Cisco³ÆÆä²¿·Ö²úÆ·ÒòSnortÖеÄÎó²îÒ×ÊÜDoS¹¥»÷£»£»£»£»£»£»Spirit AirlinesѬȾNefilim£¬£¬£¬£¬Ð¹Â¶Áè¼Ý40GBÊý¾Ý
Ðû²¼Ê±¼ä 2021-03-081.Cisco³ÆÆä²¿·Ö²úÆ·ÒòSnortÖеÄÎó²îÒ×ÊÜDoS¹¥»÷
Cisco³ÆÆä²¿·Ö²úÆ·ÒòSnort¼ì²âÒýÇæÖеÄÎó²îÒ×ÊÜDoS¹¥»÷¡£¡£¡£¡£¡£¡£¸ÃÎó²îλÓÚSnort¼ì²âÒýÇæµÄÒÔÌ«ÍøÖ¡½âÂëÆ÷ÖУ¬£¬£¬£¬±»×·×ÙΪCVE-2021-1285£¬£¬£¬£¬CVSSÆÀ·ÖΪ7.4¡£¡£¡£¡£¡£¡£¸ÃÎó²îÊǶÔÒÔÌ«ÍøÖ¡µÄ¹ýʧ״̬´¦Öóͷ£²»×¼È·ËùÖ£¬£¬£¬£¬Î´ÂÄÀúÖ¤µÄ¹¥»÷Õß¿ÉÒÔÏòÄ¿µÄ×°±¸·¢ËͶñÒâÒÔÌ«ÍøÖ¡À´Ê¹ÓôËÎó²î¡£¡£¡£¡£¡£¡£ÀÖ³ÉʹÓøÃÎó²î¿ÉÒԺľ¡Ä¿µÄÉè±¹ØÁ¬Ä´ÅÅ̿ռ䣬£¬£¬£¬µ¼ÖÂÖÎÀíÔ±ÎÞ·¨µÇ¼µ½¸Ã×°±¸»ò¸Ã×°±¸ÎÞ·¨×¼È·Æô¶¯¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/115341/security/cisco-products-dos-snort-issue.html
2.Spirit AirlinesѬȾNefilim£¬£¬£¬£¬Ð¹Â¶Áè¼Ý40GBÊý¾Ý
Spirit AirlinesѬȾNefilim£¬£¬£¬£¬Ð¹Â¶Áè¼Ý40GBÊý¾ÝºÍÁè¼Ý33000¸öÎļþ¡£¡£¡£¡£¡£¡£ÔçÔÚ2017Ä꣬£¬£¬£¬Spirit AirlinesÊ״α¬·¢Êý¾Ýй¶£¬£¬£¬£¬ºÚ¿Í´Ó¸Ãº½¿Õ¹«Ë¾µÄITϵͳÇÔÈ¡ÁËÁè¼Ý1170Íò¸öÕÊ»§ÐÅÏ¢¡£¡£¡£¡£¡£¡£Ê±¸ôËÄÄê¸Ã¹«Ë¾Ôٴα¬·¢Á˸üÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Ð¹Â¶ÁËÓû§¹ºÖûúƱµÄÉúÒâµÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬ÀýÈçÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢ÉúÒâºÅ¡¢¹ºÆ±µÄʱ¼äºÍÈÕÆÚ¡¢¼ÛÇ®¡¢Ë°½ðÒÔ¼°ÐÅÓÿ¨ÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¸Ã¹«Ë¾²¢Î´Ðû²¼Óйش˴ÎÊÂÎñµÄÐÅÏ¢¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.suspectfile.com/florida-compagnia-aerea-spirit-airlines-nuovamente-colpita-da-un-data-breach/
3.Ñо¿Ö°Ô±·¢Ã÷REvilµÄ¹¥»÷»î¶¯£¬£¬£¬£¬Ê¹ÓÃVOIPºÍDDoS¹¥»÷
ÃûΪ3xp0rtµÄÑо¿Ö°Ô±·¢Ã÷REvilµÄ¹¥»÷»î¶¯£¬£¬£¬£¬×îÏÈʹÓÃVOIPºÍDDoS¹¥»÷¡£¡£¡£¡£¡£¡£REvilÊÇÒ»ÖÖÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©£¬£¬£¬£¬ÆäÐÂÕ½ÂÔÖаüÀ¨Ê¹ÓÃÓïÒô¼ÓÃÜVOIPµç»°£¬£¬£¬£¬ÏòýÌåºÍÊܺ¦ÕßÌṩÓйع¥»÷µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬¸ÃÍŻﻹÌṩÁ˸¶·ÑµÄ¹¥»÷ЧÀÍ£¬£¬£¬£¬¿ÉÒÔ¶ÔÄ¿µÄ¹«Ë¾¾ÙÐÐLayer 3ºÍLayer 7µÄDDoS¹¥»÷¡£¡£¡£¡£¡£¡£ÆäÖÐLayer 3µÄ¹¥»÷ͨ³£ÓÃÓÚ¶Ï¿ª¹«Ë¾µÄInternetÅþÁ¬£¬£¬£¬£¬Layer 7µÄ¹¥»÷ÓÃÀ´¹Ø±ÕÄ¿µÄ¹«Ë¾¿É¹ûÕæ»á¼ûµÄÓ¦ÓóÌÐò£¬£¬£¬£¬ÀýÈçWebЧÀÍÆ÷¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/ransomware-gang-plans-to-call-victims-business-partners-about-attacks/
