¹¥»÷ÕßʹÓûªË¶ÖÐÐÄÈ˹¥»÷·Ö·¢PleadºóÃÅ £»£»£»£»£»£»£»£»È«ÇòÍþвָÊý£¬£¬£¬£¬£¬£¬£¬ £¬ÒøÐÐľÂíTrickbotÖØ·µÇ°Ê®

Ðû²¼Ê±¼ä 2019-05-16
1¡¢AdobeÐû²¼5ÔÂÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ £¬ÐÞ¸´87¸öÎó²î

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾
 
AdobeµÄ5ÔÂÇå¾²¸üÐÂÐÞ¸´Á˶à¸ö²úÆ·ÖеÄ87¸öÎó²î¡£ ¡£¡£¡£¡£¡£ÓëAdobe AcrobatºÍReaderÓйصÄÎó²îÊýΪ84¸ö£¬£¬£¬£¬£¬£¬£¬ £¬ÆäÖÐ42¸ö±»±ê¼ÇΪÑÏÖØ£¨Critical£©Îó²î£¬£¬£¬£¬£¬£¬£¬ £¬ÕâЩÎó²î¾ù¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐкÍϵͳ½ÓÊÜ¡£ ¡£¡£¡£¡£¡£Flash PlayerÖÐÐÞ¸´ÁËÑÏÖØÎó²î£¨CVE-2019-7837£©£¬£¬£¬£¬£¬£¬£¬ £¬¸ÃÎó²îÊÇÒ»¸öUse-After-FreeÎó²î£¬£¬£¬£¬£¬£¬£¬ £¬¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬£¬ £¬Ó°ÏìÁËWindows¡¢macOS¡¢Linux¼°Chrome OSƽ̨µÄFlash Player¡£ ¡£¡£¡£¡£¡£Media Encoderа汾13.1ÖÐÐÞ¸´Á˿ɵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеÄÑÏÖØÎó²î£¨CVE-2019-7842£©ºÍ¿Éµ¼ÖÂÐÅϢй¶µÄÎó²î£¨CVE-2019-7844£©¡£ ¡£¡£¡£¡£¡£±¾ÔÂÐÞ¸´µÄÎó²î¾ùûÓÐÔÚÒ°ÍⱻʹÓᣠ¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/05/adobe-software-updates.html

2¡¢Twitter bugµ¼ÖÂÏòµÚÈý·½¹²ÏíiOSÓû§µÄλÖÃÐÅÏ¢

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾
 
TwitterÅû¶Æäƽ̨ÖеÄÒ»¸öÎó²î£¬£¬£¬£¬£¬£¬£¬ £¬¸ÃÎó²î¿ÉÍøÂçiOSÓû§µÄλÖÃÊý¾Ý²¢ÏòµÚÈý·½ÏàÖúͬ°é¹²ÏíÕâЩÊý¾Ý¡£ ¡£¡£¡£¡£¡£Îó²îµÄÏêϸϸ½ÚΪ£¬£¬£¬£¬£¬£¬£¬ £¬µ±Óû§ÔÚiOS×°±¸ÉÏʹÓÃÁ½¸öTwitterÕÊ»§Ê±£¬£¬£¬£¬£¬£¬£¬ £¬×ÝÈ»½öÔÚÒ»¸öÕÊ»§ÖÐÆôÓÃÁ˶¨Î»¹¦Ð§£¬£¬£¬£¬£¬£¬£¬ £¬Ò²»á½«ÍøÂçµ½µÄλÖÃÊý¾ÝÓ¦ÓÃÓÚÁíÒ»¸öÕË»§¡£ ¡£¡£¡£¡£¡£Twitter³ÆÒѾ­ÐÞ¸´ÁËÕâ¸öÎÊÌ⣬£¬£¬£¬£¬£¬£¬ £¬²¢È·ÈÏÏàÖúͬ°éÔÚÆäÕý³£Á÷³ÌÖÐɾ³ýÁ˹²ÏíµÄÊý¾Ý¡£ ¡£¡£¡£¡£¡£Twitter»¹ÌåÏÖÒѾ­Í¨ÖªÁËÕË»§¿ÉÄÜÊܵ½Ó°ÏìµÄÓû§¡£ ¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://cyware.com/news/bug-in-twitter-led-to-collection-and-sharing-of-users-geolocation-data-with-its-partner-f2ebc19c

