ÔÚGoogle DocsÖÐÊäÈëÌØ¶¨µÄµ¥´Êºó»áµ¼ÖÂÆä±ÀÀ£
°ä²¼¹¦·ò 2022-05-07¾ÝýÌå5ÔÂ6ÈÕ±¨Â·£¬Google DocsÖдæÔÚÒ»¸öÎÊÌ⣬ÔÚÆäÖÐÊäÈëÌØ¶¨µÄµ¥´Êºó»áµ¼Ö±ÀÀ£¡£¸ÃÎÊÌâÊ×ÏÅ×ÉÓû§Eliza Callahan·¢ÏÖ£¬µ±ÆäÔÚÎĵµÖÐÊäÈë¡°And.And.And.And.And.And.¡±Ê±£¬ÊÕµ½ÃýÎóÐÂÎÅ¡°Unable to load file¡±£¬²¢ÇÒÎÞ·¨Ôٲ鿴»ò±à×ëÎĵµ¡£¾¹ý²âÊÔ£¬Ó×дµÄ¡°and.and.and.and.and.and.¡±²»»á´¥·¢¸ÃÎÊÌ⣬µ«Ò»ÑùÌåʽµÄ×Ö·û´®´æÔÚͬÑùµÄÎÊÌ⣬ÖîÈç"But.But.But.But.But."µÈ¡£×êÑÐÈËÔ±´§Ä¦Óë¡°ÏÔʾÓï·¨½¨Ò顱ѡÏîÓйأ¬Ä¿Ç°GoogleÍŶÓÔÚ½â¾ö¸ÃÎÊÌâ¡£
https://www.bleepingcomputer.com/news/technology/google-docs-crashes-on-seeing-and-and-and-and-and/
2¡¢ÊÕÕ®·þÎñENCollectÅäÖÃÃýÎóй¶³¬¹ý160Íò±Ê¼Í¼
°²È«¹«Ë¾UpGuardÔÚ5ÔÂ5ÈÕ³ÆÆä·¢ÏÖÁËÒ»¸öÅäÖÃÃýÎóµÄElasticSearch·þÎñÆ÷£¬Éæ¼°Ó¡¶ÈºÍ·ÇÖÞ½ðÈÚ·þÎñ»ú¹¹´û¿îµÄ²ÆÕþÐÅÏ¢¡£¸ÃElasticSearchÊôÓÚÕ®Îñ´ßÊÕ·þÎñƽ̨ENCollect£¬×ܹ²ÓÐ5.8GBÊý¾Ý£¬1686363±Ê¼Í¼¡£ÆäÖÐÔ̺¬Ô̺¬ÐÕÃû¡¢´û¿î½ð¶î¡¢µ®ÉúÈÕÆÚ¡¢ÕʺŵÈÓ×ÎÒÐÅÏ¢£¬ÒÔ¼°ÊôÓÚ²úÆ·ÖÎÀíÔ±¡¢¹«Ë¾¿Í»§ºÍÊÕ¿î´úÀíµÄ48043¸öÓʼþµØÖ·¡£×êÑÐÈËÔ±ÓÚ2ÔÂ16ÈÕ¼ì²âµ½¸ÃÊý¾Ý¿â£¬2ÔÂ28ÈÕÆäÒѱ»±£»¤ÆðÀ´¡£
https://thehackernews.com/2022/05/thousands-of-borrowers-data-exposed.html
3¡¢Ò˼ҼÓÄôó·Ö¹«Ë¾ÒÑй¶½ü10ÍòÃû¿Í»§µÄÓ×ÎÒÐÅÏ¢
¾Ý5ÔÂ6ÈÕ±¨Â·£¬Ò˼ҼÓÄôó·Ö¹«Ë¾ÒÑй¶Լ95000Ãû¿Í»§µÄÓ×ÎÒÐÅÏ¢¡£¸Ã¹«Ë¾ÔÚÉêÃ÷ÖаµÊ¾£¬²¿ÃŹ˿͵ÄÓ×ÎÒÐÅÏ¢³Ê´Ë¿ÌÒ˼ҼÓÄôó¹«Ë¾Ò»ÃûÔ±¹¤ÔÚ3ÔÂ1ÈÕÖÁ3ÈÕÆÚ¼äÀûÓÃÒ˼ҵĹ˿ÍÊý¾Ý¿â½øÐÐµÄ "ͨ³£ËÑË÷ "µÄÁ˾ÖÖС£Õâ´Îй¶Á˿ͻ§µÄÐÕÃû¡¢ÓʼþµØÖ·¡¢µç»°ºÅÂëºÍÓÊÕþ±àÂëµÈÐÅÏ¢¡£¸Ã¹«Ë¾°µÊ¾ËûÃÇĿǰÎÞ·¨´§Ä¦µ¼ÖÂÕâ´ÎÊÂÎñµÄÔÒò£¬µ«ÒѾ²ÉÈ¡Ðж¯½â¾ö¸ÃÎÊÌ⣬²¢ÒѾ×Ô¶¯Ïò¼ÓÄôóÒþÖÔ¼à¹Ü»ú¹¹´«µÝÁËÕâÒ»ÊÂÎñ¡£
https://www.infosecurity-magazine.com/news/data-breach-ikea-canada/
4¡¢¶íÂÞ˹¾ÆÀà·ÖÏúµÄÓйØÍøÕ¾EGAISÔâµ½DDoS¹¥»÷
