¿¨°Í˹»ù°ä²¼2019ÄêQ3 ITÍþвÑݱä»ã±¨£»Group-IB°ä²¼2019/2020¸ß¿Æ¼¼·¸×ïÇ÷Ïò»ã±¨

°ä²¼¹¦·ò 2019-11-30

¡¾·ÖÎö»ã±¨¡¿


¿¨°Í˹»ù°ä²¼2019ÄêQ3 ITÍþвÑݱä»ã±¨

https://securelist.com/it-threat-evolution-q3-2019/95268/


Group-IB°ä²¼2019/2020¸ß¿Æ¼¼·¸×ïÇ÷Ïò»ã±¨

https://securityaffairs.co/wordpress/94513/cyber-crime/annual-report-threats-cyberspace.html


Ç÷Ïò¿Æ¼¼°ä²¼¹ØÓÚOperation ENDTRADEµÄ·ÖÎö»ã±¨

https://blog.trendmicro.com/trendlabs-security-intelligence/operation-endtrade-finding-multi-stage-backdoors-that-tick/


¡¾Êý¾Ýй¶¡¿


Palo Alto NetworksÔâ·êÔ±¹¤Êý¾Ýй¶ÊÂÎñ

https://businessinsights.bitdefender.com/palo-alto-networks-employee-data-breach-highlights-risks-posed-by-third-party-vendors


¡¾°²È«²¥±¨¡¿


Å·ÖÞÐ̾¯×éÖ¯µ·»ÙImminent Monitor RATÓÐ×éÖ¯µÄ·¸×ïÍÅ»ï

https://thehackernews.com/2019/11/europol-imminent-monitor-rat.html