4.Õë¶ÔCPUµÄÐÂÐͲàÐŵÀ¹¥»÷¿Éй¶¼ÓÃÜÃÜÔ¿µÈÐÅÏ¢
ÒÁÀûŵÒÁ´óѧµÄÑо¿ÍŶӷ¢Ã÷Õë¶ÔCPUÄÚ²¿¼Ü¹¹µÄÐÂÐͲàÐŵÀ¹¥»÷¡£¡£¡£¡£¡£¡£ÒÑÍùµÄ²àÐŵÀ¹¥»÷Ö÷Òª¹Ø×¢µÄÊÇCPUζȡ¢µçÉÈÔëÒô¡¢´«Êä¹ýʧ£¬£¬£¬£¬ÒÔ¼°CPUµÄÄÚ²¿»º´æÏµÍ³½á¹¹£¬£¬£¬£¬¶ø´Ë´Î¹¥»÷Ñо¿ÁËÉÐδʹÓõĶàºËCPUµÄÒ»²¿·Ö£¬£¬£¬£¬¼´»·Ðλ¥Á¬£¨ring interconnect£©£¬£¬£¬£¬Ò²³ÆÎª»·ÐÎ×ÜÏß¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬ÓÉÓÚ´ËÀ๥»÷²»ÒÀÀµÓÚ¹²ÏíÄÚ´æ¡¢»º´æ¼¯¡¢½¹µã×ÊÔ´»òÈκÎÌØ¶¨µÄ·Ç½¹µã½á¹¹£¬£¬£¬£¬Òò´ËʹÓÃÏÖÓеIJàÐŵÀ·ÀÓù·½·¨ºÜÄѾÙÐлº½â¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://therecord.media/new-side-channel-attack-targets-the-cpu-ring-bus-for-the-first-time/
5.ZimperiumÐû²¼ÓйØÒƶ¯Ó¦ÓÃÊý¾Ýй¶µÄÆÊÎö±¨¸æ
ZimperiumÐû²¼ÁËÓйØÒƶ¯Ó¦ÓÃÊý¾Ýй¶µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¸Ã±¨¸æÆÊÎöÁËÖ÷ÒªÒÆ¶¯²Ù×÷ϵͳ£¨iOSºÍAndroid£©µÄÓ¦Ó㬣¬£¬£¬Õë¶ÔËĸöÔÆ´æ´¢Ð§ÀÍ£ºÑÇÂíÑ·AWS¡¢Î¢ÈíAzure¡¢¹È¸èStorageºÍFirebase¡£¡£¡£¡£¡£¡£Ñо¿·¢Ã÷£¬£¬£¬£¬ÓÐ14£¥µÄʹÓÃÔÆ´æ´¢µÄÒÆ¶¯Ó¦ÓóÌÐò±£´æÉèÖÃÎÊÌ⣬£¬£¬£¬¿Éй¶PII£¨Ò½ÁÆÓ¦ÓúÍÉ罻ýÌåÓ¦Óõȣ©¡¢µ¼ÖÂڲƻ£¨²Æ²ú500Ç¿ÊÖ»úÇ®°üºÍ½»Í¨Ó¦Óõȣ©¡¢Ì»Â¶IPºÍÄÚ²¿ÏµÍ³ÉèÖã¨ÐÂÎÅЧÀͺͻú³¡Ð§À͵ȣ©¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬ÊÜÓ°ÏìµÄÐÐÒµÖ÷ÒªÊÇÉÌÒµ¡¢¹ºÎï¡¢Éç½»¡¢Í¨Ñ¶ºÍ¹¤¾ßÐÐÒµ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.zimperium.com/unsecured-cloud-configurations-exposing-information-in-thousands-of-mobile-apps/
6.Ó¢ÌØ¶ûÐû²¼2020Äê²úÆ·Çå¾²ÐÔµÄÆÊÎö±¨¸æ
Ó¢ÌØ¶ûÐû²¼ÁË2020Äê²úÆ·Çå¾²ÐÔµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬ÔÚ2020ÄêÅû¶µÄ231¸öÎó²îÖУ¬£¬£¬£¬ÓÐ109¸ö(47%)ÊÇÓÉÓ¢ÌØ¶ûÔ±¹¤Í¨¹ýÇå¾²Ñо¿·¢Ã÷µÄ£¬£¬£¬£¬¶ø¼ÓÈëÎó²îÉͽðÍýÏëµÄÍⲿÑо¿Ö°Ô±±¨¸æÁË105¸öÎó²î£¨45£¥£©¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬ÓÉÍⲿ·¢Ã÷µÄ´ó²¿·ÖÎó²î¶¼±£´æÓÚÔÚÈí¼þÖУ¬£¬£¬£¬Ö÷ÒªÔÚÓÃÓÚͼÐΡ¢ÍøÂçºÍÀ¶ÑÀ×é¼þµÄÈí¼þÊÊÓóÌÐòºÍÈí¼þÇý¶¯³ÌÐòÖС£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬Çý¶¯³ÌÐòºÍÆäËûÈí¼þ×é¼þÖеÄÎó²î×î¶à£¬£¬£¬£¬Îª93¸ö£»£»£»£»£»£»Æä´ÎΪ¹Ì¼þ£¬£¬£¬£¬±£´æ66¸öÎó²î£»£»£»£»£»£»¶øÓÐ58¸öÎó²îÓ°Ïìµ½¹Ì¼þºÍÈí¼þµÄ×éºÏ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blogs.intel.com/technology/2021/03/ipas-intel-2020-product-security-report/#gs.vg4enn