Cisco³ÆÆä²¿·Ö²úÆ·ÒòSnortÖеÄÎó²îÒ×ÊÜDoS¹¥»÷£»£»Spirit AirlinesѬȾNefilim£¬£¬£¬£¬£¬Ð¹Â¶Áè¼Ý40GBÊý¾Ý

Ðû²¼Ê±¼ä 2021-03-08

1.Cisco³ÆÆä²¿·Ö²úÆ·ÒòSnortÖеÄÎó²îÒ×ÊÜDoS¹¥»÷


1.jpg


Cisco³ÆÆä²¿·Ö²úÆ·ÒòSnort¼ì²âÒýÇæÖеÄÎó²îÒ×ÊÜDoS¹¥»÷¡£¡£¡£¡£¸ÃÎó²îλÓÚSnort¼ì²âÒýÇæµÄÒÔÌ«ÍøÖ¡½âÂëÆ÷ÖУ¬£¬£¬£¬£¬±»×·×ÙΪCVE-2021-1285£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ7.4¡£¡£¡£¡£¸ÃÎó²îÊǶÔÒÔÌ«ÍøÖ¡µÄ¹ýʧ״̬´¦Öóͷ£²»×¼È·ËùÖ£¬£¬£¬£¬£¬Î´ÂÄÀúÖ¤µÄ¹¥»÷Õß¿ÉÒÔÏòÄ¿µÄ×°±¸·¢ËͶñÒâÒÔÌ«ÍøÖ¡À´Ê¹ÓôËÎó²î¡£¡£¡£¡£ÀÖ³ÉʹÓøÃÎó²î¿ÉÒԺľ¡Ä¿µÄÉè±¹ØÁ¬Ä´ÅÅ̿ռ䣬£¬£¬£¬£¬µ¼ÖÂÖÎÀíÔ±ÎÞ·¨µÇ¼µ½¸Ã×°±¸»ò¸Ã×°±¸ÎÞ·¨×¼È·Æô¶¯¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/115341/security/cisco-products-dos-snort-issue.html


2.Spirit AirlinesѬȾNefilim£¬£¬£¬£¬£¬Ð¹Â¶Áè¼Ý40GBÊý¾Ý


2.jpg


Spirit AirlinesѬȾNefilim£¬£¬£¬£¬£¬Ð¹Â¶Áè¼Ý40GBÊý¾ÝºÍÁè¼Ý33000¸öÎļþ¡£¡£¡£¡£ÔçÔÚ2017Ä꣬£¬£¬£¬£¬Spirit AirlinesÊ״α¬·¢Êý¾Ýй¶£¬£¬£¬£¬£¬ºÚ¿Í´Ó¸Ãº½¿Õ¹«Ë¾µÄITϵͳÇÔÈ¡ÁËÁè¼Ý1170Íò¸öÕÊ»§ÐÅÏ¢¡£¡£¡£¡£Ê±¸ôËÄÄê¸Ã¹«Ë¾Ôٴα¬·¢Á˸üÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬Ð¹Â¶ÁËÓû§¹ºÖûúƱµÄÉúÒâµÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬ÀýÈçÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢ÉúÒâºÅ¡¢¹ºÆ±µÄʱ¼äºÍÈÕÆÚ¡¢¼ÛÇ®¡¢Ë°½ðÒÔ¼°ÐÅÓÿ¨ÐÅÏ¢µÈ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¸Ã¹«Ë¾²¢Î´Ðû²¼Óйش˴ÎÊÂÎñµÄÐÅÏ¢¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.suspectfile.com/florida-compagnia-aerea-spirit-airlines-nuovamente-colpita-da-un-data-breach/


3.Ñо¿Ö°Ô±·¢Ã÷REvilµÄ¹¥»÷»î¶¯£¬£¬£¬£¬£¬Ê¹ÓÃVOIPºÍDDoS¹¥»÷


3.jpg


ÃûΪ3xp0rtµÄÑо¿Ö°Ô±·¢Ã÷REvilµÄ¹¥»÷»î¶¯£¬£¬£¬£¬£¬×îÏÈʹÓÃVOIPºÍDDoS¹¥»÷¡£¡£¡£¡£REvilÊÇÒ»ÖÖÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©£¬£¬£¬£¬£¬ÆäÐÂÕ½ÂÔÖаüÀ¨Ê¹ÓÃÓïÒô¼ÓÃÜVOIPµç»°£¬£¬£¬£¬£¬ÏòýÌåºÍÊܺ¦ÕßÌṩÓйع¥»÷µÄÐÅÏ¢¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¸ÃÍŻﻹÌṩÁ˸¶·ÑµÄ¹¥»÷ЧÀÍ£¬£¬£¬£¬£¬¿ÉÒÔ¶ÔÄ¿µÄ¹«Ë¾¾ÙÐÐLayer 3ºÍLayer 7µÄDDoS¹¥»÷¡£¡£¡£¡£ÆäÖÐLayer 3µÄ¹¥»÷ͨ³£ÓÃÓÚ¶Ï¿ª¹«Ë¾µÄInternetÅþÁ¬£¬£¬£¬£¬£¬Layer 7µÄ¹¥»÷ÓÃÀ´¹Ø±ÕÄ¿µÄ¹«Ë¾¿É¹ûÕæ»á¼ûµÄÓ¦ÓóÌÐò£¬£¬£¬£¬£¬ÀýÈçWebЧÀÍÆ÷¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/ransomware-gang-plans-to-call-victims-business-partners-about-attacks/


