Ħ¸ùÊ¿µ¤ÀûÒòй¶Êý°ÙÍò¿Í»§ÐÅÏ¢Ö§¸¶3500ÍòÃÀÔª·£¿î
°ä²¼¹¦·ò 2022-09-23
¾Ý9ÔÂ21ÈÕ±¨Â·£¬ÃÀ¹ú֤ȯÂòÂôίԱ»á(SEC)°ä·¢£¬Ä¦¸ùÊ¿µ¤Àû£¨Morgan Stanley£©ÒÑÔÞ³ÉÖ§¸¶3500ÍòÃÀÔªµÄ·£¿î¡£SEC³Æ£¬Õâ¼Ò½ðÈÚ·þÎñ¹«Ë¾Î´Äܱ£»¤Ô¼Äª1500Íò¿Í»§µÄÓ×ÎÒÐÅÏ¢¡£´Ó2015ÄêÆðÍ·£¬¸Ã¹«Ë¾ÂÅ´ÎÀñƸһ¼Ò¹«Ë¾À´´¦ÖÃÊýǧ̨±¨·ÏÉ豸¡£È»¶ø£¬Õâ¼Ò¹«Ë¾ÔÚÊý¾ÝÏú»Ù·½ÃæÃ»ÓоÑ飬ÉõÖÁ½«Êýǧ̨É豸ÏúÊÛ¸øµÚÈý·½£¬ÆäÖÐÔ̺¬Á˿ͻ§ÐÅÏ¢µÄÉ豸£¬¶øºóÕâЩÉ豸ÔÚÅÄÂôÍøÕ¾Éϱ»×ªÊÛ¡£¸Ã¹«Ë¾ÊÔͼȡ»ØÕâЩÉ豸£¬µ«ÆäÖоø´óÎÞÊýÎÞ·¨¸´Ô¡£
https://www.securityweek.com/morgan-stanley-pay-35m-fine-exposing-information-millions-customers
2¡¢Windows 11 22H2Ö°Äܸüе¼ÖÂNVIDIA³öÏÖ»úÄÜÎÊÌâ
¾ÝýÌå9ÔÂ22Èճƣ¬±¾ÖÜÔçЩʱ³½°ä²¼µÄWindows 11 22H2Ö°ÄܸüÐÂÔÚ×°ÓÐNVIDIA GPUµÄϵͳÉÏÒýÆðÁËÓÎÏ·»úÄÜÎÊÌâ¡£ÓÉÓÚ×°ÖøøüкóCPUʹÓÃÂÊÏÔÖø½µÂ䣬²¿ÃÅÍæ¼ÒÔÚÍæÓÎϷʱ»á³öÏÖ¿¨¶ÙºÍÑϳÁÖͺó¡£ÓÐȤµÄÊÇ£¬Æ¾¾Ý¶à¸öÓû§µÄ»ã±¨£¬Ôڻعö¸üкó£¬ÓÎÏ·»úÄÜÎÊÌ⽫Òþû¡£¹ÌȻ΢ÈíÉÐδȾָ²¢µ÷²éÕâЩÓû§»ã±¨£¬µ«NVIDIAÖÊÁ¿±£Õϲ¿ÃÅ֤ʵ£¬¸Ã¹«Ë¾ÒѾÒâʶµ½Õâ¸öÎÊÌ⣬²¢ÔÚÌáÐÑÊÜÓ°ÏìµÄRedditÓû§Ìṩ¸ü¶àµÄ·´À¡¡£
https://www.bleepingcomputer.com/news/gaming/windows-11-22h2-causing-gaming-issues-for-some-nvidia-users/
3¡¢ÐÄ»³²»ÂúµÄ¿ª·¢ÈËÔ±ÔÚTwitter¹«¿ªLockbit 3.0¹¹½¨Æ÷
ýÌå9ÔÂ21ÈÕ±¨Â·³Æ£¬ÀÕË÷Èí¼þLockBit×îмÓÃÜÆ÷µÄ¹¹½¨Æ÷ÒѾй¶¡£×êÑÐÈËÔ±3xp0rt³Æ£¬ÐÂ×¢²áµÄTwitterÓû§Ali Qushji°µÊ¾ËûÃǵÄÍŶÓÈëÇÖÁËLockBits·þÎñÆ÷²¢ÕÒµ½ÁËLockBit 3.0µÄ¹¹½¨Æ÷¡£Ö®ºó£¬ÃûΪprotonleaksÒ²¹«¿ªÁ˸ù¹½¨Æ÷µÄ¸±±¾¡£LockBitµÄ´ú±íLockBitSuppÐû³ÆËûÃÇûÓб»ÈëÇÖ£¬¶øÊÇÒ»¸ö¶ÔLockbitµÄ¸¨µ¼²ã¸ÐÓ¦²»ÂúµÄ¿ª·¢ÈËԱй¶Á˹¹½¨Æ÷¡£¸Ã¹¹½¨Æ÷¿É±»ÈκÎÈËÓÃÀ´¼±¾ç¹¹½¨Æô¶¯¹¥»÷ËùÐèµÄ¿ÉÖ´ÐÐÎļþ£¬Ô̺¬¼ÓÃÜÆ÷¡¢½âÃÜÆ÷ºÍÒÔÌØ¶¨·½Ê½Æô¶¯½âÃÜÆ÷µÄרÓù¤¾ß¡£
https://www.bleepingcomputer.com/news/security/lockbit-ransomware-builder-leaked-online-by-angry-developer-/
4¡¢PythonÖÐÒÑ´æÔÚ15ÄêµÄ·ì϶¿ÉÓ°Ï쳬¹ý35Íò¿ªÔ´´æ´¢¿â
