Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄÎó²î£»£»£»£»£»£»£»Apodis PharmaÊý¾Ý¿âÉèÖùýʧй¶1.7TBÉñÃØÊý¾Ý

Ðû²¼Ê±¼ä 2020-12-02
1.Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄÎó²î


1.jpg


Cisco TalosÅû¶WebKitä¯ÀÀÆ÷ÒýÇæ±£´æ¶à¸öÑÏÖØµÄÎó²î¡£¡£¡£¡£¡£ÕâЩÎó²îÓëWebKitµÄWebSocket¡¢AudioSourceProviderGStreamerºÍImageDecoderGStreamer¹¦Ð§Óйء£¡£¡£¡£¡£»®·ÖΪWebSocket´úÂëÖ´ÐÐÎó²î£¨CVE-2020-13543£©£¬£¬£¬¿Éͨ¹ý´¥·¢ÊͷźóʹÓÃÎó²îÀ´Ô¶³ÌÖ´ÐдúÂ룻£»£»£»£»£»£»ImageDecoderGStreamerÊͷźóʹÓÃÎó²î£¨CVE-2020-13584£©£¬£¬£¬¿Éµ¼ÖÂÔ¶³ÌÖ´ÐдúÂ룬£¬£¬ÒÔ¼°±»×·×ÙΪCVE-2020-13543µÄÎó²î¡£¡£¡£¡£¡£    


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/webkit-vulnerabilities-allow-remote-code-execution-malicious-websites


2.Ô½ÄÏ×éÖ¯BismuthÃé×¼·¨¹úºÍÔ½ÄϵÄÕþ¸®»ú¹¹ºÍ¹«Ë¾


2.jpg


΢Èí·¢Ã÷Ô½ÄϺڿÍ×éÖ¯BismuthÃé×¼·¨¹úºÍÔ½ÄϵÄÕþ¸®»ú¹¹ºÍ¹«Ë¾¡£¡£¡£¡£¡£¸ÃÍÅ»ï×Ô2012ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬²¢ÒÔ´úºÅAPT32ºÍOceanLotusµÈΪÈËËùÖª¡£¡£¡£¡£¡£ÆäÖ÷Òª¿ªÕ¹Õë¶Ôº£ÄÚÍâµÄÖØ´óºÚ¿Í»î¶¯£¬£¬£¬Ä¿µÄÊÇÍøÂçÐÅÏ¢ÒÔ×ÊÖúÆäÕþ¸®´¦Öóͷ£ÕþÖΡ¢¾­¼ÃºÍÍâ½»Õþ²ß¾öÒé¡£¡£¡£¡£¡£µ«Î¢Èí·¢Ã÷£¬£¬£¬ÔÚ2020Äê7ÔÂÖÁ2020Äê8Ô£¬£¬£¬¸Ã×éÖ¯ÔÚÕë¶Ô·¨¹úºÍÔ½ÄϵÄÕþ¸®»ú¹¹ºÍ¹«Ë¾µÄ¹¥»÷ÖÐ×îÏÈʹÓÃMoneroÍÚ¿óÈí¼þ£¬£¬£¬ÏÖÔÚÉв»ÇåÎúÆäΪºÎ¾ÙÐд˸ü¸Ä¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-links-vietnamese-state-hackers-to-crypto-mining-malware-campaign/


3.Ñо¿ÍŶӷ¢Ã÷GotkitÓëREvilµÄÏàÖúͬ°é¹ØÏµÖØÉú


3.jpg


Ñо¿ÍŶӷ¢Ã÷£¬£¬£¬ÔÚ³¤´ïÒ»ÄêµÄÐÝÏ¢ºó£¬£¬£¬ÐÅÏ¢ÇÔȡľÂíGootkitÓëREvilÒ»ÆðÔÚÕë¶ÔµÂ¹úµÄÐÂÕ½ÕùÖÐÖØÉú¡£¡£¡£¡£¡£Ôڴ˴ι¥»÷»î¶¯ÖУ¬£¬£¬ºÚ¿Í¹¥»÷WordPressÍøÕ¾£¬£¬£¬²¢Ê¹ÓÃSEO²¡¶¾Ïò»á¼ûÕßչʾαÔìµÄÂÛ̳Ìû×Ó£¬£¬£¬²¢¸½ÓжñÒâ±í¸ñ»òÏÂÔØµÄÁ´½Ó¡£¡£¡£¡£¡£µ±Óû§µã»÷Á´½Óʱ£¬£¬£¬½«ÏÂÔØÒ»¸ö°üÀ¨»ìÏýµÄJSÎļþµÄZIPÎļþ£¬£¬£¬¸ÃÎļþ½«×°ÖÃGootkit¶ñÒâÈí¼þ»òREvilÀÕË÷Èí¼þ¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬Ê¹ÓÃÁË»ìÏýµÄÓÐÓÃÔØºÉ¿É½«ÆäÆÊÎö³ÉƬ¶Ï´æ´¢ÔÚ×¢²á±íÖУ¬£¬£¬Ê¹µÃÇå¾²Èí¼þ¸üÄѼì²âµ½¸Ã¶ñÒâ¸ºÔØ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/gootkit-malware-returns-to-life-alongside-revil-ransomware/