3¡¢¹¥»÷ÕßʹÓûªË¶ÖÐÐÄÈ˹¥»÷·Ö·¢PleadºóÃÅ

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾
 
4ÔÂβESETÑо¿Ö°Ô±ÊӲ쵽ʹÓá°AsusWSPanel.exe¡±·Ö·¢PleadºóÃŵĹ¥»÷»î¶¯¡£ ¡£¡£¡£¡£¡£AsusWSPanel.exeÊÇ»ªË¶Ôƴ洢ЧÀÍWebStorageµÄWindows¿Í»§¶Ë¡£ ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±¸ø³öÁËÁ½ÖÖ¿ÉÄܵĹ¥»÷³¡¾°£¬£¬£¬£¬£¬£¬£¬ £¬Ò»ÖÖÊÇ»ªË¶Ôâµ½¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬£¬£¬ £¬ÁíÒ»ÖÖÊǹ¥»÷ÕßʹÓÃÖÐÐÄÈ˹¥»÷ºÍÒ×Êܹ¥»÷µÄ·ÓÉÆ÷À´Èö²¥¶ñÒâÈí¼þ¡£ ¡£¡£¡£¡£¡£½øÒ»²½µÄÆÊÎöºóÑо¿Ö°Ô±ÒÔΪºóÒ»ÖÖ¹¥»÷³¡¾°µÄ¿ÉÄÜÐÔ¸ü´ó¡£ ¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.tripwire.com/state-of-security/security-data-protection/bad-actors-using-mitm-attacks-against-asus-to-distribute-plead-backdoor/

4¡¢Check Point×îÐÂÈ«ÇòÍþвָÊý£¬£¬£¬£¬£¬£¬£¬ £¬ÒøÐÐľÂíTrickbotÖØ·µÇ°Ê®

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾
 
Check PointÐû²¼4ÔÂÈ«ÇòÍþвָÊý£¬£¬£¬£¬£¬£¬£¬ £¬ÒøÐÐľÂíTrickbotÔÚʱ¸ôÁ½ÄêºóÖØ·µÇ°Ê®£¬£¬£¬£¬£¬£¬£¬ £¬Î»ÓÚµÚ°ËÃû¡£ ¡£¡£¡£¡£¡£4Ô·ÝTrickbot¹¥»÷»î¶¯µÄÉÏÉýÇ÷ÊÆ¿ÉÄÜÓëÃÀ¹úÄÉ˰Èյĵ½À´Óйء£ ¡£¡£¡£¡£¡£Ö»¹Ü°ñµ¥Ç°ÈýÃûÈÔÈ»±»¶ñÒâ¿ó¹¤Õ¼ÓУ¬£¬£¬£¬£¬£¬£¬ £¬µ«ÆäÓàÆßÃû¶¼ÊǶ๦ЧľÂí£¬£¬£¬£¬£¬£¬£¬ £¬ÕâЩľÂí²»µ«¿ÉÒÔÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬£¬£¬ £¬»¹¿ÉÒÔÈö²¥ÆäËüÀÕË÷Èí¼þ¡£ ¡£¡£¡£¡£¡£4Ô·Ý×î³£±»Ê¹ÓõÄÎó²îÊÇOpenSSL TLS DTLSÐÄÌø°üÐÅϢй¶Îó²î£¨CVE-2014-0160¡¢CVE-2014-0346£©¡£ ¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://blog.checkpoint.com/2019/05/14/april-2019s-most-wanted-malware-cybercriminals-up-to-old-trickbots-crypto-cryptomining-security-ryuk/

