Cloudflare³ÆÆä¿Í»§½üÆÚÔâµ½´ó¹æÄ£µÄDDoS¹¥»÷
Ðû²¼Ê±¼ä 2022-06-161¡¢Cloudflare³ÆÆä¿Í»§½üÆÚÔâµ½´ó¹æÄ£µÄDDoS¹¥»÷»î¶¯
CloudflareÔÚ6ÔÂ14ÈÕ͸¶£¬£¬£¬£¬Æä¿Í»§Ôâµ½ÁË´ó¹æÄ£µÄDDoS¹¥»÷¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬ËüÒѽÓÄÉÐж¯µÖÓùÁËÿÃë2600Íò´ÎÇëÇó(RPS)µÄDDoS¹¥»÷£¬£¬£¬£¬ÕâÊÇÆù½ñΪֹ¼ì²âµ½µÄ×î´óµÄHTTPS DDoS¹¥»÷¡£¡£¡£¡£¡£¹¥»÷À´×ÔÓÉ5067̨װ±¸×é³ÉµÄ½©Ê¬ÍøÂ磬£¬£¬£¬Ã¿¸ö½ÚµãÔÚ·åֵʱ±¬·¢Ô¼5200 RPS¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬¸Ã½©Ê¬ÍøÂçÔÚ²»µ½30ÃëµÄʱ¼äÄÚ´ÓÓ¡¶ÈÄáÎ÷ÑÇ¡¢ÃÀ¹ú¡¢°ÍÎ÷¡¢¶íÂÞ˹ºÍÓ¡¶ÈµÈ121¸ö¹ú¼ÒµÄ1500¶à¸öÍøÂçÖн¨ÉèÁËÁè¼Ý2.12ÒÚ¸öHTTPSÇëÇ󣬣¬£¬£¬Ô¼3%µÄ¹¥»÷À´×ÔTor½Úµã¡£¡£¡£¡£¡£
https://thehackernews.com/2022/06/cloudflare-saw-record-breaking-ddos.html
2¡¢¹ú¼ÊÐ̾¯First Light 2022Ö´·¨Ðж¯¾Ð²¶Ô¼2000¸öÏÓÒÉÈË
ýÌå6ÔÂ15ÈÕ±¨µÀ£¬£¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯ÔÚ76¸ö¹ú¼ÒºÍµØÇøµÄ¾¯·½ÐÖúÏÂÌᳫÁË´úºÅΪFirst Light 2022µÄ¹ú¼ÊÖ´·¨Ðж¯¡£¡£¡£¡£¡£ÔÚ2022Äê3ÔÂÖÁ5ÔÂʱ´ú£¬£¬£¬£¬Ö´·¨Ö°Ô±Í»Ï®ÁËÈ«ÇòµÄ1770¸öËùÔÚ£¬£¬£¬£¬ÊÓ²ìÁËÔ¼3000ÃûÏÓÒÉÈË£¬£¬£¬£¬¾Ð²¶ÁËÔ¼2000Ãû¼ÓÈëÉç»á¹¤³Ì¹¥»÷µÄÏÓÒÉÈË£¬£¬£¬£¬¶³½áÁË4000¸öÒøÐÐÕË»§²¢²é·âÁ˼ÛÖµÔ¼5000ÍòÃÀÔªµÄ²»·¨×ʽ𡣡£¡£¡£¡£´Ë´ÎÐж¯Öص㹥»÷Éæ¼°µç»°Õ©Æ¡¢ÀËÂþÕ©Æ¡¢BEC¹¥»÷ºÍ¹ØÓÚÏ´Ç®µÄÉç»á¹¤³Ì¹¥»÷¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/interpol-seizes-50-million-arrests-2000-social-engineers/
3¡¢Ñо¿ÍŶӷ¢Ã÷Õë¶ÔIntelºÍAMD CPUµÄ²àÐŵÀ¹¥»÷Hertzbleed
¾Ý6ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖ³ÆÎªHertzbleedµÄвàÐŵÀ¹¥»÷£¬£¬£¬£¬¿É±»Ô¶³Ì¹¥»÷ÕßÓÃÀ´Í¨¹ýÊӲ춯̬µçѹºÍƵÂÊËõ·Å(DVFS)ÆôÓõÄCPUƵÂÊת±äÇÔÈ¡¼ÓÃÜÃÜÔ¿¡£¡£¡£¡£¡£DVFSÊÇÏÖ´úCPUʹÓõÄÒ»ÖÖµçÔ´ÖÎÀí½ÚÔ¼¹¦Ð§£¬£¬£¬£¬¿ÉÈ·±£ÏµÍ³Ôڸ߸ºÔØÊ±´ú²»»áÁè¼ÝÈȺ͹¦ÂÊÏÞÖÆ£¬£¬£¬£¬²¢ÔÚµÍCPU¸ºÔØÊ±´ú½µµÍÕûÌ幦ºÄ¡£¡£¡£¡£¡£¹¥»÷ÊÇ¿ÉÐе쬣¬£¬£¬ÓÉÓÚÔÚIntel(CVE-2022-24436)ºÍAMD(CVE-2022-23823)x86´¦Öóͷ£Æ÷ÉÏ£¬£¬£¬£¬¶¯Ì¬ÆµÂÊËõ·ÅÈ¡¾öÓÚ¹¦ºÄºÍÕýÔÚ´¦Öóͷ£µÄÊý¾Ý¡£¡£¡£¡£¡£IntelºÍAMD͸¶£¬£¬£¬£¬²»ÍýÏëÐû²¼²¹¶¡£¬£¬£¬£¬µ«Ðû²¼ÁËÔõÑù»º½â´ËÀ๥»÷µÄÖ¸ÄÏ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-hertzbleed-side-channel-attack-affects-intel-amd-cpus/
4¡¢ZimbraÐÞ¸´¿ÉÇÔÈ¡Óû§µÇ¼ƾ֤µÄÎó²îCVE-2022-27924
