¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20181225
°ä²¼¹¦·ò 2018-12-25
12ÔÂ21ÈÕά»ù½âÃÜÅû¶1.6Íò·ÝÎļþ£¬ÕâЩÎļþÊÇÃÀ¹ú´óʹ¹ÝµÄ¹ºÎïÇåµ¥¡£Æ¾¾ÝÕâЩÎļþ£¬ÃÀ¹úפ¶à¹ú´óʹ¹Ý¶¼Ôø²É°ì¼äµýÉ豸¡£ÀýÈç2018Äê8Ô£¬ÃÀ¹ú×¤Èø¶ûÍß¶àʹ¹Ý°ä²¼Ò»·Ý²É¹ºÐèÒª£¬ÆäÖÐÔ̺¬94¼þ¼äµýÉ豸£¬Ô̺¬ÄÜ×°ÖÃÔÚÆû³Â·ïµÄÒ¹ÊÓÉãÏñÍ·ÒÔ¼°¼Ù×°Ôڸֱʡ¢´ò»ð»ú¡¢³ÄÉÀŦ¿Û¡¢ÑÛ¾µµÈÈÕ³£ÓÃÆ·ÖеÄÉãÏñÍ·¡£ÃÀ¹úפÎÚ¿ËÀ¼Ê¹¹ÝÔò²É¹ºÁ˹àÒô»úºÍÒñ±ÎÎÞÏßµçÉ豸µÈ¡£
ÔÎÄÁ´½Ó£º
https://shoppinglist.wikileaks.org/2¡¢·ì϶ÀûÓù¤¾ß°üUnderminerÔÚ12ÔÂÍÆ³ö¸Ä½ø°æ±¾
Malwarebytes Labs·¢ÏÖ·ì϶ÀûÓù¤¾ß°üUnderminerÔÚ12Ô·ÝÍÆ³öÁ˸ĽøµÄ°æ±¾¡£ÔÚ2018ÄêÇï¼¾£¬UnderminerÖØÒªÀûÓÃIEÖеķì϶£¨CVE-2018-8174£©ºÍFlash PlayerÖеķì϶£¨CVE-2018-4878£©¡£µ«ÔÚ12Ô·ݣ¬×êÑÐÈËÔ±ÒÔΪа汾µÄUnderminerʵÏÖÁË×î½üµÄFlash Player·ì϶ÀûÓã¨CVE-2018-15982£©¡£Æä×îÖÕpayloadµÄ´ò°üºÍÖ´Ðеķ½Ê½ÈÔÊÇUnderminer¶ÀÓе쬯äpayloadΪHidden Bee¡£
ÔÎÄÁ´½Ó£º
https://blog.malwarebytes.com/threat-analysis/2018/12/underminer-exploit-kit-improves-latest-iteration/3¡¢Ó¢¹úµ±¾ÖÍÆ³ö¹ú¶ÈÍøÂ簲ȫ¼¼Êõ³õ²½Õ½ÊõÕ÷¼¯¶¨¼û¸å
Ó¢¹úµ±¾ÖÍÆ³ö¹ú¶ÈÍøÂ簲ȫ¼¼Êõ³õ²½Õ½ÊõµÄÕ÷¼¯¶¨¼û¸å£¬ÕâÒ»³õ²½Õ½ÊõµÄÖ¸±êÊǽâ¾ö¸ü¿í·ºµÄÍøÂ簲ȫÄÜÁ¦²î¾à¡£»ã±¨ÖжÔÍøÂ簲ȫ¼¼Êõ½øÐÐÁËÃ÷È·½ç˵£¬²¢½«ÔÚ2019Äê°ä²¼ÆëÈ«µÄÍøÂ簲ȫ֪ʶϵͳ£¨CyBoK£©¡£³õ²½Õ½Êõ»¹½«³ÉÁ¢Ò»¸öеġ¢¶ÀÁ¢µÄÓ¢¹úÍøÂ簲ȫίԱ»á£¬¸ÃίԱ»á½«ÕƹÜÔì¶©º¸Ç·ÖÆçרҵµÄ¿ò¼Ü£¬µì¶¨ÍøÂ簲ȫרҵµÄ½á¹¹»ù´¡¡£µ±¾Ö»¹½«³ÖÐøÖ§³Ö·¢Õ¹ÐÐÒµÖ÷µ¼µÄÅàѵÉú̬ϵͳ¡£
ÔÎÄÁ´½Ó£º
https://www.gov.uk/government/publications/cyber-security-skills-strategy/initial-national-cyber-security-skills-strategy-increasing-the-uks-cyber-security-capability-a-call-for-views-executive-summary4¡¢×êÑÐÍŶÓÅû¶»ªÎªÂ·ÓÉÆ÷ÖеÄÐÅϢй¶·ì϶
