¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20181029
°ä²¼¹¦·ò 2018-10-29
IntSightsºÍRiskified½áºÏ°ä²¼µç×ÓÉÌÎñ¼°ÁãÊÛÒµÍþÐ²Ì¬ÊÆ»ã±¨£¨2018Äê10Ô£©£¬»ã±¨µÄÖØÒª·¢ÏÖÔ̺¬£º°µÍøÊг¡ÉϵÄÁãÊÛÉÌÆ·Ôö³¤ÁË278%£»Õë¶Ôµç×ÓÁãÊ۵Ĵ¹µöÍøÕ¾Ôö³¤ÁË297%£»2017ÄêµÚËÄʱ¶È£¨¼ÙÆÚ×óÓÒ£©¿ÉÒÉÀûÓ÷¨Ê½¼¤Ôö469%£»Í¬Ñù2017ÄêµÚËÄʱ¶È¶ñÒâµÄÉ罻ýÌåµµ°¸¼¤Ôö345%£»¾ùÔÈÿ¸öÁãÊÛ¹«Ë¾Â¶³öÁË22.1¸öÄÚ²¿µÇÂ¼Ò³Ãæ»ò¿ª·¢·þÎñÆ÷¡£
ÔÎÄÁ´½Ó£º
https://www.intsights.com/blog/introducing-the-retail-and-ecommerce-threat-landscape-report2¡¢×êÑлú¹¹°ä²¼¹ØÓÚ³¯ÏÊÍøÂç¼äµý»î¶¯µÄ·ÖÎö»ã±¨
ƾ¾ÝÍþвµý±¨¹«Ë¾Recorded FutureµÄ»ã±¨£¬»¥ÁªÍø¿ÉÄÜÔÚ³ÉΪ³¯ÏÊ×î¸ß¸¨µ¼²ãµÄÒ»ÖÖͨÀý¹¤¾ß£¬ÓÃÓÚ´´ÔìÊÕÈë»òΪÆä½øÐзþÎñ¡£½ðÕýÈÕÕþȨÒѾ¿ª·¢³öÒ»ÖÖ¹ÖÒìµÄ»¥ÁªÍøÊ¹ÓúÍÀûÓÃģʽ£¬Ê¹µÃ¸¨µ¼²ãÔÚÓÐЧʱÄܹ»Ñ¸¿ìѡȡеķþÎñ»ò¼¼Êõ£¬¶øÔÚ²»±ØÒªÊ±½«ÆäÅׯú¡£×êÑÐÈËÔ±·¢ÏÖÒ»¸ö¼ÓÃÜÇ®±ÒڿƻMarine Chain£¬Æä±³ºó¾ÍÊÇλÓÚÐÂ¼ÓÆÂµÄ³¯ÏÊÖ÷ÒåÕß¡£
ÔÎÄÁ´½Ó£º
https://www.recordedfuture.com/north-korea-internet-usage/3¡¢±ÈÀûʱµçÐŹ«Ë¾BelgacomÔâ·ê¹¥»÷ÊÂÎñÒÉΪӢ¹úGCHQËùΪ
±ÈÀûʱ±¨Ö½De Standaard±¨Â·³Æ£¬µ÷²éÈËÔ±ÒѾ֤Ã÷Õë¶Ô±ÈÀûʱµçÐŹ«Ë¾Belgacom£¨ÏÖΪProximus¹«Ë¾£©µÄºÚ¿Í¹¥»÷ÊÇÓ¢¹úµý±¨»ú¹¹GCHQËùΪ¡£¸ÃÊÂÎñ²úÉúÔÚ2013Äê9Ô£¬BelgacomµÄIT»ù´¡ÉèÊ©Ôâµ½¶ñÒâÈí¼þ¹¥»÷¡£±¨Â·Ö¸³ö£¬Óë¹¥»÷BelgacomµÄ¼äµýÈí¼þ½øÐÐͨѶµÄIPµØÖ·ÖУ¬ÓÐÈý¸öIPÊôÓÚÒ»¼ÒÓ¢¹ú¹«Ë¾¡£¸Ã¹¥»÷ÊÇÓÉGCHQÌáÒéµÄ£¬´úºÅΪOperation Socialist£¨Éç»áÖ÷ÒåÐж¯£©¡£Ó¢¹úÄÚÕþ²¿»Ø¾øÓëµ÷²é×é½øÐкÏ×÷¡£ÈôÊDZ¨Â·Êôʵ£¬ÕâÒ»Çé¿öÓÈÆäÁîÈ˲»°²¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/77430/intelligence/gchq-hacked-belgacom.html4¡¢×êÑÐÍŶÓÑÝʾÈôºÎÀûÓÃMicrosoft WordµÄÔÚÏßÊÓÆµÖ°ÄÜÖ´ÐжñÒâ´úÂë