¾ÝýÌå5ÔÂ5Èճƣ¬¶íÂÞ˹µÄһЩ¾ÆÀ๫˾Ðû³ÆÎÞ·¨ÒÀÕÕµ±¾ÖÂÉÀýµÄÒªÇó½Ó¼ûEGAISÍøÕ¾¡£EGAISÊǶíÂÞ˹¾Æ¾«ÒûÁÏͳһ×Ô¶¯»¯ÐÅϢϵͳ£¬Æä·þÎñÖжϵ¼Ö¶íÂÞ˹¾ÆÀàµÄÔËÊäºÍÅäËÍÔÚ´Óǰ¼¸ÌìÊܵ½Á˾޴óµÄÓ°Ïì¡£Õâ´Î¹¥»÷»î¶¯¿ÉÄÜÓëÎÚ¿ËÀ¼µÄIT ArmyÓйأ¬ÓÉÓÚÓйØÍøÕ¾½üÆÚÒѱ»¸ÃÍÅ»ïÁÐΪָ±ê¡£Õâ²»ÊǵÚÒ»´ÎÕë¶Ô¶íÂÞ˹ÄÚ²¿²úÆ·¹©¸øÁ´µÄ¹¥»÷£¬3ÔÂ·ÝÆäÈâÀà³ö²úÉÌMiratorgÔâµ½Á˹¥»÷£¬Í×еãλÓÚ¸ÃÁìÓò¹«Ë¾Ê¹ÓõĹú¶ÈÐÅϢϵͳVetIS¡£
https://www.bleepingcomputer.com/news/security/ukraine-s-it-army-is-disrupting-russias-alcohol-distribution/
5¡¢ÃÀ¹úNIST°ä²¼¹ØÓÚÖÎÀí¹©¸øÁ´·çÏÕµÄÍøÂ簲ȫָÄÏ
5ÔÂ5ÈÕ£¬ÃÀ¹ú¹ú¶È³ß¶ÈÓë¼¼Êõ×êÑÐÔº(NIST)°ä²¼Á˹ØÓÚÖÎÀí¹©¸øÁ´·çÏÕµÄÍøÂ簲ȫָÄÏ¡£¸ÃÖ¸ÄÏ×ܹ²326Ò³£¬ÄÚÈÝ´ÓÆÀ¹À±í¹ú¶ÔÈí¼þºÍ²úÆ·¿ª·¢µÄ½ÚÔ죬µ½Ê¹ÓÃ±í²¿IT·þÎñÌṩÉÌÓйصķçÏÕ£¬Îª¼ø±ðºÍÓ¦¶Ô¹©¸øÁ´µÄÍþвÌṩÁìµ¼¡£NIST×êÑÐÈËÔ±³Æ£¬×éÖ¯±ØÒª±£ÕÏËûÃDzɰìºÍʹÓÃµÄÆ÷²ÄÊÇÖµµÃÐÅÈεģ¬ÕâÒ»Ö¸ÄÏÄܹ»Ô®ÊÔìäÏàʶҪ°ÑÎÈÄÄЩ·çÏÕÒÔ¼°²ÉÈ¡ÄÄЩÐж¯À´Ó¦¶Ô¡£ÓÉÓÚÖ¸Äϵij¤¶ÈºÍ¸´ÔÓÐÔ£¬NIST´òËã°ä²¼¼±¾çÈëÃÅÖ¸ÄÏ£¬ÒÔÔ®ÊÖ¸ÕÆðÍ·½øÐй©¸øÁ´·çÏÕÖÎÀíµÄ×éÖ¯¡£
https://thehackernews.com/2022/05/nist-releases-updated-guidance-for.html
6¡¢TrendMicro°ä²¼¶ñÒâÈí¼þ¿ò¼ÜNetDookaµÄ·ÖÎö»ã±¨
TrendMicroÔÚ5ÔÂ5ÈÕ°ä²¼Á˹ØÓÚжñÒâÈí¼þ¿ò¼ÜNetDookaµÄ·ÖÎö»ã±¨¡£NetDookaͨ¹ýPrivateLoaderµÄPPI£¨°´×°Öø¶·Ñ£©·þÎñ·Ö·¢£¬ÓµÓмÓÔØ·¨Ê½¡¢¿ªÊÍ·¨Ê½¡¢±£»¤Çý¶¯·¨Ê½²¢ÒÀÀµÓÚ×Ô½çËµÍøÂçͨѶºÍ̸¡£¸ÃRATͨ¹ýTCP½Ó¹ÜºÅÁ²¢ÓµÓжàÖÖÖ°ÄÜ£¬ÀýÈçÖ´ÐÐÎļþ²Ù×÷¡¢¼Í¼¼üÅÌ»÷¼ü¡¢Ö´ÐÐshellºÅÁʹÓÃÖ÷»ú×ÊÔ´½øÐÐDDoS¹¥»÷»òÖ´ÐÐÔ¶³Ì×ÀÃæ²Ù×÷µÈ¡£×êÑÐÈËÔ±°µÊ¾£¬¹ÌÈ»¸Ã¹¤¾ßÈÔ´¦ÓÚÔçÆÚ¿ª·¢½×¶Î£¬µ«ËüÒѾ¼«¶È׳´ó¡£
https://www.trendmicro.com/en_us/research/22/e/netdooka-framework-distributed-via-privateloader-ppi.html


¾©¹«Íø°²±¸11010802024551ºÅ