΢ÈíÐû²¼7Ô·ÝÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´9¸ö0dayÔÚÄÚµÄ117¸öÎó²î£»£»£»£»£»£»Ê±ÉÐÆ·ÅÆGuessÔâµ½DarkSideÀÕË÷¹¥»÷й¶200GBÎļþ
Ðû²¼Ê±¼ä 2021-07-151.΢ÈíÐû²¼7Ô·ÝÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´9¸ö0dayÔÚÄÚµÄ117¸öÎó²î
΢ÈíÐû²¼ÁË2021Äê7Ô·ݵÄÖܶþ²¹¶¡£¬£¬£¬£¬£¬£¬ÐÞ¸´Á˰üÀ¨9¸ö0dayÔÚÄÚµÄ117¸öÎó²î¡£¡£¡£¡£ÕâЩÎó²îÖУ¬£¬£¬£¬£¬£¬44¸öΪԶ³Ì´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬32¸öΪÌáȨÎó²î£¬£¬£¬£¬£¬£¬14¸öΪÐÅϢй¶Îó²î£¬£¬£¬£¬£¬£¬12¸öΪ¾Ü¾øÐ§ÀÍÎó²î£¬£¬£¬£¬£¬£¬8¸öΪÇå¾²¹¦Ð§ÈƹýÎó²î£¬£¬£¬£¬£¬£¬7¸öΪÓÕÆÎó²î¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ9¸ö0dayÖУ¬£¬£¬£¬£¬£¬ÓÐ4¸öÒѱ»ÔÚÔÚҰʹÓ㬣¬£¬£¬£¬£¬°üÀ¨PrintNightmareÎó²î£¨CVE-2021-34527£©¡¢WindowsÄÚºËÌáȨÎó²î£¨CVE-2021-33771ºÍCVE-2021-31979£©ÒÔ¼°¾ç±¾ÒýÇæÄÚ´æËð»µÎó²î£¨CVE-2021-34448£©¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2021-patch-tuesday-fixes-9-zero-days-117-flaws/
2.SolarWindsÐÞ¸´Serv-UÖÐÒѱ»Ê¹ÓõÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î
SolarWindsÔÚ7ÔÂ9ÈÕÐû²¼µÄServ-U 15.2.3 HF2ÖÐÐÞ¸´ÁËÒ»¸öÒѱ»Ê¹ÓõÄ0day¡£¡£¡£¡£MicrosoftÅû¶ÁËServ-U²úÆ·µÄÔ¶³Ì´úÂëÖ´ÐÐ0day£¨CVE-2021-35211£©£¬£¬£¬£¬£¬£¬Ô¶³Ì¹¥»÷ÕßʹÓôËÎó²îÄܹ»ÒÔÌØÊâȨÏÞÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬£¬ÔÚÄ¿µÄϵͳÉÏ×°Öò¢ÔËÐгÌÐò¡¢Éó²é¡¢¸ü¸Ä»òɾ³ýÊý¾ÝµÈ¡£¡£¡£¡£ÏÖÔÚ¸ÃÎó²îÒѾ³ö±»Ò°Ê¹Ó㬣¬£¬£¬£¬£¬µ«SolarWindsÌåÏÖ£¬£¬£¬£¬£¬£¬ÈôÊÇServ-UÇéÐÎÖÐδÆôÓÃSSH£¬£¬£¬£¬£¬£¬Ôò¸ÃÎó²î²»±£´æ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/solarwinds-patches-critical-serv-u-vulnerability-exploited-in-the-wild/
3.ʱÉÐÆ·ÅÆGuessÔâµ½DarkSideÀÕË÷¹¥»÷й¶200GBÎļþ
ÃÀ¹úʱÉÐÆ·ÅƺÍÁãÊÛÉÌGuessÔâµ½DarkSideÀÕË÷¹¥»÷й¶200GBÎļþ¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬£¬£¬¹¥»÷±¬·¢ÔÚ2021Äê2ÔÂ2ÈÕÖÁ2021Äê2ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔÚ6ÔÂ3ÈÕÍê³ÉÊÓ²ìºóÈ·¶¨ÁËÊÜÓ°ÏìµÄ¿Í»§²¢ÓÚ6ÔÂ9ÈÕ½«´ËÊÂÎñ֪ͨ¸øÆä¿Í»§¡£¡£¡£¡£¾ÊÓ²ìÈ·¶¨£¬£¬£¬£¬£¬£¬Ð¹Â¶ÐÅÏ¢°üÀ¨Éç»áÇå¾²ºÅÂë¡¢¼ÝÕÕºÅÂë¡¢»¤ÕÕºÅÂëºÍ/»ò²ÆÎñÕʺţ¬£¬£¬£¬£¬£¬Ö»Éæ¼°1300¶àÈË¡£¡£¡£¡£Guess²¢Î´Í¸Â©Óйع¥»÷ÕßµÄÈκÎÐÅÏ¢£¬£¬£¬£¬£¬£¬¿ÉÊÇDarkSideÔøÔÚ4Ô·ÝÉù³ÆÆä¹¥»÷ÁËGuess²¢ÇÔÈ¡ÁËÁè¼Ý200GBµÄÎļþ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/fashion-retailer-guess-notifies-users-data-breach
