DoorDashÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬½ü500ÍòÓû§ÐÅϢй¶£»£»£»£»£»Å·Ö޿տ͹«Ë¾ÔÚÒÑÍù12¸öÔÂÄÚÔâµ½4´ÎÖØ´óÍøÂç¹¥»÷
Ðû²¼Ê±¼ä 2019-09-27
ËͲÍЧÀÍDoorDashÐû²¼ÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬µ¼Ö½ü500ÍòÏûºÄÕß¡¢ËͲÍÔ±¼°²Í¹ÝÉÌÈ˵ÄСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£Æ¾Ö¤ÆäÍøÕ¾ÉÏÐû²¼µÄÇ徲֪ͨ£¬£¬£¬£¬Î´ÊÚȨµÄµÚÈý·½ÔÚ2019Äê5ÔÂ4ÈÕ»ñµÃÁË¸ÃÆ½Ì¨Óû§Êý¾ÝµÄ»á¼ûȨÏÞ£¬£¬£¬£¬ÊÜÓ°ÏìµÄÓû§½ö°üÀ¨ÔÚ2018Äê4ÔÂ5ÈÕǰע²á¸Ãƽ̨µÄÓû§¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢ËÍ»õµØµã¡¢µç»°ºÅÂëºÍ¹þÏ£ÃÜÂëÒÔ¼°ÒøÐп¨ºóËÄλºÍ½ü10ÍòËͲÍÔ±µÄ¼ÝÕÕºÅÂëµÈ¡£¡£¡£¡£¡£DoorDashÇ¿µ÷ûÓÐÍêÕûµÄÐÅÓÿ¨ÐÅÏ¢»òÍêÕûµÄÒøÐп¨ÕË»§ºÅÂëй¶¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢µÄÔµ¹ÊÔÓÉÉв»ÇåÎú£¬£¬£¬£¬µ«DoorDashÌåÏÖÓëµÚÈý·½Ð§ÀÍÌṩÉÌÓйء£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/doordash-data-breach-impacts-personal-data-of-almost-5m-users/148724/2.ÎÖ´ï·áÒÆ¶¯Ó¦Óñ£´æÎó²îµ¼Ö²¿·Ö¿Í»§ÐÅϢй¶
ÐÂÎ÷À¼ÎÖ´ï·áµÄÒÆ¶¯appÔÚÖÜÈýÔçÉϵÄһС¶Îʱ¼äÄÚ·ºÆðÎó²î£¬£¬£¬£¬µ¼Ö¿ͻ§¿ÉÒÔ¿´µ½ÆäËû¿Í»§µÄÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¸ÃappÖ¼ÔÚÖÎÀíÓû§µÄÎÖ´ï·áÕÊ»§£¬£¬£¬£¬²¢Ìṩ¶ÔÕ˵¥»ò¿ÉÓÃЧÀ͵ĿìËÙ»á¼û¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ö¤ÊµÁËÕâÒ»ÊÂÎñ£¬£¬£¬£¬³ÆÕâÊÇÓÉÓÚÍýÏëÄÚµÄÓ¦ÓÃÉý¼¶Àú³Ì·ºÆð¹ýʧµ¼Öµģ¬£¬£¬£¬Ê¹µÃÓû§¹ýʧµØµÇ¼µ½ÆäËûÈ˵ÄÕË»§¡£¡£¡£¡£¡£¸ÃÎÊÌⲢδһÁ¬ºÜ³¤Ê±¼ä£¬£¬£¬£¬ÎÖ´ï·áÔÚ15·ÖÖÓºó¾Í»Ø¹öÁËÕâÒ»Éý¼¶¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÓм¸¶àÓû§µÄСÎÒ˽¼ÒÐÅÏ¢Òò´Ë¶ø¹ûÕæ£¬£¬£¬£¬ÎÖ´ï·áÌåÏÖÕýÔÚ½ôÆÈÆÀ¹ÀÊÜÓ°ÏìµÄÈËÊý¼°Ï¸½Ú£¬£¬£¬£¬²¢È·¶¨Í¨ÖªÕâЩ¿Í»§ÐèÒª½ÓÄɵİ취¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/vodafones-mobile-app-briefly-exposed-customer-information/3.iOS 13ºÍiPadOSÎó²î¿Éµ¼ÖµÚÈý·½¼üÅÌ»ñÈ¡ÍêÈ«»á¼ûȨÏÞ
Æ»¹û¹Ù·½Ðû²¼ÁËÒ»·ÝеÄÖ§³ÖÎĵµ£¬£¬£¬£¬ÖÒÑÔÓû§ÓйØiOS 13ºÍiPadOSµÚÈý·½¼üÅ̱£´æµÄÇå¾²Îó²î¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬Ò»Ð©µÚÈý·½¼üÅÌÈí¼þ×ÝȻδ±»Åú×¼ÍêÈ«»á¼ûȨÏÞÒ²¿ÉÄÜ»áÓÉÓÚiOS 13ºÍiPadOSÖеÄÎó²î¶ø±»ÊÚÓèÍêÈ«»á¼ûȨÏÞ¡£¡£¡£¡£¡£ÕâÒ»ÎÊÌâÓ°ÏìÁËiPhone¡¢iPad»òiPod touch×°ÖõļüÅÌ£¬£¬£¬£¬µ«²»Ó°ÏìÆ»¹ûµÄÄÚÖüüÅÌ£¬£¬£¬£¬Ò²²»»áÓ°ÏìδʹÓÃÍêÈ«»á¼ûȨÏ޵ĵÚÈý·½¼üÅÌ£¬£¬£¬£¬Æ»¹û½«ÔÚ¼´½«µ½À´µÄÈí¼þ¸üÐÂÖÐÐÞ¸´´ËÎó²î¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/bug-granting-full-access-keyboards/148638/4.Å·Ö޿տ͹«Ë¾ÔÚÒÑÍù12¸öÔÂÄÚÔâµ½4´ÎÖØ´óÍøÂç¹¥»÷
