¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181127

Ðû²¼Ê±¼ä 2018-11-27
1¡¢µÂ¹úÕþ¸®Ðû²¼SOHO·ÓÉÆ÷Çå¾²Ö¸ÄÏ£¬£¬£¬£¬Ìá³ö¶àÏîÇå¾²½¨Òé

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


µÂ¹úÕþ¸®Ðû²¼¼ÒÍ¥¼°Ð¡ÐͰ칫£¨SOHO£©Â·ÓÉÆ÷µÄÇå¾²Ö¸ÄÏ£¬£¬£¬£¬Ö¼ÔÚ¶Ô·ÓÉÆ÷Çå¾²ÖÆ¶©±ê×¼»¯µÄ¹æÔò¡£¡£¡£Õâ·Ý22Ò³µÄÎĵµ×ÛºÏÁË·ÓÉÆ÷³§ÉÌ¡¢µçÐŹ«Ë¾ºÍÓ²¼þÉçÇøµÄÒâ¼û£¬£¬£¬£¬ÓÉÁª°îÐÅÏ¢Çå¾²°ì¹«ÊÒ£¨BSI£©¾ÙÐÐÐû²¼¡£¡£¡£Ò»Ð©Ö÷ÒªµÄ½¨Òé°üÀ¨Â·ÓÉÆ÷±ØÐèÖ§³Ö²¢ÇÒĬÈÏʹÓÃWPA2ЭÒ飻£»£»£»£»£»WiFiÃÜÂëµÄ³¤¶ÈÓ¦¸Ã²»¶ÌÓÚ20λ£»£»£»£»£»£»ÃÜÂëÑéÖ¤±ØÐè±ÜÃⱩÁ¦¹¥»÷£»£»£»£»£»£»Â·ÓÉÆ÷²»µÃ´øÓÐÈκÎδ¼Í¼µÄºóÃÅÕË»§µÈ¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/germany-proposes-router-security-guidelines/


2¡¢Ñо¿Åú×¢Ò»°ëÒÔÉϵÄPHIÐÅϢй¶ÓëÒ½ÁÆ»ú¹¹µÄÄÚ²¿ÊèºöÓйØ

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÃÜЪ¸ùÖÝÁ¢´óѧºÍÔ¼º²»ôÆÕ½ð˹´óѧµÄÒ»ÏîÐÂÑо¿Åú×¢£¬£¬£¬£¬53%µÄСÎÒ˽¼Ò¿µ½¡ÐÅÏ¢£¨PHI£©Ð¹Â¶ÊÂÎñÊÇÓÉÒ½ÁÆ»ú¹¹µÄÄÚ²¿ÒòËØµ¼Öµġ£¡£¡£¸ÃÑо¿ÆÊÎöÁË7ÄêÄÚÃÀ¹ú±¬·¢µÄ¿ìÒª1800ÆðPHIй¶ÊÂÎñ£¬£¬£¬£¬ÆäÖÐ33¼ÒÒ½Ôº±¬·¢Á˲»Ö¹1Æðй¶ÊÂÎñ¡£¡£¡£ÕâЩй¶µÄÔµ¹ÊÔ­Óɹ²ÓÐ6À࣬£¬£¬£¬°üÀ¨ÍµÇÔ¡¢Î´ÊÚȨ»á¼û¡¢ºÚ¿Í¹¥»÷»òITÊÂÎñ¡¢É¥Ê§¡¢²»µ±´¦Öóͷ£ÒÔ¼°ÆäËü¡£¡£¡£ÆäÖÐ53%µÄй¶ÓëÄÚ²¿ÒòËØÓйأ¬£¬£¬£¬¶ø²»ÊÇÓɺڿͻòÍⲿÒòËØµ¼Ö¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2018/11/26/internal-negligence-data-breaches/


3¡¢IntelÕë¶ÔÓÄÁé±äÌåµÄÐÞ¸´´ó·ù½µµÍÁËLinux 4.20ÖеÄÐÔÄÜ

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


IntelÕë¶ÔÓÄÁé±äÌå2£¨CVE-2017-5715£©µÄÐÞ¸´²½·¥´ó·ù½µµÍÁËLinuxÄÚºË4.20ÖеÄÐÔÄÜ¡£¡£¡£Æ¾Ö¤PhoronixµÄ»ù×¼²âÊÔ£¬£¬£¬£¬¾ß±¸³¬Ïß³ÌÊÖÒÕµÄCPU£¨¼´Core i3ÒÔÉÏ£©ÊÜÓ°Ïì×î´ó£¬£¬£¬£¬Æ¾Ö¤²âÊÔÓ¦ÓóÌÐòµÄ²î±ð£¬£¬£¬£¬ÔÚCore i9ÉÏ×î¸ß¿ÉµÖ´ï30%-50%µÄÐÔÄÜϽµ£¬£¬£¬£¬ÕâÏÔÈ»ÊDz»¿É½ÓÊܵġ£¡£¡£¸ÃÎÊÌâÓëSTIBPÓйأ¬£¬£¬£¬STIBPÊÇIntelÌṩµÄÈý¸öÐÞ¸´²½·¥Ö®Ò»£¬£¬£¬£¬ÆäËüÁ½¸öÊÇIBRSºÍIBPB¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://nakedsecurity.sophos.com/2018/11/26/spectre-mitigation-guts-linux-4-20-performance/


