΪºÎ¾ÙÐд˸ü¸Ä¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-links-vietnamese-state-hackers-to-crypto-mining-malware-campaign/


3.Ñо¿ÍŶӷ¢Ã÷GotkitÓëREvilµÄÏàÖúͬ°é¹ØÏµÖØÉú


3.jpg


Ñо¿ÍŶӷ¢Ã÷£¬£¬£¬£¬£¬£¬ÔÚ³¤´ïÒ»ÄêµÄÐÝÏ¢ºó£¬£¬£¬£¬£¬£¬ÐÅÏ¢ÇÔȡľÂíGootkitÓëREvilÒ»ÆðÔÚÕë¶ÔµÂ¹úµÄÐÂÕ½ÕùÖÐÖØÉú¡£¡£¡£¡£¡£¡£Ôڴ˴ι¥»÷»î¶¯ÖУ¬£¬£¬£¬£¬£¬ºÚ¿Í¹¥»÷WordPressÍøÕ¾£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃSEO²¡¶¾Ïò»á¼ûÕßչʾαÔìµÄÂÛ̳Ìû×Ó£¬£¬£¬£¬£¬£¬²¢¸½ÓжñÒâ±í¸ñ»òÏÂÔØµÄÁ´½Ó¡£¡£¡£¡£¡£¡£µ±Óû§µã»÷Á´½Óʱ£¬£¬£¬£¬£¬£¬½«ÏÂÔØÒ»¸ö°üÀ¨»ìÏýµÄJSÎļþµÄZIPÎļþ£¬£¬£¬£¬£¬£¬¸ÃÎļþ½«×°ÖÃGootkit¶ñÒâÈí¼þ»òREvilÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Ê¹ÓÃÁË»ìÏýµÄÓÐÓÃÔØºÉ¿É½«ÆäÆÊÎö³ÉƬ¶Ï´æ´¢ÔÚ×¢²á±íÖУ¬£¬£¬£¬£¬£¬Ê¹µÃÇå¾²Èí¼þ¸üÄѼì²âµ½¸Ã¶ñÒâ¸ºÔØ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/gootkit-malware-returns-to-life-alongside-revil-ransomware/


4.Ñо¿ÍŶӷ¢Ã÷¿Éͨ¹ýαÔìPayPal±íµ¥ÇÔÈ¡Óû§ÐÅÏ¢


4.jpg


Ñо¿ÍŶӷ¢Ã÷еÄÐÅÓÿ¨ÇÔÈ¡Æ÷¿Éͨ¹ýαÔìPayPal±íµ¥ÇÔÈ¡Óû§ÐÅÏ¢¡£¡£¡£¡£¡£¡£¸ÃÇÔÈ¡Æ÷ÊÇ»ùÓÚJavaScriptµÄ¾ç±¾£¬£¬£¬£¬£¬£¬ÓÃÓÚ×¢Èëµ½µçÉÌÆ½Ì¨µÄ½áÕÊÒ³ÃæÖС£¡£¡£¡£¡£¡£¸Ã¾ç±¾Í¨¹ýÒþдÊõ±»Òþ²ØÔÚ±»Íйܵ½ÊÜѬȾÊÐËÁµÄЧÀÍÆ÷ÉϵÄÓ³ÏñÖС£¡£¡£¡£¡£¡£È»ºó£¬£¬£¬£¬£¬£¬Ëü»áʹÓÃÖ®Ç°ÍøÂçµÄ¶©µ¥Êý¾ÝÀ´Ô¤ÌîαÔìµÄPayPalÖ§¸¶±íµ¥£¬£¬£¬£¬£¬£¬ÔÙ½«Êܺ¦ÕßÖØ¶¨Ïòµ½PayPalµÄ¶©µ¥Ò³Ãæ¡£¡£¡£¡£¡£¡£Ò»µ©Êܺ¦ÕßÊäÈëÁ˸¶¿îÐÅÏ¢²¢µã»÷ÁËÌá½»°´Å¥£¬£¬£¬£¬£¬£¬¸ÃÇÔÈ¡Æ÷»á½«ÆäËùÓÐÐÅÏ¢´«»Øµ½¹¥»÷ÕßµÄЧÀÍÆ÷¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/credit-card-skimmer-fills-fake-paypal-forms-with-stolen-order-info/


