ÃÀ¹úÄÜÔ´²¿Ðû²¼2019ÄêQ1µçÁ¦ÍøÂç½ôÆÈÇéÐκÍ×ÌÈű¨¸æ£»£»£»£»PrinterLogic´òÓ¡ÖÎÀíÈí¼þ¶à¸öÎó²î£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂRCE

Ðû²¼Ê±¼ä 2019-05-06
1¡¢ÃÀ¹úÄÜÔ´²¿Ðû²¼2019ÄêQ1µçÁ¦ÍøÂç½ôÆÈÇéÐκÍ×ÌÈű¨¸æ

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
ƾ֤ÃÀ¹úÄÜÔ´²¿Ðû²¼µÄ2019ÄêµÚÒ»¼¾¶ÈµçÁ¦ÍøÂç½ôÆÈÇéÐκÍ×ÌÈű¨¸æ£¬£¬£¬£¬£¬£¬3ÔÂ5ÈÕÉÏÎç9:12µ½ÏÂÖç6:57ʱ´ú±±ÃÀµçÍøÔâÓöµ½Ò»¸ö¡°µ¼ÖµçÁ¦ÏµÍ³ÔËÓªÖÐÖ¹µÄÍøÂçÊÂÎñ¡±£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄµØÇø°üÀ¨¼ÓÖݵĿ˶÷ÏØºÍÂåɼí¶ÏØ¡¢ÓÌËûÖݵÄÑκþÏØºÍ»³¶íÃ÷ÖݵĿµ¸¥Ë¹ÏØ¡£¡£Æ¾Ö¤ÃÀ¹úÄÜÔ´²¿µÄ½ç˵£¬£¬£¬£¬£¬£¬¡°ÍøÂçÊÂÎñ¡±ÊÇÖ¸¡°Î´ÊÚȨ»á¼û¡±µ¼ÖµÄÍøÂçÖÐÖ¹£¬£¬£¬£¬£¬£¬µ«Ã»Óиü¶àÐÅÏ¢Åú×¢¸ÃÊÂÎñÊÇÔ¶³ÌºÚ¿Í¹¥»÷ÕվɯóÒµÄÚ²¿µÄ¹¥»÷¡£¡£´ÓÀúÊ·ÉÏ¿´£¬£¬£¬£¬£¬£¬±±ÃÀµçÍø´ÓδÔâµ½ÍøÂç¹¥»÷µ¼ÖÂµÄÆÆËð»òÖÐÖ¹£¬£¬£¬£¬£¬£¬ÈôÊÇÊÂÇéÊôʵ£¬£¬£¬£¬£¬£¬ÕâÒ»ÊÂÎñ¿ÉÄܳÉΪÀúÊ·ÐÔµÄÊÂÎñ¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://blog.avast.com/western-us-power-grid-hit-by-cyber-event

2¡¢ºÚ¿Íͨ¹ý±©Á¦¹¥»÷½ÓÊÜ29¸öIoT DDoS½©Ê¬ÍøÂç

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
ƾ֤ZDNet±¨µÀ£¬£¬£¬£¬£¬£¬ÃûΪSubbyµÄºÚ¿Íͨ¹ý±©Á¦¹¥»÷½ÓÊÜÁË29¸öIoT DDoS½©Ê¬ÍøÂç¡£¡£SubbyʹÓÃÁËÓû§Ãû×ÖµäºÍ³£ÓÃÃÜÂëÁбíÀ´¶ÔÕâ29¸ö½©Ê¬ÍøÂçµÄC&C»ù´¡ÉèÊ©¾ÙÐб©Á¦¹¥»÷£¬£¬£¬£¬£¬£¬ÆäÖÐһЩÉèʩʹÓÃÁ˽ÏÁ¿ÈõµÄƾ֤£¬£¬£¬£¬£¬£¬ÀýÈçroot:root¡¢admin:admin¡¢oof:oofµÈ¡£¡£Æ¾Ö¤SubbyµÄ˵·¨£¬£¬£¬£¬£¬£¬ÕâЩ½©Ê¬ÍøÂç¶¼½ÏÁ¿Ð¡£¡£¬£¬£¬£¬£¬£¬ÏÖʵµÄbot×ÜÊý½öΪ2.5Íò¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/hacker-takes-over-29-iot-botnets/

3¡¢Ñо¿ÍŶÓÖÒÑÔÕë¶ÔOffice 365ÕÊ»§µÄ½ÓÊÜÀ˳±

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
ƾ֤Barracuda NetworksµÄÆÊÎö£¬£¬£¬£¬£¬£¬3Ô·ÝÕë¶ÔÔÆµç×ÓÓÊÏäµÄATO£¨ÕË»§½ÓÊÜ£©¹¥»÷¼¤Ôö£¬£¬£¬£¬£¬£¬½öÔÚÒ»¸öÔÂÄÚ¹¥»÷Õß¾Íͨ¹ýÊýǧ¸öÊÜËðµÄOffice 365 ÕË»§·¢ËÍÁËÁè¼Ý150Íò·âÀ¬»øÓʼþ¡£¡£Ñо¿Ö°Ô±³ÆËùÓеÄÊӲ칤¾ßÖÐÓÐÁè¼Ý1/4£¨29%£©µÄÆóÒµÔâµ½Õë¶ÔOffice 365ÕÊ»§µÄ¹¥»÷£¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷°üÀ¨×²¿â¡¢±©Á¦¹¥»÷µÈ¡£¡£¹¥»÷Õßͨ¹ýÊÜËðÕË»§¾ÙÐÐÐÅÏ¢ÇÔÈ¡¡¢²ÆÎñÊý¾ÝÇÔÈ¡¡¢Éí·Ý͵ÇÔÒÔ¼°BECڲƭµÈ·½·¨»ñµÃÀûÒæ¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/researchers-warn-office-365-1/

