IntelÇý¶¯·¨Ê½Bugµ¼ÖÂʹÓÃDirectXµÄWindowsÀûÓñÀÀ£
°ä²¼¹¦·ò 2023-02-13
¾ÝýÌå2ÔÂ10ÈÕ±¨Â·£¬Î¢Èí°µÊ¾ÔÚ×°ÖÃ2022Äê11ÔÂÀÛ»ý¸üкó£¬WindowsϵͳÉÏʹÓÃDirectXµÄÀûÓ÷¨Ê½»á²úÉú±ÀÀ£¡£ÊÜÓ°ÏìÓû§»á´ÓʹÓÃDirectXµÄÀûÓ÷¨Ê½Öп´µ½apphelp.dllÃýÎó£¨ÀûÓ÷¨Ê½¼æÈÝÐÔ¿Í»§¶Ë¿â£©£¬ÔÒòÊÇÓ¢ÌØ¶ûGPUÇý¶¯·¨Ê½ÒѾ¹ýÆÚ¡£Î¢ÈíÔÚÖÂÁ¦½¨¸´Õâ¸öÐÂÎÊÌ⣬²¢»áÔÚ¼´½«°ä²¼µÄ°æ±¾ÖÐÌṩ¸üС£ÔÚ´Ë֮ǰ£¬ÊÜÓ°ÏìµÄÓû§Äܹ»Í¨¹ý½«Intel GPUÇý¶¯·¨Ê½¸üе½×îаæÕý±¾ÁÙʱ½â¾öÕâ¸öÎÊÌâ¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-says-intel-driver-bug-crashes-apps-on-windows-pcs/
2¡¢Ó²¼þÔì×÷ÉÌA10 NetworksÔâµ½ÀÕË÷ÍÅ»ïPlayµÄ¹¥»÷
ýÌåÓÚ2ÔÂ10ÈÕ±¨Â·£¬¼ÓÀû¸£ÄáÑǵÄÍøÂçÓ²¼þÔì×÷ÉÌA10 NetworksÔâµ½ÁËÀÕË÷ÍÅ»ïPlayµÄ¹¥»÷¡£ÊÂÎñ²úÉúÔÚ2023Äê1ÔÂ23ÈÕ£¬µ÷²éÈ·¶¨¹¥»÷ÕßÉè·¨»ñµÃÁ˶Թ²ÏíÇý¶¯Æ÷µÄ½Ó¼ûȨÏÞ£¬×°ÖÃÁ˶ñÒâÈí¼þ£¬²¢ÇÔÈ¡ÁËÓëÈËÁ¦×ÊÔ´¡¢²ÆÕþºÍ˾·¨Ö°ÄÜÓйصÄÊý¾Ý¡£Ä¿Ç°£¬¸Ã¹«Ë¾¹À¼Æ´ËÊÂÎñ²»»á¶ÔÆäÔËÓª²úÉú³Á´óÓ°Ïì¡£PlayÓÚ2ÔÂ9ÈÕ½«A10 NetworksÔö³¤µ½ÆäÍøÕ¾£¬²¢ÍþвҪÔÚ2ÔÂ12ÈÕ¹«¿ªÇÔÈ¡µÄÎļþ¡£
https://www.bleepingcomputer.com/news/security/a10-networks-confirms-data-breach-after-play-ransomware-attack/
3¡¢ÓòÃû×¢²áÉÌNamecheapµÄÓʼþÕÊ»§±»ºÚ·¢ËÍ´óÁ¿´¹µöÓʼþ
ýÌå2ÔÂ12Èճƣ¬ÓòÃû×¢²áÉÌNamecheapµÄÓʼþÕÊ»§ÔÚÖÜÈÕÍíÉÏÔâµ½¹¥»÷£¬·¢ËÍ´óÁ¿Ö¼ÔÚÇÔÈ¡ÊÕ¼þÈ˵ÄÐÅÏ¢ºÍ¼ÓÃÜÇ®±ÒÇ®°üµÄ´¹µöÓʼþ¡£´¹µö»î¶¯ÆðÍ·ÓÚ4:30 PM ET×óÓÒ£¬Ô´ÓÚNamecheapÓÃÀ´·¢ËÍÐø¶©Í¨ÖªºÍÓªÏúÓʼþµÄµç×ÓÓʼþƽ̨SendGrid¡£ÕâЩ´¹µöÓʼþ¼ÙÒâDHL»òMetaMask£¬ÆäÖÐDHLµÄÓʼþ¼Ù×°³ÉʵÏÖ°ü¹üµÝËÍËùÐèµÄµÝËÍ·ÑÕ˵¥£¬MetaMaskµÄÓʼþÔò¼Ù×°ÊDZØÐëµÄKYCÑéÖ¤¡£
https://www.bleepingcomputer.com/news/security/namecheaps-email-hacked-to-send-metamask-dhl-phishing-emails/