ƾ֤·¨ÐÂÉ籨µÀ£¬£¬£¬£¬Å·ÖÞ¿ÕÖпͳµ¹«Ë¾ÔÚÒÑÍù12¸öÔÂÖÐÖÁÉÙÔâµ½4´ÎÖØ´óÍøÂç¹¥»÷¡£¡£¡£¡£¡£2019ÄêÍ·£¬£¬£¬£¬¿Õ¿ÍÐû³ÆÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÁ˸ù«Ë¾µÄ¡°ÉÌÓú½ÐÐÓªÒµ¡±ÏµÍ³²¢»ñµÃÁ˲¿·ÖÔ±¹¤Òþ˽ÐÅÏ¢µÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£·¨ÐÂÉ籨µÀ³Æ¸ÃÊÂÎñÊÇÈ¥Äê¾ÙÐеÄÒ»Ïî¸ü´ó¹æÄ£Ðж¯µÄÒ»²¿·Ö¡£¡£¡£¡£¡£ÔÚÕâһϵÁй©Ó¦Á´¹¥»÷ÖУ¬£¬£¬£¬¹¥»÷Õß»¹Õë¶ÔÁËÓ¢¹ú·¢ÄîÍ·ÖÆÔìÉÌRolls-RoyceºÍ·¨¹úÊÖÒÕ×Éѯ¹«Ë¾¼°¹©Ó¦ÉÌExpleo£¬£¬£¬£¬ÒÔ¼°ÁíÍâÁ½¼Ò·¨¹ú¿Õ¿Í³Ð°üÉÌ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/91744/hacking/airbus-suppliers-attacks.html
5.¼ÓÄôóÍøÂçÇå¾²ÖÐÐÄÖÒÑÔÀÕË÷Èí¼þTFlowerµÄбäÌå
¼ÓÄôóÍøÂçÇå¾²ÖÐÐÄ£¨CCCS£©Ðû²¼ÓйØÀÕË÷Èí¼þTFlowerбäÖֵĹ¥»÷»î¶¯µÄ¾¯±¨¡£¡£¡£¡£¡£¸Ã±äÖÖÓÚ7ÔÂ30ÈÕ±»·¢Ã÷£¬£¬£¬£¬Ö÷Ҫͨ¹ýδ´ò²¹¶¡µÄÔ¶³Ì×ÀÃæÐ§ÀÍÈö²¥£¬£¬£¬£¬µ«Ò²¿ÉÄÜͨ¹ýÀ¬»øÓʼþ¡¢ÓÕÆÐÔÏÂÔØ¡¢½©Ê¬ÍøÂç¡¢¶ñÒâ¹ã¸æ¡¢web×¢Èë¡¢Ðéα¸üлòÊÜѬȾµÄ×°ÖðüÈö²¥¡£¡£¡£¡£¡£ÔÚѬȾϵͳºó£¬£¬£¬£¬¸Ã±äÖÖ»áʵÑéͨ¹ýPowerShell Empire¡¢PSExecµÈ¹¤¾ßÔÚÍøÂçÉϺáÏòÒÆ¶¯¡£¡£¡£¡£¡£¸Ã±äÖÖ»áÏÈÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬£¬È»ºóɾ³ý¾íÓ°¸±±¾²¢½ûÓÃwin10ÖеĻָ´¹¦Ð§£¬£¬£¬£¬×îºóÐÞ¸Ä×¢²á±íÀ´»ñÈ¡³¤ÆÚÐÔ¼°¼ÓÃÜÓû§µÄÎļþ¡£¡£¡£¡£¡£CCCS½¨ÒéϵͳËùÓÐÕßÁ¬Ã¦Ó¦ÓÃ×îеÄÇå¾²²¹¶¡²¢ÔÚ»á¼ûÓʼþÖеÄÁ´½Ó»ò·¿ª¸½¼þʱ¼á³ÖСÐÄ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://cyber.gc.ca/en/alerts/tflower-ransomware-campaign
6.EmsisoftÐû²¼ÀÕË÷Èí¼þWannaCryFakeµÄ½âÃܹ¤¾ß
EmsisoftÑо¿Ö°Ô±Ðû²¼ÀÕË÷Èí¼þWannaCryFakeµÄÃ⺬»ìÃܹ¤¾ß¡£¡£¡£¡£¡£WannaCryFakeÊÇÒ»¿îʹÓÃAES-256¼ÓÃÜÊܺ¦ÕßÎļþµÄÀÕË÷Èí¼þ£¬£¬£¬£¬¸ÃÀÕË÷Èí¼þ»áÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.[<id>][recoverydata54@protonmail.com].WannaCryÀ©Õ¹Ãû¡£¡£¡£¡£¡£Æ¾Ö¤¹¥»÷ÕßµÄ˵·¨£¬£¬£¬£¬Êê½ðµÄ¼ÛÇ®ÓëÁªÏµËûÃǵÄËÙÂÊÓйأ¬£¬£¬£¬µ«Ñо¿Ö°Ô±ÌåÏÖÔÚÈκÎÇéÐÎ϶¼²»Ó¦¸ÃʵÑéÁªÏµ¹¥»÷Õß¡£¡£¡£¡£¡£¸Ã½âÃÜÆ÷¿É´ÓEmsisoft¹ÙÍøÉÏÏÂÔØ»ñµÃ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/91715/malware/wannacryfake-ransomware-decryptor.html


¾©¹«Íø°²±¸11010802024551ºÅ