Trellix×êÑÐÈËÔ±ÔÚ9ÔÂ21Èճƣ¬PythonÖÐÒÑ´æÔÚ15ÄêµÄ·ì϶¿ÉÄÜ»áÓ°Ï쳬¹ý350000¸ö¿ªÔ´ÏîÄ¿¡£ÕâÊÇÒ»¸öõè¾¶±éÀú·ì϶£¨CVE-2007-4559£¬CVSSÆÀ·Ö6.8£©£¬¿É±»ÓÃÀ´¸²¸ÇËÁÒâÎļþ²¢µ¼Ö´úÂëÖ´ÐУ¬´æÔÚÓÚPython tarfile°üµÄʹÓÃδ´¦ÖõÄtarfile.extract()º¯Êý»òtarfile.extractall()µÄÄÚÖÃĬÈÏÖµµÄ´úÂëÖС£´Ë±í£¬Trellix»¹°ä²¼ÁËÒ»¸öÃûΪCreosoteµÄ×Ô½ç˵ÀûÓã¬ÓÃÓÚɨÃèÒ×ÊÜCVE-2007-4559¹¥»÷µÄÏîÄ¿¡£
https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/tarfile-exploiting-the-world.html
5¡¢MicrosoftÅû¶ÁËÕë¶ÔÓ¡¶ÈµÄAndroid¶ñÒâÈí¼þµÄϸ½Ú
9ÔÂ21ÈÕ£¬MicrosoftÅû¶ÁËÕë¶ÔÓ¡¶ÈµÄAndroid¶ñÒâÈí¼þ·Ö·¢»î¶¯¡£¸Ã»î¶¯Ê¼ÓÚÒ»ÌõÔ̺¬¶ñÒâÁ´½ÓµÄSMSÐÂÎÅ£¬Á´½Ó»áÏÂÔØÒ»¸öαÔìµÄÒøÐмν±ÀûÓ÷¨Ê½¡£ÕâЩαÔìÀûÓõÄC2·þÎñÆ÷ÓëÆäËû75¸ö»ùÓÚ¿ªÔ´µý±¨µÄ¶ñÒâAPKÓйء£¸Ã¶ñÒâÈí¼þÓµÓÐRATÖ°ÄÜ£¬¿ÉÀ¹½Ø³ÁÒªµÄ֪ͨ£¬ÀýÈç´«ÈëÐÂÎÅ£¬ÕâÏÔÈ»ÊÇΪÁË»ñµÃÒøÐкͽðÈÚ»ú¹¹Ê¹ÓõÄ2FAÐÂÎÅ¡£×êÑÐÈËԱǿÁÒ½¨ÒéÓû§²»Öصã»÷¶ÌÐÅ¡¢Óʼþ»òÐÂÎÅÀûÓÃÖÐÊÕµ½µÄδ֪Á´½Ó£¬²¢È·±£ÒøÐÐÀûÓ÷¨Ê½ÊÇ´Ó¹Ù·½ÀûÓ÷¨Ê½É̵êÏÂÔØµÄ¡£
https://www.microsoft.com/security/blog/2022/09/21/rewards-plus-fake-mobile-banking-rewards-apps-lure-users-to-install-info-stealing-rat-on-android-devices/
6¡¢VMware°ä²¼2022°æµÄÄê¶ÈÈ«ÇòÊÂÎñÏìÓ¦Íþв·ÖÎö»ã±¨
¾ÝýÌå9ÔÂ20ÈÕ±¨Â·£¬VMwareÔÚ½üÆÚ°ä²¼ÁË2022°æµÄÄê¶ÈÈ«ÇòÊÂÎñÏìÓ¦Íþв·ÖÎö»ã±¨¡£VMwareÔڻ㱨ÖÐÌá³öÁË8¸öÖØÒª·¢ÏÖ£ººáÏò»î¶¯ÊÇеÄÕ½³¡£»Deepfake¹¥»÷ÃÍÔö13%£¬66%µÄÊÜ·ÃÕßÔÚ´ÓǰһÄêÖÐÄ¿¼ûÁË´ËÀ๥»÷£»65%µÄÊÜ·ÃÕ߳ƶíÎÚÕ½ÕùÒÔÀ´¹¥»÷»î¶¯ÓÐËùÔö³¤£»23%µÄ¹¥»÷Σ¼°API°²È«ÐÔ£»62%µÄÊÜ·ÃÕßÔÚ´ÓǰһÄêÄÚÓöµ½¹ýÁãÈÕ·ì϶£¬±ÈÈ¥ÄêÔö³¤11%£»½ü60%µÄÊÜ·ÃÕßÔÚ´ÓǰһÄêÄÚÔâµ½¹ýÀÕË÷¹¥»÷£»IT×êÑÐÈËÔ¹ØýÔڻػ÷£»IT¾ëµ¡ÂʱÈÈ¥ÄêÂÔÓнµÂ䣬µ«ÒÀÈ»ÊÇÒ»¸ö¹Ø¼üÎÊÌâ¡£
https://www.vmware.com/content/dam/learn/en/amer/fy23/pdf/1553238_Global_Incident_Response_Threat_Report_Weathering_The_Storm.pdf


¾©¹«Íø°²±¸11010802024551ºÅ