RedgateÐû²¼2020Äê¶ÈÊý¾Ý¿â״̬¼à²â±¨¸æ£»£»£»£»ºÚ¿Í¹¥»÷½ü2000¼ÒMagentoÔÚÏßÊÐËÁ£¬£¬£¬ÒÔÇÔÊØÐÅÓÿ¨
Ðû²¼Ê±¼ä 2020-09-151.RedgateÐû²¼2020Äê¶ÈÊý¾Ý¿â״̬¼à²â±¨¸æ

Redgate×îÐÂÐû²¼ÁË2020Äê¶ÈÊý¾Ý¿â״̬¼à²â±¨¸æ¡£¡£¡£¡£¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬ÎÞÂÛÊÇÔÚ½ÓÄÉÊý¾Ý¿âDevOps·½Ã棬£¬£¬ÕÕ¾ÉÔÚʹÓÃ¼à¿ØÀ´¸ú×ÙÊý¾Ý¿âÐÔÄܺͰ²ÅÅ·½Ã棬£¬£¬½ðÈÚЧÀÍÐÐÒµµÄÌåÏÖ¶¼ÓÅÓÚÆäËûÐÐÒµ¡£¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬61%µÄ½ðÈÚЧÀÍÐÐÒµÔ±¹¤Ã¿ÖܸüÐÂÖÁÉÙÒ»´ÎÊý¾Ý¿â£¬£¬£¬¶øÆäËûÐÐÒµÖ»ÓÐ43%µÄÔ±¹¤»áÕâÑù×ö¡£¡£¡£¡£¡£¡£¡£½ðÈÚЧÀ͵ÄЧÀÍÆ÷ÊýĿҲ¸ü¶à£¬£¬£¬36%µÄЧÀÍÆ÷ÓµÓÐ50µ½500¸öʵÀý£¬£¬£¬¶øÆäËû²¿·ÖÖ»ÓÐ26%¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.helpnetsecurity.com/2020/09/14/database-monitoring-improves-devops-success/
2.Êý¾ÝÖÐÐÄEquinixѬȾNetwalker£¬£¬£¬Ãô¸ÐÐÅÏ¢»òÒÑй¶

Êý¾ÝÍйÜÖÐÐÄEquinixÐû²¼ÉùÃ÷£¬£¬£¬ÌåÏÖÆäÐí¶àÄÚ²¿ÏµÍ³Ôâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬µ«ÆäΪ¿Í»§ÌṩЧÀ͵ÄÖ÷Òª½¹µã²¢Î´Êܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£¡£Ö®ºó£¬£¬£¬ºÚ¿Í×éÖ¯NetwalkerÌåÏÖÆäÀÖ³ÉÈëÇÖÁËEquinix²¢Ðû²¼Á˱»µÁÊý¾ÝµÄ½ØÍ¼£¬£¬£¬ÒÔ´ËҪЮ֧¸¶450ÍòÃÀÔªµÄÊê½ð¡£¡£¡£¡£¡£¡£¡£´Ë´Î×ß©µÄÊý¾Ý°üÀ¨¹«Ë¾²ÆÎñÐÅÏ¢ºÍÊý¾ÝÖÐÐı¨¸æ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú´Ë´Î¹¥»÷µÄǰÒòºó¹û£¬£¬£¬EquinixÌåÏÖÕýÔÚ¾ÙÐÐÊӲ졣¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/data-center-giant-equinix-discloses-ransomware-incident/
3.·ÇÖÞÈûÉà¶û¿ª·¢ÒøÐÐÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬¿Í»§ÐÅÏ¢¿ÉÄܱ»µÁ

·ÇÖÞÈûÉà¶ûÖÐÑëÒøÐУ¨CBS£©½ÒÏþÒ»·ÝÐÂÎÅÉùÃ÷£¬£¬£¬ÈûÉà¶û¿ª·¢ÒøÐУ¨DBS£©Ôâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬¿Í»§ÐÅÏ¢»òÒѱ»µÁ¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±¬·¢ÓÚ2020Äê9ÔÂ9ÈÕ£¬£¬£¬ÏêϸÐÅÏ¢»¹ÔÚÊÓ²ìÖ®ÖС£¡£¡£¡£¡£¡£¡£ËäÈ»ÏÖÔÚÉв»ÇåÎú¹¥»÷ÕßÊÇ·ñÔÚ¼ÓÃÜÒøÐÐϵͳ֮ǰÇÔÈ¡ÁËÊý¾Ý£¬£¬£¬µ«Æ¾Ö¤¹¥»÷ÖÐʹÓõÄÀÕË÷Èí¼þÀàÐÍ£¬£¬£¬ºÜÓпÉÄܱ¬·¢ÕâÖÖÇéÐΡ£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/development-bank-of-seychelles-hit-by-ransomware-attack/
4.ÃÀ¹úÓÊÕþ²¿·ÖITϵͳ±£´æ¶à¸öÎó²î£¬£¬£¬¿Éµ¼ÖÂÊý¾Ýй¶