4.Ñо¿ÍŶӷ¢Ã÷¿Éͨ¹ýαÔìPayPal±íµ¥ÇÔÈ¡Óû§ÐÅÏ¢


4.jpg


Ñо¿ÍŶӷ¢Ã÷еÄÐÅÓÿ¨ÇÔÈ¡Æ÷¿Éͨ¹ýαÔìPayPal±íµ¥ÇÔÈ¡Óû§ÐÅÏ¢¡£¡£¡£¡£¡£¸ÃÇÔÈ¡Æ÷ÊÇ»ùÓÚJavaScriptµÄ¾ç±¾£¬£¬£¬ÓÃÓÚ×¢Èëµ½µçÉÌÆ½Ì¨µÄ½áÕÊÒ³ÃæÖС£¡£¡£¡£¡£¸Ã¾ç±¾Í¨¹ýÒþдÊõ±»Òþ²ØÔÚ±»Íйܵ½ÊÜѬȾÊÐËÁµÄЧÀÍÆ÷ÉϵÄÓ³ÏñÖС£¡£¡£¡£¡£È»ºó£¬£¬£¬Ëü»áʹÓÃÖ®Ç°ÍøÂçµÄ¶©µ¥Êý¾ÝÀ´Ô¤ÌîαÔìµÄPayPalÖ§¸¶±íµ¥£¬£¬£¬ÔÙ½«Êܺ¦ÕßÖØ¶¨Ïòµ½PayPalµÄ¶©µ¥Ò³Ãæ¡£¡£¡£¡£¡£Ò»µ©Êܺ¦ÕßÊäÈëÁ˸¶¿îÐÅÏ¢²¢µã»÷ÁËÌá½»°´Å¥£¬£¬£¬¸ÃÇÔÈ¡Æ÷»á½«ÆäËùÓÐÐÅÏ¢´«»Øµ½¹¥»÷ÕßµÄЧÀÍÆ÷¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/credit-card-skimmer-fills-fake-paypal-forms-with-stolen-order-info/


5.ResearchAndMarketsÐû²¼Î´À´5ÄêSD-WANÊг¡Õ¹Íû±¨¸æ


5.jpg


ResearchAndMarketsÐû²¼ÁËδÀ´5ÄêSD-WANÊг¡Õ¹Íû±¨¸æ¡£¡£¡£¡£¡£±¨¸æÔ¤¼Æ£¬£¬£¬È«ÇòSD-WANÊг¡¹æÄ£½«´Ó2020ÄêµÄ19ÒÚÃÀÔªÔöÌíµ½2025ÄêµÄ84ÒÚÃÀÔª£¬£¬£¬ÔÚ´Ëʱ´úµÄ¸´ºÏÄêÔöÌíÂÊ£¨CAGR£©Îª34.5£¥¡£¡£¡£¡£¡£°´×éÖ¯¹æÄ£»£»£»£»£»£»£»®·Ö£¬£¬£¬ÖÐСÐÍÆóÒµ½«Õ¼Óиü¸ßµÄÊг¡·Ý¶î¡£¡£¡£¡£¡£ÓÉÓÚ¸ü¶àµÄSD-WAN½â¾ö¼Æ»®»ùÓÚÔÆ£¬£¬£¬Ìá¸ßÁËÆä¿ÉÔâÊÜÐÔ£¬£¬£¬Ê¹ÖÐСÆóÒµ¶ÔSD-WAN½â¾ö¼Æ»®µÄÐèÇóÔöÌí¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ÆóÒµÕýתÏò»ùÓÚÔÆµÄÓ¦ÓóÌÐò£¬£¬£¬Òò´ËÔ¤¼ÆÔư²ÅŽ«ÔÚδÀ´Ö÷µ¼Êг¡¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.researchandmarkets.com/reports/5137053/software-defined-wide-area-network-sd-wan


6.Apodis PharmaÊý¾Ý¿âÉèÖùýʧй¶1.7TBÉñÃØÊý¾Ý


6.jpg


CyberNews·¢Ã÷Apodis PharmaµÄElasticSearchÊý¾Ý¿âÉèÖùýʧ£¬£¬£¬Ð¹Â¶Áè¼Ý1.7TBµÄÉñÃØÊý¾Ý¡£¡£¡£¡£¡£Apodis PharmaÊÇÒ»¼ÒΪҩ·¿¡¢Ò½ÁÆ»ú¹¹µÈ¹«Ë¾ÌṩÊý×Ö¹©Ó¦Á´ÖÎÀíÆ½Ì¨ºÍÈí¼þ½â¾ö¼Æ»®µÄ¹«Ë¾¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿â°üÀ¨´ó×ÚÓëÓªÒµÏà¹ØµÄÉñÃØÊý¾Ý£¬£¬£¬°üÀ¨Ò©Æ·×°ÔËÊý¾ÝºÍ´æ´¢×´Ì¬¡¢Æä25000¶à¸öÏàÖúͬ°éºÍ¿Í»§µÄµµ°¸¡¢²úÆ·ÊýÄ¿ºÍIDµÈ²úÆ·Êý¾Ý¡¢ÏúÊÛÈÕÆÚºÍ¼ÛÇ®µÈÏúÊÛÐÅÏ¢¡¢¿Í»§¼°Ô±¹¤ÐÕÃûµÈÓû§Êý¾Ý¡¢ÏûºÄÕߺͿͻ§Êý¾ÝµÄ¿ÉÊÓ»¯ºÍÆÊÎöÊý¾Ý¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿âÒÑÓÚ11ÔÂ17ÈÕ±»±£»£»£»£»£»£»£»¤ÆðÀ´¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/111756/data-breach/apodis-pharma-data-leak.html