¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20180827
°ä²¼¹¦·ò 2018-08-27¡¾Êý¾Ýй¶¡¿°®¶ûÀ¼µçÐŹ«Ë¾EirµÄһ̨±Ê¼Ç±¾±»µÁ£¬µ¼ÖÂÔ¼3.7ÍòÓû§µÄÐÅϢй¶
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75655/data-breach/eir-data-breach.html
¡¾Íþвµý±¨¡¿×êÑÐÍŶӳÆÈýÐÇ¡¢»ªÎªµÈ11¼Ò³§É̵ÄAndroidÊÖ»úÒ×ÊÜATºÅÁî¹¥»÷
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/smartphones-from-11-oems-vulnerable-to-attacks-via-hidden-at-commands/
¡¾Íþвµý±¨¡¿Google×êÑÐÈËÔ±³Æµï±¤Ö®Ò¹µÄAndroid appÒ×ÊÜMitD¹¥»÷
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/fortnite-android-app-vulnerable-to-man-in-the-disk-attacks/
¡¾Íþвµý±¨¡¿×êÑÐÍŶӷ¢ÏÖÖØÒªÕë¶ÔÈÕ±¾µÄ´ó¹æÄ£À¬»øÓʼþ»î¶¯
ÔÎÄÁ´½Ó£ºhttps://blog.trendmicro.com/trendlabs-security-intelligence/iqy-and-powershell-abused-by-spam-campaign-to-infect-users-in-japan-with-bebloh-and-ursnif/
¡¾Íþвµý±¨¡¿×êÑÐÍŶÓÑÝʾͨ¹ýUSB³äµçÏßÈëÇÖÍÆËã»úµÄUSBHarpoon¹¥»÷
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75644/hacking/usbharpoon-attack.html
¡¾Íþвµý±¨¡¿FireEyeÅû¶ÒÉËÆÒÁÀÊÌáÒéµÄÕë¶ÔÃÀ¹ú¡¢Ó¢¹úºÍÖж«µÄÐéαÐÂÎÅÍøÂç
FireEye½üÈÕ·¢ÏÖÁËÒ»ÏîËÆºõÀ´×ÔÒÁÀʵĿÉÒɻ£¬¸Ã¶ñÒâ»î¶¯ÀûÓöà¸öÉ罻ýÌåÆ½Ì¨ÉϵÄÐéαÐÂÎÅÍøÕ¾ºÍÓйØÕË»§µÄ¼¯ÈºÍøÂ磬°ä²¼ÇкÏÒÁÀÊÀûÒæµÄÕþÖÎÐÂÎÅ¡£ÆäÕë¶ÔµÄµØÓòÔ̺¬ÃÀ¹ú¡¢Ó¢¹ú¡¢À¶¡ÃÀÖÞºÍÖж«µØÓò£¬Ðû´«µÄÄÚÈÝÔ̺¬·´É³Ìذ¢À²®¡¢·´ÒÔÉ«ÁкÍÇ×°ÍÀÕ˹̹ÒÔ¼°Ö§³ÖÃÀ¹úÓÐÀûÓÚÒÁÀʵľßÌåÕþ²ß£¬ÈçÃÀÒÁºËºÍ̸£¨JCPOA£©µÈ¡£
ÔÎÄÁ´½Ó£ºhttps://www.fireeye.com/blog/threat-research/2018/08/suspected-iranian-influence-operation.html


¾©¹«Íø°²±¸11010802024551ºÅ