΢ÈíÐû²¼7Ô·ÝÇå¾²¸üУ¬£¬ £¬£¬£¬ÐÞ¸´9¸ö0dayÔÚÄÚµÄ117¸öÎó²î £»£»Ê±ÉÐÆ·ÅÆGuessÔâµ½DarkSideÀÕË÷¹¥»÷й¶200GBÎļþ

Ðû²¼Ê±¼ä 2021-07-15

1.΢ÈíÐû²¼7Ô·ÝÇå¾²¸üУ¬£¬ £¬£¬£¬ÐÞ¸´9¸ö0dayÔÚÄÚµÄ117¸öÎó²î


1.jpg


΢ÈíÐû²¼ÁË2021Äê7Ô·ݵÄÖܶþ²¹¶¡£¬£¬ £¬£¬£¬ÐÞ¸´Á˰üÀ¨9¸ö0dayÔÚÄÚµÄ117¸öÎó²î¡£¡£¡£¡£¡£ÕâЩÎó²îÖУ¬£¬ £¬£¬£¬44¸öΪԶ³Ì´úÂëÖ´ÐУ¬£¬ £¬£¬£¬32¸öΪÌáȨÎó²î£¬£¬ £¬£¬£¬14¸öΪÐÅϢй¶Îó²î£¬£¬ £¬£¬£¬12¸öΪ¾Ü¾øÐ§ÀÍÎó²î£¬£¬ £¬£¬£¬8¸öΪÇå¾²¹¦Ð§ÈƹýÎó²î£¬£¬ £¬£¬£¬7¸öΪÓÕÆ­Îó²î¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ9¸ö0dayÖУ¬£¬ £¬£¬£¬ÓÐ4¸öÒѱ»ÔÚÔÚҰʹÓ㬣¬ £¬£¬£¬°üÀ¨PrintNightmareÎó²î£¨CVE-2021-34527£©¡¢WindowsÄÚºËÌáȨÎó²î£¨CVE-2021-33771ºÍCVE-2021-31979£©ÒÔ¼°¾ç±¾ÒýÇæÄÚ´æËð»µÎó²î£¨CVE-2021-34448£©¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2021-patch-tuesday-fixes-9-zero-days-117-flaws/


2.SolarWindsÐÞ¸´Serv-UÖÐÒѱ»Ê¹ÓõÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î


2.jpg


SolarWindsÔÚ7ÔÂ9ÈÕÐû²¼µÄServ-U 15.2.3 HF2ÖÐÐÞ¸´ÁËÒ»¸öÒѱ»Ê¹ÓõÄ0day¡£¡£¡£¡£¡£MicrosoftÅû¶ÁËServ-U²úÆ·µÄÔ¶³Ì´úÂëÖ´ÐÐ0day£¨CVE-2021-35211£©£¬£¬ £¬£¬£¬Ô¶³Ì¹¥»÷ÕßʹÓôËÎó²îÄܹ»ÒÔÌØÊâȨÏÞÖ´ÐÐí§Òâ´úÂ룬£¬ £¬£¬£¬ÔÚÄ¿µÄϵͳÉÏ×°Öò¢ÔËÐгÌÐò¡¢Éó²é¡¢¸ü¸Ä»òɾ³ýÊý¾ÝµÈ¡£¡£¡£¡£¡£ÏÖÔÚ¸ÃÎó²îÒѾ­³ö±»Ò°Ê¹Ó㬣¬ £¬£¬£¬µ«SolarWindsÌåÏÖ£¬£¬ £¬£¬£¬ÈôÊÇServ-UÇéÐÎÖÐδÆôÓÃSSH£¬£¬ £¬£¬£¬Ôò¸ÃÎó²î²»±£´æ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/solarwinds-patches-critical-serv-u-vulnerability-exploited-in-the-wild/


3.ʱÉÐÆ·ÅÆGuessÔâµ½DarkSideÀÕË÷¹¥»÷й¶200GBÎļþ


3.jpg


ÃÀ¹úʱÉÐÆ·ÅƺÍÁãÊÛÉÌGuessÔâµ½DarkSideÀÕË÷¹¥»÷й¶200GBÎļþ¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬ £¬£¬£¬¹¥»÷±¬·¢ÔÚ2021Äê2ÔÂ2ÈÕÖÁ2021Äê2ÔÂ23ÈÕ£¬£¬ £¬£¬£¬¸Ã¹«Ë¾ÔÚ6ÔÂ3ÈÕÍê³ÉÊÓ²ìºóÈ·¶¨ÁËÊÜÓ°ÏìµÄ¿Í»§²¢ÓÚ6ÔÂ9ÈÕ½«´ËÊÂÎñ֪ͨ¸øÆä¿Í»§¡£¡£¡£¡£¡£¾­ÊÓ²ìÈ·¶¨£¬£¬ £¬£¬£¬Ð¹Â¶ÐÅÏ¢°üÀ¨Éç»áÇå¾²ºÅÂë¡¢¼ÝÕÕºÅÂë¡¢»¤ÕÕºÅÂëºÍ/»ò²ÆÎñÕʺÅ£¬£¬ £¬£¬£¬Ö»Éæ¼°1300¶àÈË¡£¡£¡£¡£¡£Guess²¢Î´Í¸Â©Óйع¥»÷ÕßµÄÈκÎÐÅÏ¢£¬£¬ £¬£¬£¬¿ÉÊÇDarkSideÔøÔÚ4Ô·ÝÉù³ÆÆä¹¥»÷ÁËGuess²¢ÇÔÈ¡ÁËÁè¼Ý200GBµÄÎļþ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/fashion-retailer-guess-notifies-users-data-breach