5.ResearchAndMarketsÐû²¼Î´À´5ÄêSD-WANÊг¡Õ¹Íû±¨¸æ


5.jpg


ResearchAndMarketsÐû²¼ÁËδÀ´5ÄêSD-WANÊг¡Õ¹Íû±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÔ¤¼Æ£¬£¬£¬£¬£¬£¬È«ÇòSD-WANÊг¡¹æÄ£½«´Ó2020ÄêµÄ19ÒÚÃÀÔªÔöÌíµ½2025ÄêµÄ84ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬ÔÚ´Ëʱ´úµÄ¸´ºÏÄêÔöÌíÂÊ£¨CAGR£©Îª34.5£¥¡£¡£¡£¡£¡£¡£°´×éÖ¯¹æÄ£»£»£» £» £»®·Ö£¬£¬£¬£¬£¬£¬ÖÐСÐÍÆóÒµ½«Õ¼Óиü¸ßµÄÊг¡·Ý¶î¡£¡£¡£¡£¡£¡£ÓÉÓÚ¸ü¶àµÄSD-WAN½â¾ö¼Æ»®»ùÓÚÔÆ£¬£¬£¬£¬£¬£¬Ìá¸ßÁËÆä¿ÉÔâÊÜÐÔ£¬£¬£¬£¬£¬£¬Ê¹ÖÐСÆóÒµ¶ÔSD-WAN½â¾ö¼Æ»®µÄÐèÇóÔöÌí¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÆóÒµÕýתÏò»ùÓÚÔÆµÄÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬Òò´ËÔ¤¼ÆÔư²ÅŽ«ÔÚδÀ´Ö÷µ¼Êг¡¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.researchandmarkets.com/reports/5137053/software-defined-wide-area-network-sd-wan


6.Apodis PharmaÊý¾Ý¿âÉèÖùýʧй¶1.7TBÉñÃØÊý¾Ý


6.jpg


CyberNews·¢Ã÷Apodis PharmaµÄElasticSearchÊý¾Ý¿âÉèÖùýʧ£¬£¬£¬£¬£¬£¬Ð¹Â¶Áè¼Ý1.7TBµÄÉñÃØÊý¾Ý¡£¡£¡£¡£¡£¡£Apodis PharmaÊÇÒ»¼ÒΪҩ·¿¡¢Ò½ÁÆ»ú¹¹µÈ¹«Ë¾ÌṩÊý×Ö¹©Ó¦Á´ÖÎÀíÆ½Ì¨ºÍÈí¼þ½â¾ö¼Æ»®µÄ¹«Ë¾¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿â°üÀ¨´ó×ÚÓëÓªÒµÏà¹ØµÄÉñÃØÊý¾Ý£¬£¬£¬£¬£¬£¬°üÀ¨Ò©Æ·×°ÔËÊý¾ÝºÍ´æ´¢×´Ì¬¡¢Æä25000¶à¸öÏàÖúͬ°éºÍ¿Í»§µÄµµ°¸¡¢²úÆ·ÊýÄ¿ºÍIDµÈ²úÆ·Êý¾Ý¡¢ÏúÊÛÈÕÆÚºÍ¼ÛÇ®µÈÏúÊÛÐÅÏ¢¡¢¿Í»§¼°Ô±¹¤ÐÕÃûµÈÓû§Êý¾Ý¡¢ÏûºÄÕߺͿͻ§Êý¾ÝµÄ¿ÉÊÓ»¯ºÍÆÊÎöÊý¾Ý¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿âÒÑÓÚ11ÔÂ17ÈÕ±»±£»£»£» £» £»¤ÆðÀ´¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/111756/data-breach/apodis-pharma-data-leak.html