NewSky SecurityÅû¶»ªÎªÂ·ÓÉÆ÷ÖеÄÒ»¸öÐÅϢй¶·ì϶£¬¸Ã·ì϶£¨CVE-2018-7900£©Ê¹µÃ¹¥»÷·ÓÉÆ÷µÄ¹ý³ÌÔ½·¢¼ò»¯¡£¹¥»÷ÕßÄܹ»ÀûÓø÷ì϶ÅжÏ·ÓÉÆ÷ÊÇ·ñÓµÓÐĬÈÏÍ´´¦£¬¶øÎÞÐèÏνӵ½É豸¡£¸Ã·ì϶µÄµÀÀíÊÇ·ÓÉÆ÷Ãæ°åµÄµÇÂ¼Ò³ÃæµÄhtmlÔ´ÂëÖÐÔ̺¬Ò»¸öÌØ¶¨µÄ±äÁ¿£¬¸Ã±äÁ¿µÄÌØ¶¨Öµ½ÒʾÁË·ÓÉÆ÷ÊÇ·ñÓµÓÐĬÈÏÃÜÂ룬Òò¶ø¹¥»÷ÕßÄܹ»ÔÚZoomEye/ShodanÉÏÒþʽµØ»ñȡӵÓÐĬÈÏÃÜÂëµÄÉ豸ÁÐ±í¡£ÔÚ½Óµ½»ã±¨ºó£¬»ªÎªÒѾ½¨¸´Á˸÷ì϶¡£
ÔÎÄÁ´½Ó£º
https://blog.newskysecurity.com/information-disclosure-vulnerability-cve-2018-7900-makes-it-easy-for-attackers-to-find-huawei-3e7039b6f44f5¡¢Ê©ÄÍµÂµçÆø½¨¸´EVLinkµç¶¯Æû³µ³äµçÕ¾ÖеĶà¸ö°²È«·ì϶
Ê©ÄÍµÂµçÆø°µÊ¾ÆäEVLinkµç¶¯Æû³µ³äµçÕ¾µÄParkingÂäµØÊ½µ¥Ôª£¨v3.2.0-12_v1¼°¸üÔç°æ±¾£©´æÔÚÈý¸ö°²È«·ì϶£¬Ô̺¬Ó²±àÂëÍ´´¦·ì϶£¨CVE-2018-7800£©¡¢´úÂë×¢Èë·ì϶£¨CVE-2018-7801£©ºÍSQL×¢Èë·ì϶£¨CVE-2018-7802£©¡£EVLinkͨ³£ÓÃÓڰ칫ÊÒ¡¢¾ÆµêºÍ³¬Êеȴ¦Ëù£¬¸Ã¹«Ë¾ÒѾΪÕâЩ·ì϶ÌṩÁ˽¨¸´²¹¶¡¡£±¾ÔÂÔçЩʱ³½¿¨°Í˹»ù³¢ÊÔÊÒÅû¶ChargePoint HomeµÄ³äµç×®´æÔÚ¶à¸ö·ì϶£¬×êÑÐÈËÔ±»¹Ö¸³öEVͨѶºÍ̸¡¢EVÖ§¸¶ÏµÍ³ºÍºó¶ËͨѶµÄ°²È«ÐÔ¶¼Ò×Êܹ¥»÷¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/critical-bug-patched-in-schneider-electric-vehicle-charging-station/140370/6¡¢Akamai°ä²¼Ð´¹µöÕ½Êõ×êÑл㱨£¬³Áµã¹Ø×¢ÓÎÏ·¡¢Éç½»¼°Öн±
ƾ¾ÝAkamaiµÄд¹µöÕ½Êõ×êÑл㱨£¬Ê¢Ðеġ°Èý¸öÎÊÌ⡱ÔÚÏßÓ׿¼ÊÔ±»·¢ÏÖÊÇÒ»¸ö´óÐ͵ÄÍøÂç´¹µöڿƻ¡£¸Ã´¹µö»î¶¯·ÂÕÕÁËËĸöÐÐÒµ£¨Ô̺¬º½¿Õ¡¢ÁãÊÛ¡¢ÓéÀÖºÍʳƷ£©µÄ78¸öÆ·ÅÆ£¬ÀýÈçµÏÊ¿ÄáÀÖÔ°¡¢Dunkin'DonutsºÍTargetµÈ¡£¸ÃȦÌ×ͨ³£³Ðŵ¿¼ÊÔÖ®ºó´ÍÓë¼Î½±£¬µ«ÏÖʵÉÏ»áÒªÇóÓû§ÔÚ½ÓÊܽ±Æ·Ö®Ç°ÌṩÓ×ÎÒÐÅÏ¢£¬²¢ÔÚÉ罻ýÌåÉÏ´«²¼Á´½Ó¡£AkamaiµÄ»ã±¨»¹¹Ø×¢ÁËÓÎÏ·¡¢Éç½»¼°Öн±µÈ´¹µöÕ½Êõ¡£
ÔÎÄÁ´½Ó£º
https://www.akamai.com/us/en/multimedia/documents/report/a-new-era-in-phishing-research-paper.pdfÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·ÒëºÍÕû¶Ù


¾©¹«Íø°²±¸11010802024551ºÅ