¹È¸è½«Ö§¸¶2950ÍòÃÀÔª½â¾ö¹ØÓÚÓû§µØÎ»¸ú×ÙµÄËßËÏ

°ä²¼¹¦·ò 2023-01-03
1¡¢¹È¸è½«Ö§¸¶2950ÍòÃÀÔª½â¾ö¹ØÓÚÓû§µØÎ»¸ú×ÙµÄËßËÏ

      

¾ÝýÌå1ÔÂ2ÈÕ±¨Â·£¬¹È¸èÒÑÔÞ³ÉÖ§¸¶2950ÍòÃÀÔª£¬ÒÔ½â¾öÓ¡µÚ°²ÄÉÖݺͻªÊ¢¶ÙÌØÇø¹ØÓÚÓû§µØÎ»¸ú×ÙµÄÁ½¸æ×´ËÏ¡£ÕâЩËßËÏÊǶÔ2018ÄêÅû¶µÄÊÂÎñµÄ»ØÓ¦£¬¼´Ö»¹Ü¹Ø¹ØÁ˵ØÎ»º¹Çà¼Í¼ѡÏµ«¸Ã¹«Ë¾ÈÔͨ¹ýÃûΪ¡°Web & App Activity¡±µÄÉèÖóÖÐø¸ú×ÙÓû§ÔÚAndroidºÍiOSÉϵÄÐÐ×Ù¡£Ëü±»ÒªÇóÏò»ªÊ¢¶ÙÌØÇøÖ§¸¶950ÍòÃÀÔª£¬ÏòÓ¡µÚ°²ÄÉÖÝÖ§¸¶2000ÍòÃÀÔª¡£ÉϸöÔ£¬¹È¸è¾ÍÀàËÆÖ¸¿ØÏòÃÀ¹úµÄ40¸öÖÝÖ§¸¶ÁË3.915ÒÚÃÀÔª¡£


https://thehackernews.com/2023/01/google-to-pay-295-million-to-settle.html


2¡¢¼ÓÄôóij¿óÒµ¹«Ë¾Ôâµ½ÀÕË÷¹¥»÷µ¼Ö¹¤³§ÁÙʱ¹Ø¹Ø

      

ýÌå2022Äê12ÔÂ30Èճƣ¬Î»ÓÚ²»Áе߸çÂ×±ÈÑÇÊ¡µÄ¼ÓÄôóͭɽ¿óÒµ¹«Ë¾(CMMC)Ôâµ½ÁËÀÕË÷¹¥»÷¡£CMMCÕ¼µØ18000ӢĶ£¬¾ùÔÈÿÄê³ö²ú1ÒÚ°õÍ­£¬¹À¼Æ¿ó²ú´¢Á¿»¹Äܹ»ÔÙʹÓÃ32Äê¡£¹¥»÷²úÉúÔÚ2022Äê12ÔÂ27ÈÕ£¬CMMC¸ôÀëÁ˱»Ï°È¾µÄϵͳ²¢¹Ø¹ØÆäËüϵͳÀ´È·¶¨ÀÕË÷¹¥»÷µÄÓ°Ïì¡£´Ë±í£¬×÷ΪԤ·À´ëÊ©£¬¹¤³Ìʦ»¹¹Ø¹ØÁ˹¤³§ÒÔÈ·¶¨Æä½ÚÔìϵͳµÄ״̬£¬²¢½«ÆäËü¹¤ÐòתΪÊÖ¶¯²Ù×÷¡£2022Äê10Ôµ×£¬Å·ÖÞ×î´óµÄÍ­³ö²úÉÌAurubisÒ²ÔøÔâµ½ÍøÂç¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/canadian-mining-firm-shuts-down-mill-after-ransomware-attack/


3¡¢FBI¶Ô¼ÓÃÜÇ®±ÒÂòÂôƽ̨3CommasµÄй¶ÊÂÎñ·¢Õ¹µ÷²é

      

¾Ý2022Äê12ÔÂ31ÈÕ±¨Â·£¬Áª¹úµ÷²é¾Ö(FBI)ÒѶÔÕë¶Ô°®É³ÄáÑǼÓÃÜÇ®±ÒÂòÂôƽ̨3CommasÔâµ½µÄ¹¥»÷ÊÂÎñ·¢Õ¹µ÷²é¡£Ä³ÄäÃûTwitterÓû§°ä²¼ÁËÒ»×é¾Ý³Æ´Ó3Commasƽ̨»ñµÃµÄ10000¸öAPIÃÜÔ¿£¬²¢°µÊ¾Æä´òËãÔÚ½ÓÏÂÀ´µÄ¼¸ÌìÖа䲼Æä³ÖÓеÄÈ«Êý100000¸öAPIÃÜÔ¿¡£3Commasµ÷²éÁËй¶µÄÊý¾Ý£¬²¢È·ÈÏÕâЩÎļþÔ̺¬ÓÐЧµÄAPIÃÜÔ¿¡£´Ë±í£¬¸Ãƽ̨·ñ¶¨ÁËÃÜÔ¿ÊÇÓÉÄÚ²¿ÈËÔ±ÏúÊÛµÄ˵·¨¡£¾ÝϤ£¬¹¥»÷²úÉúÔÚ2022Äê12ÔÂÉÏÑ®£¬ºÚ¿Íͨ¹ýAPI»ñµÃÁËÂòÂô·þÎñϵͳµÄ½Ó¼ûȨÏÞ£¬µ«ËûÃÇÈëÇֺͽӼûϵͳµÄ²½ÖèÒÀȻδ֪¡£


https://www.hackread.com/3commas-api-database-leak-anonymous-hacker/


4¡¢×êÑÐÈËÔ±Åû¶Google HomeÖÇÄÜÒôÏä¼àÌýÓû§¶Ô»°µÄ·ì϶ 

      

