΢ÈíÐû²¼7Ô·ÝÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´9¸ö0dayÔÚÄÚµÄ117¸öÎó²î£»£»£»£»£»£»Ê±ÉÐÆ·ÅÆGuessÔâµ½DarkSideÀÕË÷¹¥»÷й¶200GBÎļþ

Ðû²¼Ê±¼ä 2021-07-15

1.΢ÈíÐû²¼7Ô·ÝÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´9¸ö0dayÔÚÄÚµÄ117¸öÎó²î


1.jpg


΢ÈíÐû²¼ÁË2021Äê7Ô·ݵÄÖܶþ²¹¶¡£¬£¬£¬£¬£¬£¬ÐÞ¸´Á˰üÀ¨9¸ö0dayÔÚÄÚµÄ117¸öÎó²î¡£¡£¡£¡£ÕâЩÎó²îÖУ¬£¬£¬£¬£¬£¬44¸öΪԶ³Ì´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬32¸öΪÌáȨÎó²î£¬£¬£¬£¬£¬£¬14¸öΪÐÅϢй¶Îó²î£¬£¬£¬£¬£¬£¬12¸öΪ¾Ü¾øÐ§ÀÍÎó²î£¬£¬£¬£¬£¬£¬8¸öΪÇå¾²¹¦Ð§ÈƹýÎó²î£¬£¬£¬£¬£¬£¬7¸öΪÓÕÆ­Îó²î¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ9¸ö0dayÖУ¬£¬£¬£¬£¬£¬ÓÐ4¸öÒѱ»ÔÚÔÚҰʹÓ㬣¬£¬£¬£¬£¬°üÀ¨PrintNightmareÎó²î£¨CVE-2021-34527£©¡¢WindowsÄÚºËÌáȨÎó²î£¨CVE-2021-33771ºÍCVE-2021-31979£©ÒÔ¼°¾ç±¾ÒýÇæÄÚ´æËð»µÎó²î£¨CVE-2021-34448£©¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2021-patch-tuesday-fixes-9-zero-days-117-flaws/


2.SolarWindsÐÞ¸´Serv-UÖÐÒѱ»Ê¹ÓõÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î


2.jpg


SolarWindsÔÚ7ÔÂ9ÈÕÐû²¼µÄServ-U 15.2.3 HF2ÖÐÐÞ¸´ÁËÒ»¸öÒѱ»Ê¹ÓõÄ0day¡£¡£¡£¡£MicrosoftÅû¶ÁËServ-U²úÆ·µÄÔ¶³Ì´úÂëÖ´ÐÐ0day£¨CVE-2021-35211£©£¬£¬£¬£¬£¬£¬Ô¶³Ì¹¥»÷ÕßʹÓôËÎó²îÄܹ»ÒÔÌØÊâȨÏÞÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬£¬ÔÚÄ¿µÄϵͳÉÏ×°Öò¢ÔËÐгÌÐò¡¢Éó²é¡¢¸ü¸Ä»òɾ³ýÊý¾ÝµÈ¡£¡£¡£¡£ÏÖÔÚ¸ÃÎó²îÒѾ­³ö±»Ò°Ê¹Ó㬣¬£¬£¬£¬£¬µ«SolarWindsÌåÏÖ£¬£¬£¬£¬£¬£¬ÈôÊÇServ-UÇéÐÎÖÐδÆôÓÃSSH£¬£¬£¬£¬£¬£¬Ôò¸ÃÎó²î²»±£´æ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/solarwinds-patches-critical-serv-u-vulnerability-exploited-in-the-wild/


3.ʱÉÐÆ·ÅÆGuessÔâµ½DarkSideÀÕË÷¹¥»÷й¶200GBÎļþ


3.jpg


ÃÀ¹úʱÉÐÆ·ÅƺÍÁãÊÛÉÌGuessÔâµ½DarkSideÀÕË÷¹¥»÷й¶200GBÎļþ¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬£¬£¬¹¥»÷±¬·¢ÔÚ2021Äê2ÔÂ2ÈÕÖÁ2021Äê2ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔÚ6ÔÂ3ÈÕÍê³ÉÊÓ²ìºóÈ·¶¨ÁËÊÜÓ°ÏìµÄ¿Í»§²¢ÓÚ6ÔÂ9ÈÕ½«´ËÊÂÎñ֪ͨ¸øÆä¿Í»§¡£¡£¡£¡£¾­ÊÓ²ìÈ·¶¨£¬£¬£¬£¬£¬£¬Ð¹Â¶ÐÅÏ¢°üÀ¨Éç»áÇå¾²ºÅÂë¡¢¼ÝÕÕºÅÂë¡¢»¤ÕÕºÅÂëºÍ/»ò²ÆÎñÕʺÅ£¬£¬£¬£¬£¬£¬Ö»Éæ¼°1300¶àÈË¡£¡£¡£¡£Guess²¢Î´Í¸Â©Óйع¥»÷ÕßµÄÈκÎÐÅÏ¢£¬£¬£¬£¬£¬£¬¿ÉÊÇDarkSideÔøÔÚ4Ô·ÝÉù³ÆÆä¹¥»÷ÁËGuess²¢ÇÔÈ¡ÁËÁè¼Ý200GBµÄÎļþ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/fashion-retailer-guess-notifies-users-data-breach