4¡¢¼ÓÀû¸£ÄáÑÇÖݶà¸öÒ½ÁÆ×éÖ¯Êý¾Ýй¶ӰÏìÔ¼330Íò»¼Õß
¾Ý2ÔÂ11ÈÕ±¨Â·£¬¼ÓÀû¸£ÄáÑÇHeritage Provider NetworkÖеĶà¸öÒ½ÁÆ×éÖ¯Ôâµ½ÀÕË÷¹¥»÷£¬Ð¹Â¶3300638Ãû»¼ÕßµÄÐÅÏ¢¡£ÊÜÓ°Ïì×éÖ¯Ô̺¬Regal Medical GroupºÍLakeside Medical OrganizationµÈ¡£¹¥»÷²úÉúÔÚ2022Äê12ÔÂ1ÈÕ£¬RegalÔÚ12ÔÂ2ÈÕ·¢ÏÖ²¿ÃÅ·þÎñÆ÷ÎÞ·¨½Ó¼û£¬¾µ÷²éÈ·¶¨ÕâЩ·þÎñÆ÷ϰȾÁ˶ñÒâÈí¼þ¡£RegalÔÚ֪ͨÊÜÓ°ÏìÓû§£¬²¢½«ÎªÆäÌṩΪÆÚÒ»ÄêµÄNorton LifeLockÃâ·ÑÐÅÓþ¼à¿Ø¡£
https://www.theregister.com/2023/02/11/ransomware_regal_medical_group/
5¡¢OtorioÅû¶ÎÞÏßIIoTÉ豸ÖÐÓ°Ïì¹Ø¼ü»ù´¡ÉèÊ©µÄ·ì϶
2ÔÂ9ÈÕ±¨Â·³Æ£¬¹¤ÒµÍøÂ簲ȫ¹«Ë¾OtorioÔÚ4¼Ò·ÖÆç¹©¸øÉ̵ÄÎÞÏß¹¤ÒµÎïÁªÍø(IIoT)É豸Öз¢ÏÖÁË38¸ö·ì϶¡£¹¥»÷ÕßÄܹ»ÀûÓÃÕâЩ·ì϶»ñµÃ¶ÔÄÚ²¿OTϵͳµÄ³õʼ½Ó¼ûȨÏÞ£¬²¢Èƹý°²È«²ã²¢ÈëÇÖÖ¸±êÍøÂ磬ӰÏì¹Ø¼ü»ù´¡ÉèÊ©¡£ÆäÖУ¬ÓÐÈý¸öÓ°ÏìETIC Telecom µÄÔ¶³Ì½Ó¼û·þÎñÆ÷(RAS)µÄ·ì϶£¨CVE-2022-3703¡¢CVE-2022-41607ºÍCVE-2022-40981£©£¬¿ÉÄܱ»ÀûÓÃÀ´ÆëÈ«½ÚÔìÒ×ÊÜÓ°ÏìµÄÉ豸¡£
https://thehackernews.com/2023/02/critical-infrastructure-at-risk-from.html
6¡¢TrendMicro·¢ÏÖÀûÓÃÐéα¹¤×÷Õë¶Ô¶«Å·µØÓòµÄ¹¥»÷»î¶¯
2ÔÂ9ÈÕ£¬Trend MicroÅû¶ÁËÀûÓÃÐéα¹¤×÷»úÓöÕë¶Ô¶«Å·µØÓòµÄ¹¥»÷»î¶¯¡£¸Ã»î¶¯ÖУ¬¹¥»÷ÕßʹÓÃÁ˼¸¸ö¸ß¶È»ìºÏÇÒ¿ª·¢²»¼°µÄ×Ô½ç˵¼ÓÔØ·¨Ê½£¬ÒÔ·½±ãÓÃÇÔÈ¡·¨Ê½EnigmaϰȾÓë¼ÓÃÜÇ®±ÒÐÐÒµÓйصÄÈË¡£¾ÝϤ£¬EnigmaÊÇ¿ªÔ´µÄC#¶ñÒâÈí¼þStealeriumµÄÅú¸Ä°æ±¾¡£³ýÁËÕâЩ¼ÓÔØ·¨Ê½Ö®±í£¬¹¥»÷Õß»¹ÀûÓÃIntelÇý¶¯·¨Ê½·ì϶£¨CVE-2015-2291£©À´¼ÓÔØÖ¼ÔÚ½µµÍMicrosoft DefenderÁîÅÆÆëÈ«ÐԵĶñÒâÇý¶¯·¨Ê½¡£
https://www.trendmicro.com/en_us/research/23/b/enigma-stealer-targets-cryptocurrency-industry-with-fake-jobs.html


¾©¹«Íø°²±¸11010802024551ºÅ