4¡¢Ñо¿ÍŶÓÐû²¼Òƶ¯¶ñÒâÈí¼þXLoaderºÍFakeSpyµÄÆÊÎö±¨¸æ

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


Ç÷ÊÆ¿Æ¼¼Ñо¿ÍŶÓÐû²¼¹ØÓÚAndroid¶ñÒâÈí¼þXLoaderºÍFakeSpyµÄÆÊÎö±¨¸æ¡£¡£¡£XLoader·ºÆðÓÚ2018Äê4Ô£¬£¬£¬£¬¶øFakeSpyÔòÔÚ6Ô·ÝÏòAndroidÓû§Ìᳫ¹¥»÷¡£¡£¡£×èÖ¹10Ô£¬£¬£¬£¬È«Çò¹²ÓÐ384748ÃûÊܺ¦ÕßÊܵ½XLoaderºÍFakeSpyµÄ¹¥»÷£¬£¬£¬£¬ÆäÖд󲿷ÖλÓÚº«¹úºÍÈÕ±¾¡£¡£¡£Æ¾Ö¤Ç÷ÊÆ¿Æ¼¼µÄÐÂÑо¿£¬£¬£¬£¬XLoaderºÍFakeSpyҪôÊôÓÚͳһ¸ö¹¥»÷×éÖ¯£¬£¬£¬£¬ÒªÃ´ËüÃǵÄÔËÓªÕßÖ®¼ä±£´æÁªÏµ¡£¡£¡£Í¨Ì«¹ýÎöXLoaderºÍFakeSpyµÄ´úÂë½á¹¹ºÍÐÐΪģʽ£¬£¬£¬£¬Ñо¿Ö°Ô±»¹ÒÔΪFakeSpyÓë·¸·¨ÍÅ»ïYanbian Gang±£´æ¹ØÁª¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.trendmicro.com/trendlabs-security-intelligence/a-look-into-the-connection-between-xloader-and-fakespy-and-their-possible-ties-with-the-yanbian-gang/


5¡¢¿¨°Í˹»ùÐû²¼2019Äê½ðÈÚÍþвºÍ¼ÓÃÜÇ®±ÒÍþвµÄÇ÷ÊÆÕ¹Íû

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

¿¨°Í˹»ùʵÑéÊÒÐû²¼¹ØÓÚ2019Äê½ðÈÚ»ú¹¹¡¢¼ÓÃÜÇ®±ÒÒÔ¼°¹¤ÒµÆóÒµµÄÍþвÇ÷ÊÆµÄÕ¹ÍûÆÊÎö¡£¡£¡£2019Ä깤ҵÆóÒµÃæÁÙµÄÌôÕ½°üÀ¨¹¥»÷ÃæÒ»Ö±ÔöÌí¡¢·¸·¨·Ö×ÓºÍÌØÊâÕûÌåµÄÐËȤÈÕÒæÔöÌí¡¢ÐÅÏ¢²»Í¸Ã÷µ¼Öµ͹ÀͨÀýÍþвˮƽÒÔ¼°¶ÔÍþвϸ½ÚµÄÎó½âµ¼ÖÂδÄܾÙÐÐ×îÓű£»£»£»£»£»£»¤¡£¡£¡£¹ØÓÚ¼ÓÃÜÇ®±ÒµÄÕ¹ÍûÔò°üÀ¨¶ÔÇø¿éÁ´ÓÃ;µÄ̽Ë÷»òÐí»áÏûÊÅ¡¢¼ÓÃÜÇ®±Ò×÷Ϊ֧¸¶ÊֶεÄÓÃ;¿ÉÄÜ»áϽµÒÔ¼°¼ÓÃÜÇ®±ÒµÄ¼ÛÇ®²»»áÔٻص½2017ÄêµÄ¸ßλ¡£¡£¡£¹ØÓÚ½ðÈÚ»ú¹¹µÄÕ¹Íû°üÀ¨¿ÉÄܻᱬ·¢Í¨¹ýÉúÎïʶ±ðÊý¾ÝʵÑéµÄ͵ÇÔ£¬£¬£¬£¬Õë¶ÔÓ¡°ÍµØÇø¡¢¶«ÄÏÑǺÍÖÐÅ·µÄ½ðÈÚÍþв¿ÉÄÜ»á¼Ó¾ç£¬£¬£¬£¬¹©Ó¦Á´¹¥»÷½«»áÒ»Á¬µÈ¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://securelist.com/ksb-cyberthreats-to-financial-institutions-2019-overview-and-predictions/88944/


6¡¢Å·ÖÞÐ̾¯×éÖ¯¹Ø±ÕÁè¼Ý3.36Íò¸öÊÛ¼ÙÓòÃû

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾

ƾ֤ŷÖÞÐ̾¯×éÖ¯µÄÐÂΟ壬£¬£¬£¬Å·Ã˸÷µØµÄÖ´·¨»ú¹¹ÒÑÀֳɹرÕÁË33654¸öÏúÊÛð³äαÁÓ²úÆ·£¨°üÀ¨¼ÙÒ©¡¢µÁ°æÓ°Ï·¡¢µÁ°æÒôÀֵȣ©µÄÓòÃû¡£¡£¡£±ðµÄ£¬£¬£¬£¬ÖªÊ¶²úȨ·¸·¨Ð­µ÷ͬÃË£¨IPC3£©»¹¾Ð²¶ÁË12ÃûÏÓÒÉÈ˲¢²é»ñÁ˼ÛÖµÁè¼Ý100ÍòÅ·ÔªµÄÕË»§¡£¡£¡£¸ÃÐж¯ÊÇ2014ÄêÆô¶¯µÄ¹¥»÷ÊÛ¼ÙµÄIn Our Sites£¨IOS£©Ðж¯µÄÑÓÐø¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.europol.europa.eu/newsroom/news/operation-takes-down-over-33-600-internet-domains-selling-counterfeits-goods


ÉùÃ÷£º±¾×ÊѶÓÉ¿­·¢k8άËûÃüÇ徲С×é·­ÒëºÍÕûÀí