Cymulate×êÑÐÍŶӷ¢ÏÖÒ»ÖÖÀûÓÃMicrosoft WordÖеÄÔÚÏßÊÓÆµÖ°ÄÜÖ´ÐжñÒâ´úÂëµÄ²½Öè¡£¸Ã²½Öèͨ¹ýÔÚWordÎĵµÖÐǶÈëÊÓÆµ£¬¶øºó¶Ôdocument.xmlÎļþ½øÐбà×룬½«ÊÓÆµÁ´½Ó´úÌæÎª¶ñÒâ´úÂëÀ´ÌáÒé¹¥»÷¡£ÕâЩ¶ñÒâ´úÂëÔÚºó¶ÜÖ´ÐУ¬²¢¿ÉÄܵ¼Ö½øÒ»²½µÄ´úÂëÖ´ÐÐÇé¿ö¡£×êÑÐÍŶӰ䲼ÁËÓйØPoCÑéÖ¤ÊÓÆµ£¬µ«Î¢ÈíÒÔΪÕâ²¢²»ÊÇÒ»¸ö°²È«·ì϶¡£
ÔÎÄÁ´½Ó£º
https://blog.cymulate.com/abusing-microsoft-office-online-video5¡¢×êÑÐÍŶÓÅû¶»ªÇæÖ÷°åµ×²ãÇý¶¯·¨Ê½ÖеĶà¸ö°²È«·ì϶
SecureAuth Labs×êÑÐÍŶÓÅû¶»ªÇæÖ÷°åÖеĶà¸ö°²È«·ì϶£¬ÕâЩ·ì϶´æÔÚÓڵײãÇý¶¯·¨Ê½AsrDrv101.sysºÍAsrDrv102.sysÖС£»ªÇæÊµÓù¤¾ßASRock RGBLEDµÈ»á×°ÖÃÕâЩÇý¶¯£¬³É¹¦ÀûÓÃÕâЩ·ì϶½«µ¼Ö±¾µØ¹¥»÷ÕßÌáÉýȨÏÞ¡£·ì϶Ô̺¬CR¼Ä·ÅÆ÷½Ó¼û·ì϶£¨CVE-2018-10709£©¡¢ËÁÒâÎïÀíÄÚ´æ¶Áд·ì϶£¨CVE-2018-10710£©¡¢MSR¼Ä·ÅÆ÷½Ó¼û·ì϶£¨CVE-2018-10711£©ºÍ¶Ë¿ÚÓ³ÉäI/O½Ó¼û·ì϶£¨CVE-2018-10712£©¡£»ªÇæÒÑÔÚ8Ô·ݽ¨¸´ÁËÕâЩ·ì϶¡£
ÔÎÄÁ´½Ó£º
https://www.secureauth.com/labs/advisories/asrock-drivers-elevation-privilege-vulnerabilities6¡¢IBMÒÔ340ÒÚÃÀÔªÊÕ¹ºRed Hat£¬×齨»ìºÏÔÆÌṩÉÌ
10ÔÂ29ÈÕÐÂÎÅ£¬IBMºÍRed Hat¹²Í¬°ä·¢Á½¼Ò¹«Ë¾ÒÑ´ï³É×îÖÕºÍ̸£¬IBM½«ÒÔ340ÒÚÃÀԪȫ×ÊÊÕ¹ºRed Hat£¬Red Hat½«×÷ΪIBMµÄ»ìºÏÔÆÍŶӶÀÁ¢ÔËÓª¡£¸Ã±ÊÂòÂôʹµÃIBM³ÉΪȫÇòÅÅÃûµÚÒ»µÄ»ìºÏÔÆÌṩÉÌ£¬ÎªÆóÒµÌṩʢ¿ªÔƽâ¾ö¹æ»®¡£Í¨¹ýÕâ´ÎÊÕ¹º£¬IBM½«³ÖÐøÖÂÁ¦ÓÚºìñµÄÊ¢¿ªÊ½ÖÎÀí¡¢¿ªÔ´¹±Ïס¢²Î¼Ó¿ªÔ´ÉçÇøºÍ¿ª·¢Ä£Ê½£¬ÒÔ¼°ÍƽøÆä¿í·ºµÄ¿ª·¢ÈËÔ±Éú̬ϵͳ¡£´Ë±í£¬Í¨¹ýרÀû³Ðŵ¡¢GPLºÏ×÷³Ðŵ¡¢Ê¢¿ª·¢ÏÖÍøÂçºÍLOTÍøÂçµÈ¹¤×÷£¬IBMºÍRed Hat½«³ÖÐøÖÂÁ¦ÓÚ³ÖÐøµÄ¿ªÔ´×ÔÓÉ¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/ibm-acquire-open-source-giant-red-hat-34-billionÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·ÒëºÍÕû¶Ù


¾©¹«Íø°²±¸11010802024551ºÅ