ýÌå6ÔÂ14Èճƣ¬£¬£¬£¬µç×ÓÓʼþÌ×¼þZimbraÖб£´æÒ»¸öÑÏÖØµÄÎó²î£¨CVE-2022-27924£©£¬£¬£¬£¬Ó°ÏìÁË¿ªÔ´ºÍÉÌÒµ°æ±¾8.8.xºÍ9.x¡£¡£¡£¡£¡£SonarSource½«¸ÃÎó²î×ܽáΪδ¾Éí·ÝÑéÖ¤ÇëÇóµÄMemcachedÖж¾£¬£¬£¬£¬Í¨¹ý½«CRLF×¢Èëµ½Memcached²éÕÒµÄÓû§ÃûÖпÉÒÔʹÓôËÎó²î¡£¡£¡£¡£¡£ÀÖ³ÉʹÓú󣬣¬£¬£¬¹¥»÷Õß¿ÉÒÔÔÚ²»ÓëÓû§¾ÙÐÐÈκν»»¥µÄÇéÐÎÏÂÇÔÈ¡Ã÷ÎĵÄÃÜÂë¡£¡£¡£¡£¡£SonarSourceÓÚ½ñÄê3ÔÂ11ÈÕÅû¶Îó²î£»£»£»ZimbraÔÚ3ÔÂ31ÈÕÐû²¼Á˵ÚÒ»¸ö²¹¶¡£¬£¬£¬£¬µ«²»¿ÉÍêÈ«½â¾öÎÊÌ⣻£»£»Ö®ºó£¬£¬£¬£¬¹©Ó¦ÉÌÓÖÔÚ5ÔÂ10ÈÕÐû²¼²¹¶¡£¬£¬£¬£¬ÍêÈ«ÐÞ¸´ÁËÎó²î¡£¡£¡£¡£¡£
https://thehackernews.com/2022/06/new-zimbra-email-vulnerability-could.html
5¡¢ÄÏ·ÇÁ¬Ëø³¬ÊÐShopriteÔâµ½RansomHouseµÄÀÕË÷¹¥»÷
¾ÝýÌå6ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬Shoprite Group³ÆÆäÔÚÉÏÖÜÔâµ½ÁËÍøÂç¹¥»÷¡£¡£¡£¡£¡£ÕâÊÇ·ÇÖÞ×î´óµÄÁ¬Ëø³¬ÊУ¬£¬£¬£¬ÊÕÈë58ÒÚÃÀÔª£¬£¬£¬£¬ÔÚ·ÇÖÞµÄ12¸ö¹ú¼Òı»®×Žü3000¼ÒÃŵ꣬£¬£¬£¬ÓµÓÐ149000¸öÔ±¹¤¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬´Ë´ÎÊÂÎñ¿ÉÄÜй¶ÁËÆäλÓÚ˹ÍþÊ¿À¼¡¢ÄÉÃ×±ÈÑǺÍÔÞ±ÈÑǵĿͻ§µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬Éæ¼°ÐÕÃûºÍÉí·ÝÖ¤ºÅÂëµÈ¡£¡£¡£¡£¡£6ÔÂ14ÈÕ£¬£¬£¬£¬RansomHouseÍÅ»ïÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬²¢¹ûÕæÁËÒ»·ÝÉù³Æ´ÓShopriteÇÔÈ¡µÄ600GBÊý¾ÝµÄÑù±¾¡£¡£¡£¡£¡£
https://therecord.media/large-supermarket-chain-in-southern-africa-hit-with-ransomware/
6¡¢Check Point·¢Ã÷Õë¶ÔÒÔÉ«ÁкÍÃÀ¹úµÄÓã²æÊ½´¹ÂÚ¹¥»÷
6ÔÂ14ÈÕ£¬£¬£¬£¬Check PointÐû²¼ÁËÒÁÀÊPhosphorusÕë¶ÔÒÔÉ«ÁкÍÃÀ¹úµÄÓã²æÊ½´¹ÂÚ¹¥»÷µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£´Ë´Î»î¶¯¿ÉÒÔ×·Ëݵ½2021Äê12Ô£¬£¬£¬£¬¹¥»÷ÕßÐ®ÖÆÁËÒÔÉ«Áи߼¶¹ÙÔ±µÄµç×ÓÓʼþ£¬£¬£¬£¬È»ºóÓÃËüÀ´¹¥»÷ÆäËûÄ¿µÄ¡£¡£¡£¡£¡£´Ë´Î»î¶¯µÄÄ¿µÄ°üÀ¨£¬£¬£¬£¬ÒÔÉ«ÁÐǰÍâ½»²¿³¤Tzipi Livni¡¢ÃÀ¹úǰפÒÔÉ«ÁдóʹºÍÒÔÉ«Áйú·À¾üǰÉÙ½«µÈÈË¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ¸Ã»î¶¯µÄ×îÖÕÄ¿µÄÊÇÇÔȡĿµÄµÄСÎÒ˽¼ÒÐÅÏ¢¡¢»¤ÕÕɨÃè¼þºÍ»á¼ûµç×ÓÓʼþ£¬£¬£¬£¬²¢½«Æä¹éÒòÓÚÒÁÀʵÄAPTÍÅ»ïPhosphorus¡£¡£¡£¡£¡£
https://blog.checkpoint.com/2022/06/14/iranian-spear-phishing-operation-targets-former-israeli-foreign-minister-former-us-ambassador-to-israel-former-israeli-army-general-and-three-other-high-profile-executives/