4.Õë¶ÔCPUµÄÐÂÐͲàÐŵÀ¹¥»÷¿Éй¶¼ÓÃÜÃÜÔ¿µÈÐÅÏ¢


4.jpg


ÒÁÀûŵÒÁ´óѧµÄÑо¿ÍŶӷ¢Ã÷Õë¶ÔCPUÄÚ²¿¼Ü¹¹µÄÐÂÐͲàÐŵÀ¹¥»÷¡£¡£¡£¡£ÒÑÍùµÄ²àÐŵÀ¹¥»÷Ö÷Òª¹Ø×¢µÄÊÇCPUζȡ¢µçÉÈÔëÒô¡¢´«Êä¹ýʧ£¬£¬£¬£¬£¬ÒÔ¼°CPUµÄÄÚ²¿»º´æÏµÍ³½á¹¹£¬£¬£¬£¬£¬¶ø´Ë´Î¹¥»÷Ñо¿ÁËÉÐδʹÓõĶàºËCPUµÄÒ»²¿·Ö£¬£¬£¬£¬£¬¼´»·Ðλ¥Á¬£¨ring interconnect£©£¬£¬£¬£¬£¬Ò²³ÆÎª»·ÐÎ×ÜÏß¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬ÓÉÓÚ´ËÀ๥»÷²»ÒÀÀµÓÚ¹²ÏíÄÚ´æ¡¢»º´æ¼¯¡¢½¹µã×ÊÔ´»òÈκÎÌØ¶¨µÄ·Ç½¹µã½á¹¹£¬£¬£¬£¬£¬Òò´ËʹÓÃÏÖÓеIJàÐŵÀ·ÀÓù·½·¨ºÜÄѾÙÐлº½â¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://therecord.media/new-side-channel-attack-targets-the-cpu-ring-bus-for-the-first-time/


5.ZimperiumÐû²¼ÓйØÒƶ¯Ó¦ÓÃÊý¾Ýй¶µÄÆÊÎö±¨¸æ


5.jpg


ZimperiumÐû²¼ÁËÓйØÒƶ¯Ó¦ÓÃÊý¾Ýй¶µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¸Ã±¨¸æÆÊÎöÁËÖ÷ÒªÒÆ¶¯²Ù×÷ϵͳ£¨iOSºÍAndroid£©µÄÓ¦Ó㬣¬£¬£¬£¬Õë¶ÔËĸöÔÆ´æ´¢Ð§ÀÍ£ºÑÇÂíÑ·AWS¡¢Î¢ÈíAzure¡¢¹È¸èStorageºÍFirebase¡£¡£¡£¡£Ñо¿·¢Ã÷£¬£¬£¬£¬£¬ÓÐ14£¥µÄʹÓÃÔÆ´æ´¢µÄÒÆ¶¯Ó¦ÓóÌÐò±£´æÉèÖÃÎÊÌ⣬£¬£¬£¬£¬¿Éй¶PII£¨Ò½ÁÆÓ¦ÓúÍÉ罻ýÌåÓ¦Óõȣ©¡¢µ¼ÖÂڲƭ»î¶¯£¨²Æ²ú500Ç¿ÊÖ»úÇ®°üºÍ½»Í¨Ó¦Óõȣ©¡¢Ì»Â¶IPºÍÄÚ²¿ÏµÍ³ÉèÖã¨ÐÂÎÅЧÀͺͻú³¡Ð§À͵ȣ©¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄÐÐÒµÖ÷ÒªÊÇÉÌÒµ¡¢¹ºÎï¡¢Éç½»¡¢Í¨Ñ¶ºÍ¹¤¾ßÐÐÒµ¡£¡£¡£¡£ 


Ô­ÎÄÁ´½Ó£º

https://blog.zimperium.com/unsecured-cloud-configurations-exposing-information-in-thousands-of-mobile-apps/


6.Ó¢ÌØ¶ûÐû²¼2020Äê²úÆ·Çå¾²ÐÔµÄÆÊÎö±¨¸æ


6.jpg


Ó¢ÌØ¶ûÐû²¼ÁË2020Äê²úÆ·Çå¾²ÐÔµÄÆÊÎö±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬ÔÚ2020ÄêÅû¶µÄ231¸öÎó²îÖУ¬£¬£¬£¬£¬ÓÐ109¸ö(47%)ÊÇÓÉÓ¢ÌØ¶ûÔ±¹¤Í¨¹ýÇå¾²Ñо¿·¢Ã÷µÄ£¬£¬£¬£¬£¬¶ø¼ÓÈëÎó²îÉͽðÍýÏëµÄÍⲿÑо¿Ö°Ô±±¨¸æÁË105¸öÎó²î£¨45£¥£©¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÓÉÍⲿ·¢Ã÷µÄ´ó²¿·ÖÎó²î¶¼±£´æÓÚÔÚÈí¼þÖУ¬£¬£¬£¬£¬Ö÷ÒªÔÚÓÃÓÚͼÐΡ¢ÍøÂçºÍÀ¶ÑÀ×é¼þµÄÈí¼þÊÊÓóÌÐòºÍÈí¼þÇý¶¯³ÌÐòÖС£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬Çý¶¯³ÌÐòºÍÆäËûÈí¼þ×é¼þÖеÄÎó²î×î¶à£¬£¬£¬£¬£¬Îª93¸ö£»£»Æä´ÎΪ¹Ì¼þ£¬£¬£¬£¬£¬±£´æ66¸öÎó²î£»£»¶øÓÐ58¸öÎó²îÓ°Ïìµ½¹Ì¼þºÍÈí¼þµÄ×éºÏ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blogs.intel.com/technology/2021/03/ipas-intel-2020-product-security-report/#gs.vg4enn