5¡¢ºÚ¿ÍÔÚ¸£²¼Ë¹¶©ÔÄÍøÕ¾×¢ÈëMagecart¾ç±¾

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾
 
¸£²¼Ë¹¶©ÔÄÍøÕ¾±»ºÚ¿Í×¢Èë¶ñÒâMagecart¾ç±¾£¬£¬£¬£¬£¬£¬£¬ £¬¸Ã¾ç±¾ÓÃÓÚÍøÂçÓû§ÔÚÖ§¸¶Ò³ÃæÉÏÊäÈëµÄÖ§¸¶ÐÅÏ¢²¢·¢ËÍÖÁ¹¥»÷Õß¿ØÖƵÄÔ¶³ÌЧÀÍÆ÷¡£ ¡£¡£¡£¡£¡£ÇÔÈ¡µÄÐÅÏ¢°üÀ¨ÐÅÓÿ¨ºÅ¡¢µ½ÆÚÈÕÆÚ¡¢CVV/CVCÂë¡¢ÐÕÃû¡¢µØµã¡¢µç»°ºÅÂëºÍÓÊÏ䵨µã¡£ ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Troy Mursch·¢Ã÷ÁËÕâÒ»¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬ £¬ËäÈ»forbesmagazine.comÉÏÈÔÈ»±£´æ¸ÃMagecart¾ç±¾£¬£¬£¬£¬£¬£¬£¬ £¬µ«¹¥»÷ÕßÓÃÓÚÍøÂçÐÅÏ¢µÄЧÀÍÆ÷ÓòÃûÒѱ»ÓòÃûЧÀÍÉÌFreenomɾ³ý£¬£¬£¬£¬£¬£¬£¬ £¬Ê¹µÃ¹¥»÷ÒѾ­ÎÞЧ¡£ ¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/hackers-inject-magecart-card-skimmer-in-forbes-subscription-site/

6¡¢¶íÂÞ˹Õþ¸®ÍøÕ¾Ð¹Â¶225Íò¹«ÃñµÄÃô¸ÐÐÅÏ¢

¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾
 
¶íÂÞ˹Ñо¿Ö°Ô±BegtinÊӲ췢Ã÷23¸öÕþ¸®ÍøÕ¾Ð¹Â¶Á˹«ÃñµÄSNILSºÅÂ루Ï൱ÓÚÉç±£ºÅÂ룩£¬£¬£¬£¬£¬£¬£¬ £¬14¸öÕþ¸®ÍøÕ¾Ð¹Â¶Á˹«ÃñµÄ»¤ÕÕÐÅÏ¢¡£ ¡£¡£¡£¡£¡£×ܹ²¿ÉÒÔÔÚÏß»ñµÃÁè¼Ý225Íò¶íÂÞ˹¹«ÃñµÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬ £¬°üÀ¨ÐÕÃû¡¢Ö°Î»¡¢ÊÂÇéËùÔÚ¡¢µç×ÓÓʼþ¡¢ÄÉ˰ºÅÂëµÈ£¬£¬£¬£¬£¬£¬£¬ £¬ÒÔ¼°Ä³Ð©ÇéÐÎÏµĻ¤ÕÕÐÅÏ¢¡£ ¡£¡£¡£¡£¡£Begtin¶à´Î֪ͨÕþ¸®î¿Ïµ»ú¹¹£¬£¬£¬£¬£¬£¬£¬ £¬µ«ÎÊÌⲢδ»ñµÃ½â¾ö¡£ ¡£¡£¡£¡£¡£Æ¾Ö¤ÍâµØÃ½ÌåµÄ±¨µÀ£¬£¬£¬£¬£¬£¬£¬ £¬Ò»Ð©¶íÂÞ˹Õþ¸®¸ß¹ÙµÄÐÅÏ¢Ò²Ôâй¶£¬£¬£¬£¬£¬£¬£¬ £¬°üÀ¨Òé»á¸±Ö÷ϯAlexander ZhukovµÈ¡£ ¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/russian-government-sites-leak-passport-and-personal-data-for-2-25-million-users/