ÃÀ¹úVoIPÌṩÉÌÔâµ½DDoS¹¥»÷£ºvpnMentor°ä²¼ºÚ¿Í·ÖÎö»ã±¨

°ä²¼¹¦·ò 2021-09-29

ÃÀ¹úVoIPÌṩÉÌBandwidth.comÔâµ½DDoS¹¥»÷


ÃÀ¹úVoIPÌṩÉÌBandwidth.comÔâµ½DDoS¹¥»÷.png


ÃÀ¹úVoIPÌṩÉÌBandwidth.comÔÚ½üÆÚÔâµ½ÁËDDoS¹¥»÷£¬µ¼Ö´Óǰ¼¸ÌìÄÚÆäÔÚÈ«ÃÀµÄÓïÒô·þÎñÖжÏ ¡£Bandwidth´ÓÃÀ¹ú¶«²¿¹¦·ò9ÔÂ25ÈÕÏÂÎç3:31ÆðÍ·»ã±¨Æäϵͳ³öÏÖ¹ÊÕÏ£¬Ó°ÏìÁËÓïÒô¡¢¼ÓÇ¿ÐÍ911(E911)·þÎñ¡¢ÐÂÎÅ·¢Ëͺ͹ÙÍø½Ó¼û ¡£Bandwidthδ¹«¿ª·þÎñÖжϵÄÔ­Òò£¬µ«ÆäÔ±¹¤³ÆÊÇDDoS¹¥»÷µ¼ÖµÄ ¡£±¾ÔÂVoIP.msÔøÔ⵽ΪÆÚÒ»ÖܵÄDDoS¹¥»÷²¢±»ÀÕË÷450ÍòÃÀÔª£¬Éв»Ã÷ÏÔBandwidthÊÇ·ñÒ²Ôâµ½ÁËÀàËÆµÄÀÕË÷¹¥»÷ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/bandwidthcom-is-latest-victim-of-ddos-attacks-against-voip-providers/


ÃÀ¹úÐÝ˹¶Ù¸Û¿Ú³ÆÆäÔâµ½ÒÉËÆ¹ú¶ÈÖ§³ÖµÄºÚ¿Í¹¥»÷


ÃÀ¹úÐÝ˹¶Ù¸Û¿Ú³ÆÆäÔâµ½ÒÉËÆ¹ú¶ÈÖ§³ÖµÄºÚ¿Í¹¥»÷.png


ÃÀ¹úÐÝ˹¶Ù¸Û¿ÚµÄ¹ÙÔ±ÔÚÉÏÖÜËĻ㱨³Æ£¬ÐÝ˹¶Ù¸ÛÎñ¾ÖÓÚ8Ô·ÝÔøÔâµ½ÍøÂç¹¥»÷ ¡£CISA¹ÙÔ±Jen Easterlyй©£¬Õâ´Î¹¥»÷»î¶¯¼«¶È¸´ÔÓ£¬Ó¦¸Ã¹é×ïÓÚ¹ú¶ÈÖ§³ÖµÄºÚ¿Í£¬²¢ÒÔΪ¹¥»÷ÕßÀûÓÃÁËManageEngine ADSelfService PlusÖеÄÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶CVE-2021-40539 ¡£¸Ã·ì϶ÒÑÓÚ9Ô³õ½¨¸´£¬FBI¡¢CGCYBERºÍCISA»¹ÔÚ9ÔÂÖÐÑ®½áºÏ°ä²¼ÁËÓйظ÷ì϶µÄ°²È«Õ÷ѯ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/122599/hacking/port-of-houston-cyberattack.html


OpenSUpdaterеĴúÂëÊðÃû¼¼Êõ¿ÉÈÆ¹ý°²È«¼ì²â


OpenSUpdaterеĴúÂëÊðÃû¼¼Êõ¿ÉÈÆ¹ý°²È«¼ì²â.png


Google TAGÍŶӷ¢ÏÖÁËOpenSUpdaterеĴúÂëÊðÃû¼¼Êõ¿ÉÈÆ¹ý°²È«¼ì²â ¡£OpenSUpdaterͨ³£Ê¹ÓôӺϷ¨Ö¤ÊéÐû¸æ»ú¹¹»ñµÃµÄ´úÂëÊðÃûÖ¤Êé½øÐÐÊðÃû£¬×Ô8ÔÂÒÔÀ´£¬ËüÆðͷʹÓÃÎÞЧÊðÃû ¡£ÕâЩÐÂÑù±¾ÒÔEnd of Content(EOC)ÏóÕ÷´úÌæÁËleaf X.509Ö¤ÊéµÄSignatureAlgorithmµÄ¡°²ÎÊý¡±ÔªËصÄNULLÏóÕ÷ ¡£Ê¹ÓÃOpenSSLÌáÈ¡ÊðÃûÐÅÏ¢µÄ°²È«²úÆ·»áÒÔΪÕâÖÖ±àÂëÎÞЧ£¬È»¶øÒ»Ð©½âÎöÆ÷ÒÔΪÕâЩ±àÂëÓÐЧ²¢ÔÊÐíÑéÖ¤ ¡£ÀûÓÃÕâÖÖ·½Ê½£¬Äܹ»´ïµ½Èƹý¼ì²âµÄÖ÷ÕÅ ¡£


 Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/122576/hacking/code-signing-avoid-detection.html


Cisco·¢ÏÖÀûÓÃNetwireºÍWarzone¹¥»÷Ó¡¶ÈµÄ»î¶¯


Cisco·¢ÏÖÀûÓÃNetwireºÍWarzone¹¥»÷Ó¡¶ÈµÄ»î¶¯.png


Cisco TalosÔÚ9ÔÂ23ÈÕÅû¶ÁËÕë¶ÔÓ¡¶Èµ±¾ÖºÍ¾üÊ»ú¹¹µÄ¹¥»÷»î¶¯¡°Operation Armor Piercer¡± ¡£Õâ´Î»î¶¯ÖÐʹÓõÄһЩսÊõÓë°Í»ù˹̹ÓйØ×éÖ¯APT36ºÍSideCopyÀàËÆ£¬²¢Ê¹ÓÃÁËóÒ×RAT NetwireºÍWarzone(AveMaria) ¡£¹¥»÷Õß»¹Ê¹ÓÃÁ˸÷Ààµö¶ü£¬ËüÃÇÖØÒª¼Ù×°³ÉÓëÓ¡¶Èµ±¾Ö»ù´¡ÉèÊ©ºÍ²Ù×÷ÓйصÄÖ¸ÄÏ£¬ÀýÈçKavachºÍITÓйØÖ¸ÄÏ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/threat-actor-targets-indian-government-commercial-rats


vpnMentor°ä²¼ºÚ¿ÍÔÚTelegramÉϻµÄ·ÖÎö»ã±¨


vpnMentor°ä²¼ºÚ¿ÍÔÚTelegramÉϻµÄ·ÖÎö»ã±¨.png


vpnMentor½üÆÚ°ä²¼ÁËÓйغڿÍÔÚTelegramÉϻµÄ·ÖÎö»ã±¨ ¡£»ã±¨Ö¸³ö£¬¹¥»÷ÕßËÆºõÆðÍ·´óÁ¿Ó¿ÏòTelegramÀ´·ÖÏíºÍ»áÉÌ´ó¹æÄ£µÄÊý¾Ýй¶ ¡£×êÑÐÈËÔ±²ÎÓëÁ˼¸¸öÒÔ¶ñÒâÍøÂç»î¶¯ÎªÖ÷µÄTelegramÓ××飬·¢ÏÖ¹¥»÷Õß»áÔÚÆµÂ·Öа䲼ת´¢µÄÊý¾Ý£¬²¢¶ÔÊý¾Ý½øÐмòҪעÃ÷ÒÔ¹©ÆäËûÓû§Ê¹Óã»»òÕßÊÇÊý°ÙÃû³ÉԱһ·»áÉÌÓйØÍøÂç¹¥»÷µÄ¸÷¸ö·½ÃæÒÔ¼°ÈôºÎÀûÓÃת´¢µÄÊý¾Ý ¡£


Ô­ÎÄÁ´½Ó£º

https://www.vpnmentor.com/blog/cybercrime-on-telegram/


RiskRecon°ä²¼2020ÄêÊý¾Ýй¶ÊÂÎñµÄÁ¿»¯·ÖÎö»ã±¨


RiskRecon°ä²¼2020ÄêÊý¾Ýй¶ÊÂÎñµÄÁ¿»¯·ÖÎö»ã±¨.png


RiskReconºÍCyentia Institute½áºÏ°ä²¼ÁË2020ÄêÊý¾Ýй¶ÊÂÎñµÄÁ¿»¯·ÖÎö»ã±¨ ¡£»ã±¨Ö¸³ö£¬×Ô2008ÄêÒÔÀ´ÒÑ·¢ÏÖ897ÆðÊý¾Ýй¶µÄÁ¬ËøÊÂÎñ£¨ripple event£©£¬ÆäÖеÄ108Æð²úÉúÔÚ´ÓǰÈýÄêÖУ»´ËÀàÊÂÎñÔì³ÉµÄ¾­¼ÃËðʧÊÇ´«Í³µÄÊý¾Ýй¶ÊÂÎñµÄ10±¶£¬ÆäÖÐ×îÑϳÁµÄ¿É´ï26±¶£»µäÐ͵ÄÁ¬ËøÊÂÎñ±ØÒª379ÌìºóÄÜÁ¦Ó°Ïì75%µÄÏÂÓÎÊܺ¦Õߣ¬¶øÉæ¼°µ½×éÖ¯µÄÊýÁ¿¾ùÔÈΪ4¸ö ¡£


Ô­ÎÄÁ´½Ó£º

https://www.riskrecon.com/report-measuring-the-impact-of-multi-party-breaches