ÃÀ¹úÓÊÕþ²¿·ÖµÄÒ»·ÝÉ󼯱¨¸æ·¢Ã÷£¬£¬£¬¸Ã²¿·ÖµÄITϵͳ±£´æ¶à¸öÎó²î£¬£¬£¬ÕâЩÎó²î¿ÉÄܱ»ºÚ¿ÍʹÓÃÀ´ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¡£î¿Ïµ»ú¹¹ÌåÏÖ£¬£¬£¬ÕâЩÎó²îÖÐÓÐ12¸öÔÖÄÑÐԵ쬣¬£¬ËüÃÇ¿ÉÄÜ»á¸ø¸Ã»ú¹¹´øÀ´ÖØ´óµÄ¾¼ÃËðʧ£¬£¬£¬ÆäÖаüÀ¨³£¼ûµÄ¡¢Òѱ»¹ûÕæÈýÄêµÄÎó²î¡£¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬»¹Ã»ÓÐÈκÎÖ¤¾ÝÅú×¢ÕâЩÎó²îÒѱ»ºÚ¿ÍʹÓᣡ£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.cyberscoop.com/postal-service-inspector-general-cyber-vulnerabilities/
5.Ñо¿ÍŶӷ¢Ã÷ʹÓÃOffice 365 API´¹ÂÚ¹¥»÷»î¶¯

Ñо¿ÍŶӷ¢Ã÷Ò»ÖÖеÄÍøÂç´¹ÂÚ¹¥»÷»î¶¯£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÉí·ÝÑéÖ¤APIʵʱÑéÖ¤Êܺ¦ÕßµÄOffice 365ƾ֤¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÖеĴ¹ÂÚÓʼþÖ¸ÏòÓëOffice 365µÇ¼ҳÏàͬµÄ´¹ÂÚÍøÕ¾£¬£¬£¬²¢ÇÒÓû§ÃûÒÑÔ¤ÏÈÊäÈë¡£¡£¡£¡£¡£¡£¡£Ò»µ©Êܺ¦Õß½«Æäƾ֤ÊäÈëµ½ÍøÂç´¹ÂÚµÇÂ¼Ò³Ãæ£¬£¬£¬Azure Active DirectoryµÇ¼ÈÕÖ¾¾Í»áÏÔʾÓëÔÚ¸½¼þÍøÒ³ÉÏÖ´ÐеÄXHRÇëÇóÏà¶ÔÓ¦µÄÁ¬Ã¦µÇ¼ʵÑé¡£¡£¡£¡£¡£¡£¡£ÈôÊÇÉí·ÝÑéÖ¤Àֳɣ¬£¬£¬Ôò½«Óû§Öض¨Ïòµ½zoom.com¡£¡£¡£¡£¡£¡£¡£ÈôÊÇÉí·ÝÑé֤ʧ°Ü£¬£¬£¬Ôò»á½«Óû§Öض¨Ïòµ½login.microsoftonline.com¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/office-365-phishing-attack-leverages-real-time-active-directory-validation/159188/
6.ºÚ¿Í¹¥»÷½ü2000¼ÒMagentoÔÚÏßÊÐËÁ£¬£¬£¬ÒÔÇÔÊØÐÅÓÿ¨

ÉÏÖÜÄ©£¬£¬£¬ÐÅÓÿ¨ÇÔȡԤ·À¹«Ë¾Sanguine Security·¢Ã÷ÔÚÒÑÍùËÄÌìÖкڿÍÈëÇÖÁË1904¼ÒMagentoÔÚÏßÊÐËÁ£¬£¬£¬ÒÔÇÔÊØÐÅÓÿ¨¡£¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚÉÏÖÜÎ壬£¬£¬ÆäʱÓÐ10¼ÒÊÐËÁѬȾÁË´Óδ¼û¹ýµÄÐÅÓÿ¨ÇÔÈ¡¾ç±¾¡£¡£¡£¡£¡£¡£¡£Ö®ºó£¬£¬£¬¹¥»÷ÔÚÖÜÁù¼¤Ôö£¬£¬£¬ÓÐ1058¸öÕ¾µã±»ºÚ¿ÍÈëÇÖ£¬£¬£¬ÔÚÖÜÈÕÓÐ603¸öÕ¾µã±»ÈëÇÖ£¬£¬£¬ÖÜÒ»ÓÐ233¸ö±»ÈëÇÖ¡£¡£¡£¡£¡£¡£¡£Sanguine SecurityÌåÏÖ£¬£¬£¬ÕâÊÇ×Ô2015Äê×îÏÈ¼à¿Øµç×ÓÉÌÎñÊÐËÁÒÔÀ´£¬£¬£¬ËûÃÇËù¿´µ½µÄ×î´óµÄMagento¹¥»÷¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/magento-stores-hit-by-largest-automated-hacking-attack-since-2015/


¾©¹«Íø°²±¸11010802024551ºÅ