4.ºÚ¿Í³öÊÛ6ÒÚLinkedInÓû§ÐÅÏ¢²¢³ÆÐÂÊý¾Ý±È֮ǰµÄ¸üºÃ


4.jpg


ºÚ¿ÍÔÚ°µÍø³öÊÛÁË6ÒÚ¸öLinkedInÓû§µÄÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢³ÆÕâЩÊý¾ÝÊÇеÄ£¬£¬£¬£¬£¬£¬±ÈÖ®Ç°ÍøÂçµÄÊý¾Ý¸üºÃ¡£¡£¡£¡£ºÚ¿ÍÐû²¼ÁË632699¸öÓû§ÐÅÏ¢×÷ΪÑù±¾£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÁËÐÕÃû¡¢ÁìÓ¢ID¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢LinkedInСÎÒ˽¼Ò×ÊÁÏURL¡¢ÆäËûÉ罻ýÌå×ÊÁϵÄÁ´½Ó¡¢ÐԱ𡢳öÉúÈÕÆÚ¡¢ËùÔÚ¡¢Ö°³ÆºÍÆäËûÊÂÇéÏà¹ØÊý¾ÝµÈ¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬ËäÈ»ÕâЩÊý¾Ý²»ÊǺÜÃô¸Ð£¬£¬£¬£¬£¬£¬µ«¹¥»÷ÕßÈÔÈ»¿ÉÒÔʹÓÃÕâЩÐÅϢͨ¹ýÉç»á¹¤³ÌµÄÒªÁì¿ìËÙµØÕÒµ½Ð¹¥»÷Ä¿µÄ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://cybernews.com/news/threat-actors-scrape-600-million-linkedin-profiles-and-are-selling-the-data-online-again/


5.Ñо¿Ö°Ô±·¢Ã÷TrickBot»ØºÏ²¢ÐÂÔöÓÃÓÚ¼à¿ØµÄVNCÄ£¿ £¿£¿£¿£¿£¿£¿é


5.jpg


Ñо¿Ö°Ô±·¢Ã÷TrickBot»ØºÏ²¢ÐÂÔöÁËÓÃÓÚ¼à¿ØºÍÇé±¨ÍøÂçµÄVNCÄ£¿ £¿£¿£¿£¿£¿£¿é¡£¡£¡£¡£Trickbot×Ô2016Äêµ×ÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬£¬²¢ÓÚ2020Äê10Ô·ݱ»Î¢ÈíºÍ¶à¸öÇå¾²³§ÉÌÁªºÏµ·»Ù¡£¡£¡£¡£¿ÉÊÇ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÏÖÔÚµÄTrickbot±ÈÒÔÍùÈκÎʱ¼ä¶¼Ô½·¢»îÔ¾£¬£¬£¬£¬£¬£¬²¢ÓÚ2021Äê5Ô¼ì²âµ½ÁËvncDllÄ£¿ £¿£¿£¿£¿£¿£¿éµÄ¸üа汾tvncDll£¬£¬£¬£¬£¬£¬ÓÃÓÚ¼à¿ØºÍÇé±¨ÍøÂç¡£¡£¡£¡£¸ÃÄ£¿ £¿£¿£¿£¿£¿£¿éËÆºõ»¹ÔÚ¿ª·¢ÖУ¬£¬£¬£¬£¬£¬ÓÉÓÚÓÐÒ»¸öƵÈԵĸüÐÂʱ¼ä±í£¬£¬£¬£¬£¬£¬À´°´ÆÚÌí¼Óй¦Ð§ºÍÐÞ¸´¹ýʧ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bitdefender.com/blog/labs/trickbot-activity-increases-new-vnc-module-on-the-radar


6.AberdeenºÍcode42ÁªºÏÐû²¼ÓйØÄÚ²¿Î£º¦µÄÆÊÎö±¨¸æ


6.jpg


AberdeenºÍcode42ÁªºÏÐû²¼ÁËÓйØÄÚ²¿Î£º¦µÄÆÊÎö±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬Èý·ÖÖ®Ò»µÄÊý¾Ýй¶ÊÂÎñÉæ¼°ÄÚ²¿Ö°Ô±£¬£¬£¬£¬£¬£¬¶øÆäÖÐÔ¼80%ÈËÊÇÎÞÒâµÄ£»£»£»£»£»£»75%µÄ×éÖ¯¶ÔÆäÇéÐÎûÓÐÒ»Ö¡¢¼¯ÖеĿɼûÐÔ£»£»£»£»£»£»2020Ä꣬£¬£¬£¬£¬£¬ÔÚÖÕ¶ËÉϱ¬·¢Îó²îµÄ¿ÉÄÜÐÔÊÇЧÀÍÆ÷ÉϵÄ4.5±¶£»£»£»£»£»£»Êý¾Ý̻¶й¶µÄƽ¾ùÊýÄ¿ÊÇÿ¸öÓû§ÌìÌì»á±¬·¢13¸öÊý¾Ýй¶ÊÂÎñ£»£»£»£»£»£»ÄÚ²¿Ö°Ô±Êý¾Ýй¶µÄ±¾Ç®¿ÉÄܸߴ﹫˾ÄêÊÕÈëµÄ20%¡£¡£¡£¡£ 


Ô­ÎÄÁ´½Ó£º

https://www.code42.com/blog/aberdeen-report-key-takeaways/