4.ºÚ¿Í³öÊÛ6ÒÚLinkedInÓû§ÐÅÏ¢²¢³ÆÐÂÊý¾Ý±È֮ǰµÄ¸üºÃ
ºÚ¿ÍÔÚ°µÍø³öÊÛÁË6ÒÚ¸öLinkedInÓû§µÄÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢³ÆÕâЩÊý¾ÝÊÇÐµģ¬£¬£¬£¬£¬£¬±ÈÖ®Ç°ÍøÂçµÄÊý¾Ý¸üºÃ¡£¡£¡£¡£ºÚ¿ÍÐû²¼ÁË632699¸öÓû§ÐÅÏ¢×÷ΪÑù±¾£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÁËÐÕÃû¡¢ÁìÓ¢ID¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢LinkedInСÎÒ˽¼Ò×ÊÁÏURL¡¢ÆäËûÉ罻ýÌå×ÊÁϵÄÁ´½Ó¡¢ÐԱ𡢳öÉúÈÕÆÚ¡¢ËùÔÚ¡¢Ö°³ÆºÍÆäËûÊÂÇéÏà¹ØÊý¾ÝµÈ¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬ËäÈ»ÕâЩÊý¾Ý²»ÊǺÜÃô¸Ð£¬£¬£¬£¬£¬£¬µ«¹¥»÷ÕßÈÔÈ»¿ÉÒÔʹÓÃÕâЩÐÅϢͨ¹ýÉç»á¹¤³ÌµÄÒªÁì¿ìËÙµØÕÒµ½Ð¹¥»÷Ä¿µÄ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://cybernews.com/news/threat-actors-scrape-600-million-linkedin-profiles-and-are-selling-the-data-online-again/
5.Ñо¿Ö°Ô±·¢Ã÷TrickBot»ØºÏ²¢ÐÂÔöÓÃÓÚ¼à¿ØµÄVNCÄ£¿£¿£¿£¿£¿£¿£¿é
Ñо¿Ö°Ô±·¢Ã÷TrickBot»ØºÏ²¢ÐÂÔöÁËÓÃÓÚ¼à¿ØºÍÇé±¨ÍøÂçµÄVNCÄ£¿£¿£¿£¿£¿£¿£¿é¡£¡£¡£¡£Trickbot×Ô2016Äêµ×ÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬£¬£¬²¢ÓÚ2020Äê10Ô·ݱ»Î¢ÈíºÍ¶à¸öÇå¾²³§ÉÌÁªºÏµ·»Ù¡£¡£¡£¡£¿ÉÊÇ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÏÖÔÚµÄTrickbot±ÈÒÔÍùÈκÎʱ¼ä¶¼Ô½·¢»îÔ¾£¬£¬£¬£¬£¬£¬²¢ÓÚ2021Äê5Ô¼ì²âµ½ÁËvncDllÄ£¿£¿£¿£¿£¿£¿£¿éµÄ¸üа汾tvncDll£¬£¬£¬£¬£¬£¬ÓÃÓÚ¼à¿ØºÍÇé±¨ÍøÂç¡£¡£¡£¡£¸ÃÄ£¿£¿£¿£¿£¿£¿£¿éËÆºõ»¹ÔÚ¿ª·¢ÖУ¬£¬£¬£¬£¬£¬ÓÉÓÚÓÐÒ»¸öƵÈԵĸüÐÂʱ¼ä±í£¬£¬£¬£¬£¬£¬À´°´ÆÚÌí¼Óй¦Ð§ºÍÐÞ¸´¹ýʧ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bitdefender.com/blog/labs/trickbot-activity-increases-new-vnc-module-on-the-radar
6.AberdeenºÍcode42ÁªºÏÐû²¼ÓйØÄÚ²¿Î£º¦µÄÆÊÎö±¨¸æ
AberdeenºÍcode42ÁªºÏÐû²¼ÁËÓйØÄÚ²¿Î£º¦µÄÆÊÎö±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬Èý·ÖÖ®Ò»µÄÊý¾Ýй¶ÊÂÎñÉæ¼°ÄÚ²¿Ö°Ô±£¬£¬£¬£¬£¬£¬¶øÆäÖÐÔ¼80%ÈËÊÇÎÞÒâµÄ£»£»£»£»£»£»75%µÄ×éÖ¯¶ÔÆäÇéÐÎûÓÐÒ»Ö¡¢¼¯ÖеĿɼûÐÔ£»£»£»£»£»£»2020Ä꣬£¬£¬£¬£¬£¬ÔÚÖÕ¶ËÉϱ¬·¢Îó²îµÄ¿ÉÄÜÐÔÊÇЧÀÍÆ÷ÉϵÄ4.5±¶£»£»£»£»£»£»Êý¾Ý̻¶й¶µÄƽ¾ùÊýÄ¿ÊÇÿ¸öÓû§ÌìÌì»á±¬·¢13¸öÊý¾Ýй¶ÊÂÎñ£»£»£»£»£»£»ÄÚ²¿Ö°Ô±Êý¾Ýй¶µÄ±¾Ç®¿ÉÄܸߴ﹫˾ÄêÊÕÈëµÄ20%¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.code42.com/blog/aberdeen-report-key-takeaways/