4¡¢Ñо¿Ö°Ô±·¢Ã÷100¶à¸öJenkins²å¼þ±£´æÇå¾²Îó²î

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
NCC GroupÇå¾²Ñо¿Ô±Viktor Gazdag·¢Ã÷100¶à¸öJenkins²å¼þ±£´æÇå¾²Îó²î¡£¡£JenkinsÊÇÓÉCloudBeesºÍJenkinsÉçÇøÎ¬»¤µÄ¿ªÔ´×Ô¶¯»¯Ð§ÀÍÆ÷£¬£¬£¬£¬£¬£¬ËüÔÚÈ«ÇòÓµÓÐÁè¼Ý100ÍòÓû§¡£¡£Ò»Ð©Ò×Êܹ¥»÷µÄ²å¼þÊÇÓɵÚÈý·½¿ª·¢µÄ£¬£¬£¬£¬£¬£¬ÓÃÓÚ»á¼ûTwitter¡¢AWSºÍAzureµÈЧÀÍ¡£¡£Ñо¿Ö°Ô±·¢Ã÷µÄ´ó´ó¶¼Îó²î¶¼ÊÇÃ÷ÎÄÃÜÂë´æ´¢¡¢CSRFÎó²î¡¢È±ÉÙȨÏÞ¼ì²éµÈ¡£¡£Jenkins¿ª·¢ÍŶÓÕë¶ÔÕâЩÎó²îÐû²¼ÁËÇ徲ͨ¸æ¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/84910/hacking/jenkins-plugins-flaws.html

5¡¢PrinterLogic´òÓ¡ÖÎÀíÈí¼þ¶à¸öÎó²î£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂRCE

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
PrinterLogic´òÓ¡ÖÎÀíÈí¼þδ׼ȷÑéÖ¤ÆäSSLÖ¤ÊéºÍÈí¼þ¸üаüµÄȪԴºÍÍêÕûÐÔ£¬£¬£¬£¬£¬£¬¿ÉÔÊÐí¹¥»÷ÕßÖØÐÂÉèÖÃÈí¼þ²¢Ô¶³ÌÖ´ÐдúÂ루CVE-2018-5408¡¢CVE-2018-5409£©¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬PrinterLogicδ¶Ôä¯ÀÀÆ÷ÊäÈë¾ÙÐÐÌØÊâ×Ö·û¹ýÂË£¬£¬£¬£¬£¬£¬¿ÉÔÊÐíδ¾­ÊÚȨµÄÔ¶³Ì¹¥»÷Õ߸ü¸ÄÉèÖÃÎļþ£¨CVE-2019-9505£©¡£¡£18.3.1.96¼°Ö®Ç°µÄ°æ±¾Ò×Êܹ¥»÷£¬£¬£¬£¬£¬£¬½¨ÒéÓû§¾¡¿ì¾ÙÐÐÉý¼¶¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.kb.cert.org/vuls/id/169249/

6¡¢½üÒ»°ëµÄÃÀ¹úÆóҵûÓÐΪ¼ÓÖÝÏûºÄÕßÒþ˽·¨°¸×öºÃ×¼±¸

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø
 
ÃÀ¹ú¼ÓÖݵÄÏûºÄÕßÒþ˽·¨°¸£¨CCPA£©½«ÓÚ2020Äê1ÔÂ1ÈÕÉúЧ£¬£¬£¬£¬£¬£¬µ«Ðí¶àÃÀ¹úÆóÒµ²¢Î´¶Ô´Ë×öºÃ×¼±¸¡£¡£Æ¾Ö¤¹ú¼ÊÒþ˽ר¼ÒЭ»á£¨IAPP£©ºÍOneTrustµÄÒ»Ïîµ÷ÑУ¬£¬£¬£¬£¬£¬Ö»ÓÐ55%µÄÆóÒµ³Æ½«ÔÚ1ÔÂ1ÈÕ֮ǰ×öºÃ×¼±¸¡£¡£CCPAÓëGDPRÀàËÆ£¬£¬£¬£¬£¬£¬Í¨¹ý¹æÔò½«Òþ˽µÄ¿ØÖÆÈ¨½»¸øÏûºÄÕߣ¬£¬£¬£¬£¬£¬ÒªÇóÆóÒµÆ¾Ö¤ÍøÂçµÄÊý¾ÝΪÏûºÄÕßÌṩ¡°Õýµ±¡±µÄȨÁ¦¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/nearly-half-of-us-orgs-not-ready-1/