ýÌå2022Äê12ÔÂ30ÈÕ±¨Â·³Æ£¬×êÑÐÈËÔ±·¢ÏÖÁËGoogle HomeÖÇÄÜÒôÏäÖеķì϶£¬¿É±»ÀûÓÃÀ´×°ÖúóÃŲ¢½«ÆäÔì³ÉÇÔÌýÉ豸¡£¾ÝϤ£¬¸Ã·ì϶ÔÊÐíÎÞÏßÁìÓòÄڵĹ¥»÷ÕßÔÚÉ豸ÉÏ×°ÖÃÒ»¸öºóÃÅÕË»§£¬¶øºóͨ¹ý»¥ÁªÍøÏòÉ豸Զ³Ì·¢ËͺÅÁ½Ó¼ûÆäÂó¿Ë·çÐźÅ£¬²¢ÔÚÖ¸±êµÄ¾ÖÓòÍøÄÚ½øÐÐËÁÒâµÄHTTPÒªÇó¡£ÔÚ·¢³ö´ËÀà¶ñÒâÒªÇóʱ£¬²»½öÄܹ»Â¶³öWi-FiÃÜÂ룬»¹Äܹ»Èù¥»÷ÕßÖ±½Ó½Ó¼ûÏνӵ½Í³Ò»ÍøÂçµÄÆäËüÉ豸¡£¹È¸èÒÑÓÚ2021Äê4Ô·ݽ¨¸´Á˸÷ì϶¡£


https://thehackernews.com/2022/12/researcher-uncovers-potential.html


5¡¢PyTorchÌáÐÑÓû§Ð¶ÔØÓëtorchtriton¿âͬÃûµÄ¶ñÒâÒÀÀµ

      

¾ÝýÌå1ÔÂ2Èճƣ¬PyTorch·¢ÏÖÁËÒ»¸öÓë¸Ã¿ò¼ÜµÄ"torchtriton"¿âͬÃûµÄ¶ñÒâÒÀÀµ£¬Õâµ¼ÖÂÁËͨ¹ýÒÀÀµ¹ØÏµ»ìºÏµÄ¹¥»÷»î¶¯¡£ÓÉÓÚPyPIË÷ÒýÓÅÏÈ£¬Òò¶øÔÚ»ñÈ¡ÒÀÀµÏîʱ£¬PyPIÉϵĶñÒâ¿â»á±»ÓÅÏÈ˼¿¼£¬¶ø²»ÊÇPyTorch-nightly repoÉϰ䲼µÄ¹Ù·½¿â¡£¶ñÒâtorchtriton²»½ö»áÇÔȡָ±êϵͳµÄÖ¸ÎÆÐÅÏ¢£¬»¹»á½øÒ»²½ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£PyTorchÍŶӽ¨Ò飬ÔÚ2022Äê12ÔÂ25ÈÕÖÁ12ÔÂ30ÈÕÆÚ¼ä×°ÖÃÁ˸ÿâµÄnightly buildsµÄÓû§£¬¸Ãµ±¼´Ð¶Ôز¢ÏÂÔØ×îа汾¡£


https://thehackernews.com/2023/01/pytorch-machine-learning-framework.html


6¡¢ÀÕË÷ÍÅ»ïRoyal³ÆÆä°®ºÉ»ªÖÝPBSµç̨Ôâµ½µÄ¹¥»÷ÕÆ¹Ü

      

2022Äê12ÔÂ30ÈÕ±¨Â·³Æ£¬ÀÕË÷ÍÅ»ïRoyal³ÆÆäÊǰ®ºÉ»ªÖÝPBSµçÌ¨ÍøÂç¹¥»÷µÄÄ»ºóºÚÊÖ¡£11ÔÂ20ÈÕÁ賿£¬°®ºÉ»ªÖÝPBS·¢ÏÔìäϵͳÉÏ´æÔÚ¿ÉÒɻ¡£µç̨µÄ½²»°ÈË³ÆÆä·þÎñ²¢Î´Êܵ½Ó°Ï죬µ«ÊǻؾøÌṩÓйظÃÊÂÎñµÄ¸ü¶àÐÅÏ¢£¬ÀíÓÉÊǰ®ºÉ»ªÖݵÄ˾·¨¶ÔÍøÂ簲ȫÐÅÏ¢±£ÃÜ¡£±¾µØ¶à¼ÒýÌ屨·˵£¬ÓÉÓÚÍøÂç¹¥»÷£¬ËüËõ¶ÌÁËÄê¶ÈÇï¼¾³ï¿î³Ðŵ»î¶¯¡£ÉÏÖÜËÄ£¬Royal³Æ¶Ô´ËÊÂÕÆ¹Ü£¬µ«Ã»ÓÐ×¢Ã÷ËûÃÇÇÔÈ¡ÁËÄÄЩÎļþ¡£


https://therecord.media/royal-ransomware-group-claims-it-attacked-iowa-pbs-station/