4.ºÚ¿Í³öÊÛ6ÒÚLinkedInÓû§ÐÅÏ¢²¢³ÆÐÂÊý¾Ý±È֮ǰµÄ¸üºÃ


4.jpg


ºÚ¿ÍÔÚ°µÍø³öÊÛÁË6ÒÚ¸öLinkedInÓû§µÄÐÅÏ¢£¬£¬ £¬£¬£¬²¢³ÆÕâЩÊý¾ÝÊÇеÄ£¬£¬ £¬£¬£¬±ÈÖ®Ç°ÍøÂçµÄÊý¾Ý¸üºÃ¡£¡£¡£¡£¡£ºÚ¿ÍÐû²¼ÁË632699¸öÓû§ÐÅÏ¢×÷ΪÑù±¾£¬£¬ £¬£¬£¬ÆäÖаüÀ¨ÁËÐÕÃû¡¢ÁìÓ¢ID¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢LinkedInСÎÒ˽¼Ò×ÊÁÏURL¡¢ÆäËûÉ罻ýÌå×ÊÁϵÄÁ´½Ó¡¢ÐԱ𡢳öÉúÈÕÆÚ¡¢ËùÔÚ¡¢Ö°³ÆºÍÆäËûÊÂÇéÏà¹ØÊý¾ÝµÈ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬ £¬£¬£¬ËäÈ»ÕâЩÊý¾Ý²»ÊǺÜÃô¸Ð£¬£¬ £¬£¬£¬µ«¹¥»÷ÕßÈÔÈ»¿ÉÒÔʹÓÃÕâЩÐÅϢͨ¹ýÉç»á¹¤³ÌµÄÒªÁì¿ìËÙµØÕÒµ½Ð¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://cybernews.com/news/threat-actors-scrape-600-million-linkedin-profiles-and-are-selling-the-data-online-again/


5.Ñо¿Ö°Ô±·¢Ã÷TrickBot»ØºÏ²¢ÐÂÔöÓÃÓÚ¼à¿ØµÄVNCÄ£¿£¿£¿é


5.jpg


Ñо¿Ö°Ô±·¢Ã÷TrickBot»ØºÏ²¢ÐÂÔöÁËÓÃÓÚ¼à¿ØºÍÇé±¨ÍøÂçµÄVNCÄ£¿£¿£¿é¡£¡£¡£¡£¡£Trickbot×Ô2016Äêµ×ÒÔÀ´Ò»Ö±»îÔ¾£¬£¬ £¬£¬£¬²¢ÓÚ2020Äê10Ô·ݱ»Î¢ÈíºÍ¶à¸öÇå¾²³§ÉÌÁªºÏµ·»Ù¡£¡£¡£¡£¡£¿ÉÊÇ£¬£¬ £¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÏÖÔÚµÄTrickbot±ÈÒÔÍùÈκÎʱ¼ä¶¼Ô½·¢»îÔ¾£¬£¬ £¬£¬£¬²¢ÓÚ2021Äê5Ô¼ì²âµ½ÁËvncDllÄ£¿£¿£¿éµÄ¸üа汾tvncDll£¬£¬ £¬£¬£¬ÓÃÓÚ¼à¿ØºÍÇé±¨ÍøÂç¡£¡£¡£¡£¡£¸ÃÄ£¿£¿£¿éËÆºõ»¹ÔÚ¿ª·¢ÖУ¬£¬ £¬£¬£¬ÓÉÓÚÓÐÒ»¸öƵÈԵĸüÐÂʱ¼ä±í£¬£¬ £¬£¬£¬À´°´ÆÚÌí¼Óй¦Ð§ºÍÐÞ¸´¹ýʧ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bitdefender.com/blog/labs/trickbot-activity-increases-new-vnc-module-on-the-radar


6.AberdeenºÍcode42ÁªºÏÐû²¼ÓйØÄÚ²¿Î£º¦µÄÆÊÎö±¨¸æ


6.jpg


AberdeenºÍcode42ÁªºÏÐû²¼ÁËÓйØÄÚ²¿Î£º¦µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬ £¬£¬£¬Èý·ÖÖ®Ò»µÄÊý¾Ýй¶ÊÂÎñÉæ¼°ÄÚ²¿Ö°Ô±£¬£¬ £¬£¬£¬¶øÆäÖÐÔ¼80%ÈËÊÇÎÞÒâµÄ £»£»75%µÄ×éÖ¯¶ÔÆäÇéÐÎûÓÐÒ»Ö¡¢¼¯ÖеĿɼûÐÔ £»£»2020Ä꣬£¬ £¬£¬£¬ÔÚÖÕ¶ËÉϱ¬·¢Îó²îµÄ¿ÉÄÜÐÔÊÇЧÀÍÆ÷ÉϵÄ4.5±¶ £»£»Êý¾Ý̻¶й¶µÄƽ¾ùÊýÄ¿ÊÇÿ¸öÓû§ÌìÌì»á±¬·¢13¸öÊý¾Ýй¶ÊÂÎñ £»£»ÄÚ²¿Ö°Ô±Êý¾Ýй¶µÄ±¾Ç®¿ÉÄܸߴ﹫˾ÄêÊÕÈëµÄ20%¡£¡£¡£¡£¡£ 


Ô­ÎÄÁ´½Ó£º

https://www.code42.com/blog/aberdeen-report-key-takeaways/