AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ12¸öÎó²î£»£»£»£»Ñо¿Ö°Ô±·¢Ã÷TeamTNT¿ÉʹÓÃWeave Scope½ÓÊÜÔÆÖ÷»ú
Ðû²¼Ê±¼ä 2020-09-101.AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ12¸öÎó²î

AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÒÑÐÞ¸´Ó°ÏìÆäAdobe InDesign¡¢Adobe FramemakerºÍAdobe Experience Manager²úÆ·ÖеÄ12¸ö´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£´Ë´Î¸üÐÂÐÞ¸´ÁËAdobe InDesignÖÐÒòÄÚ´æË𻵵¼ÖµÄí§Òâ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-9727¡¢CVE-2020-9728¡¢CVE-2020-9729¡¢CVE-2020-9730ºÍCVE-2020-9731£©£¬£¬£¬£¬£¬£¬FramemakerÖÐÔ½½ç¶ÁÈ¡µ¼ÖµĴúÂëÖ´ÐÐÎó²î£¨CVE-2020-9726£©ºÍ»ùÓÚ¿ÍÕ»µÄ»º³åÇøÒç³öµÄ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-9725 £©£¬£¬£¬£¬£¬£¬ÒÔ¼°Experience ManagerÖеĶà¸öXSSÎó²î¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-vulnerabilities-in-indesign-and-framemaker/
2.IntelÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´ÆäAMTÖÐÑÏÖØµÄÌáȨÎó²î

IntelÐû²¼9Ô·ÝÇå¾²¸üУ¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´ÁË9¸öÎó²î¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ×îÑÏÖØµÄÎó²îΪӰÏìÁË×Ô¶¯ÖÎÀíÊÖÒÕ£¨AMT£©µÄÌáȨÎó²î£¨CVE-2020-8758£©£¬£¬£¬£¬£¬£¬CVSSµÃ·ÖΪ9.8¡£¡£¡£¡£¡£¸ÃÎó²îÊÇÓÉÓÚÍøÂç×ÓϵͳÖв»Êʵ±µÄ»º³åÇøÏÞÖÆËùÖ£¬£¬£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚÆóÒµÍøÂçÉÏÉý¼¶AMTϵͳÉϵÄȨÏÞ¡£¡£¡£¡£¡£¹ØÓÚδÉèÖÃAMTµÄIntel vProϵͳÓû§À´Ëµ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÈÔ¿Éͨ¹ýÍâµØ»á¼û¸ÃϵͳµÄÈÏÖ¤Óû§¾ÙÐÐÌáȨ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/intel-fixes-critical-flaw-in-corporate-remote-management-platform/
3.Ñо¿Ö°Ô±·¢Ã÷TeamTNT¿ÉʹÓÃWeave Scope½ÓÊÜÔÆÖ÷»ú

IntezerµÄÑо¿Ö°Ô±·¢Ã÷ºÚ¿Í×éÖ¯TeamTNTʹÓÿªÔ´¹¤¾ßWeave Scope£¬£¬£¬£¬£¬£¬¿ÉÍêÈ«½ÓÊÜÄ¿µÄµÄÔÆÖ÷»ú¡£¡£¡£¡£¡£¾ÝIntezerÐÎò£¬£¬£¬£¬£¬£¬TeamTNTÊ×ÏÈͨ¹ýÒ»¸ö̻¶µÄDocker API½øÈëÄ¿µÄϵͳ£¬£¬£¬£¬£¬£¬ÒÔ½¨ÉèÒ»¸öÇå½àµÄUbuntuÈÝÆ÷£¬£¬£¬£¬£¬£¬²¢½«ÆäÉèÖõ½Êܺ¦ÕßЧÀÍÆ÷ÉÏ£¬£¬£¬£¬£¬£¬´Ó¶ø»ñµÃ¶ÔÖ÷»úÉϵÄÎļþµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬£¬Æä½«ÉèÖÃÒ»¸öÃûΪhildeµÄÍâµØÓû§£¬£¬£¬£¬£¬£¬²¢¾ÙÐÐÌáȨÒÔͨ¹ýSSHÅþÁ¬µ½Ð§ÀÍÆ÷¡£¡£¡£¡£¡£×îºó×°ÖÃWeave Scope£¬£¬£¬£¬£¬£¬²¢Í¨¹ý¶Ë¿Ú4040ÅþÁ¬µ½Weave ScopeÏÔʾ½çÃæ²¢»ñµÃ¿ØÖÆÈ¨¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hackers-use-legit-tool-to-take-over-docker-kubernetes-platforms/
4.¶íÂÞ˹Áª°îͶƱʱ´úÔøÔâµ½À´×ÔÓ¢ÃÀµÈ¹ú¼ÒµÄDDoS¹¥»÷

¶íÂÞ˹ÔÚ±¾ÖÜÒ»µÄÍøÂçÇå¾²¾Û»áÉÏÌåÏÖ£¬£¬£¬£¬£¬£¬ÆäÔÚ¶íÂÞ˹ÏÜ·¨ÐÞÕý°¸Í¶Æ±Ê±´ú£¨2020Äê6ÔÂ25ÈÕÖÁ7ÔÂ1ÈÕ£©£¬£¬£¬£¬£¬£¬Ôâµ½ÁËÀ´×ÔÓ¢ÃÀµÈ¹ú¼ÒµÄDDoS¹¥»÷¡£¡£¡£¡£¡£¶íÂÞ˹Áª°î×ÜÍ³ÌØÊâ´ú±íÌåÏÖ£¬£¬£¬£¬£¬£¬´Ë´Î»î¶¯¶ÔÖÐÑëÑ¡¾ÙίԱ»áºÍ¶íÂÞ˹ÆäËû¹ú¼Ò»ú¹¹µÄ»ù´¡ÉèÊ©¾ÙÐÐÁË´ó¹æÄ£Ï®»÷£¬£¬£¬£¬£¬£¬ÃÀ¹ú¡¢Ó¢¹ú¡¢ÎÚ¿ËÀ¼ºÍһЩ¶ÀÁªÌå¹ú¼ÒÌᳫÁËÿÃë¸ß´ï24Íò¸öÇëÇóµÄDDoS¹¥»÷¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¶íÂÞ˹¹ÙÔ±±¨¸æ£¬£¬£¬£¬£¬£¬ÆäÔÚ6ÔÂ27ÈÕÍíÉÏ»¹Ôâµ½Ò»´ÎÖØ´ó¹¥»÷£¬£¬£¬£¬£¬£¬ºÚ¿ÍÊÔͼͨ¹ý¼àÊÓÔÚÏßͶƱЧÀÍÀ´Ó°Ïìϵͳ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.ehackingnews.com/2020/09/ddos-attacks-from-usa-uk-ukraine-were.html
5.¹þÌØ¸£µÂÊÐITϵͳѬȾÀÕË÷Èí¼þµ¼Ö¸ÃÊпªÑ§ÍƳÙ

¹þÌØ¸£µÂÊÐITϵͳѬȾÀÕË÷Èí¼þµ¼Ö¸ÃÊпªÑ§ÍƳ١£¡£¡£¡£¡£Æ¾Ö¤¹þÌØ¸£µÂ¹«Á¢Ñ§Ð£Ðû²¼µÄÉùÃ÷£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ¹¥»÷Ó°ÏìÁËѧУµÄ¶à¸öÄÚ²¿ITϵͳ£¬£¬£¬£¬£¬£¬µ¼ÖÂÆäЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£Ö»¹ÜÍâµØITÖ°Ô±Ò»Ö±ÔÚÆð¾¢»Ö¸´Ð§ÀÍ£¬£¬£¬£¬£¬£¬¿ÉÊÇÒÀȻδÄÜÔÚÔ¤¶¨µÄ¿ªÑ§ÈÕʵʱÍê³É¡£¡£¡£¡£¡£¸ÃÊÐÓëУ³µ¹«Ë¾Í¨Ñ¶ËùÓõÄITϵͳҲÊܵ½Ó°Ï죬£¬£¬£¬£¬£¬µ¼ÖÂѧУÎÞ·¨ÉèÖúͼàÊÓУ³µõè¾¶£¬£¬£¬£¬£¬£¬Òò´Ë¸ÃУ¾öÒéÍÆ³Ù¿ªÑ§Ê±¼ä£¬£¬£¬£¬£¬£¬Í¬Ê±ÔÝÍ£Ô¶³Ìѧϰ¿Î³Ì¡£¡£¡£¡£¡£ÍâµØITϵͳÐÞ¸´Ê±¼äÉÐδȷ¶¨£¬£¬£¬£¬£¬£¬Òò´Ë²¢²»¿ÉÈ·¶¨ÐµĿªÑ§ÈÕÆÚ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/city-of-hartford-postpones-first-day-of-school-after-ransomware-attack/
6.°Í»ù˹̹µçÁ¦¹«Ë¾Ñ¬È¾Netwalkerµ¼ÖÂÔÚÏßЧÀÍÖÐÖ¹

°Í»ù˹̹×î´óµÄ˽È˵çÁ¦¹«Ë¾K-ElectricѬȾNetwalker£¬£¬£¬£¬£¬£¬µ¼Ö¼ƷѺÍÔÚÏßЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£×Ô9ÔÂ7ºÅ£¬£¬£¬£¬£¬£¬K-Electric¿Í»§×îÏÈÎÞ·¨»á¼ûÔÚÏßЧÀÍ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ò²ÔÚʵÑéͨ¹ýµÇ̨վµãÖØÐ·ÓÉÓû§£¬£¬£¬£¬£¬£¬µ«ÒÀȻûÄܽâ¾öÎÊÌâ¡£¡£¡£¡£¡£ºóÓÉÍâµØÇå¾²¹«Ë¾µÃÖª£¬£¬£¬£¬£¬£¬ÆäÔâµ½ÁËNetwalkerÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£´Ë´ÎÍøÂç¹¥»÷±¬·¢ÔÚ9ÔÂ7ÈÕÉÏÎ磬£¬£¬£¬£¬£¬ËüÖ÷ÒªÕë¶ÔµÄÊÇK-ElectricµÄÔÚÏ߼ƷÑЧÀÍ£¬£¬£¬£¬£¬£¬¶ø·ÇµçÁ¦¹©Ó¦ÏµÍ³£¬£¬£¬£¬£¬£¬ÒÔ´ËË÷Òª385ÍòÃÀÔªµÄÊê½ð¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/netwalker-ransomware-hits-pakistans-largest-private-power-utility/


¾©¹«Íø°²±¸11010802024551ºÅ