ÒÔÉ«ÁÐÐÅÓÿ¨ÏµÍ³ÔâÒÉËÆÒÁÀʺڿÍDDoS¹¥»÷
Ðû²¼Ê±¼ä 2024-11-131. ÒÔÉ«ÁÐÐÅÓÿ¨ÏµÍ³ÔâÒÉËÆÒÁÀʺڿÍDDoS¹¥»÷
11ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬ÒÔÉ«Áи÷µØµÄÐÅÓÿ¨Ë¢¿¨×°±¸Í»·¢¹ÊÕÏ£¬£¬£¬£¬£¬£¬µ¼Ö³¬ÊкͼÓÓÍÕ¾µÄÖ÷¹ËÎÞ·¨¾ÙÐÐÖ§¸¶£¬£¬£¬£¬£¬£¬Ò»Á¬Ô¼Ò»Ð¡Ê±¡£¡£¡£¡£¡£¾Ý¡¶Ò®Â·ÈöÀäÓʱ¨¡·±¨µÀ£¬£¬£¬£¬£¬£¬¹ÊÕÏÔµ¹ÊÔÓÉÊÇÍâµØÖ§¸¶Íø¹Ø¹«Ë¾HypÆìϵÄCreditGuard²úÆ·ÔâÓöÁËÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷ÈÅÂÒÁËÐÅÓÿ¨ÖÕ¶ËÓëÖ§¸¶ÏµÍ³¼äµÄͨѶ£¬£¬£¬£¬£¬£¬µ«²¢Î´µ¼ÖÂÊý¾Ýй¶¡£¡£¡£¡£¡£Hyp¹«Ë¾½²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬£¬¹¥»÷Ö÷ÒªÕë¶Ô²¿·ÖЧÀͼ°Í¨Ñ¶ÌṩÉÌ£¬£¬£¬£¬£¬£¬²¢Òѱ»Ñ¸ËÙ×èÖ¹£¬£¬£¬£¬£¬£¬Ð§ÀÍËæºó»Ö¸´¡£¡£¡£¡£¡£Ö»¹ÜÉв»ÇåÎú¹¥»÷ÕßÉí·Ý£¬£¬£¬£¬£¬£¬µ«ÒÔÉ«ÁÐýÌåÖ¸³ö£¬£¬£¬£¬£¬£¬Ò»¸öÓëÒÁÀÊÓйصĺڿÍ×éÖ¯Éù³ÆÈÏÕæ¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÓë10Ô·ÝÖ§¸¶¹«Ë¾ShebaÔâÓöµÄÀàËÆDDoS¹¥»÷ÏàËÆ£¬£¬£¬£¬£¬£¬Æäʱ¹¥»÷µ¼ÖÂÖ§¸¶ÖÐÖ¹ÈýСʱ¡£¡£¡£¡£¡£×Ô10ÔÂ7ÈÕ¿Ö²ÀÏ®»÷ÒÔÀ´£¬£¬£¬£¬£¬£¬ÒÔÉ«ÁÐÃñÓûù´¡ÉèÊ©ÒòµØÇø³åÍ»ÔâÓöÁ˸ü¶àÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬Ö÷ÒªÓÉÓëÒÁÀʺÍÕæÖ÷µ³Ïà¹ØµÄºÚ¿ÍÕûÌå¼°ÆäËûÕþÖÎÄîÍ·ºÚ¿ÍÌᳫ£¬£¬£¬£¬£¬£¬²»µ«Ó°ÏìÒÔÉ«Áб¾ÍÁ£¬£¬£¬£¬£¬£¬»¹²¨¼°µØÇøÍâµÄ»ù´¡ÉèÊ©¡£¡£¡£¡£¡£
https://therecord.media/cyberattack-causes-credit-card-readers-in-israel-to-malfunction
2. °¢»ôµÂµÂ¶ûº£×ÈÃÀ¹úÍøÂçÔâ¹¥»÷£¬£¬£¬£¬£¬£¬¶à¼Ò×ÅÃû³¬ÊÐÔËÓªÊÜÓ°Ïì
11ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬ºÉÀ¼¹«Ë¾°¢»ôµÂµÂ¶ûº£×È£¬£¬£¬£¬£¬£¬×÷ΪStop & Shop¡¢Hannaford¡¢Food LionºÍGiant FoodµÈÃÀ¹ú×ÅÃû³¬ÊÐÆ·ÅƵÄĸ¹«Ë¾£¬£¬£¬£¬£¬£¬½üÆÚÔâÊÜÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÆä±é²¼ÃÀ¹úµÄ2000¶à¼ÒÃŵ귺ÆðÎÊÌâ¡£¡£¡£¡£¡£¾Ý¸÷µØÐÂÎÅýÌ屨µÀ£¬£¬£¬£¬£¬£¬×¡ÃñÎÞ·¨ÔÚÏßϳ¬ÊÐÍê³ÉʳÎïÔÓ»õÅäËͶ©µ¥£¬£¬£¬£¬£¬£¬²¿·Ö³¬ÊÐÆ·ÅÆÍøÕ¾Ò²ÒÑÏÂÏߣ¬£¬£¬£¬£¬£¬Ö»¹ÜÊÐËÁÈԿɽÓÊÜÐÅÓÿ¨¸¶¿î²¢´¦Öóͷ£²¿·ÖÒ©Æ·¶©µ¥¡£¡£¡£¡£¡£°¢»ôµÂµÂ¶ûº£×ȹ«Ë¾ÒÑִ֪ͨ·¨²¿·Ö£¬£¬£¬£¬£¬£¬²¢ÓëÍâ²¿ÍøÂçÇ徲ר¼ÒÏàÖúÕö¿ªÊӲ죬£¬£¬£¬£¬£¬Í¬Ê±½ÓÄɲ½·¥ÆÀ¹À»ººÍ½âÎÊÌ⣬£¬£¬£¬£¬£¬°üÀ¨ÈÃһЩϵͳÀëÏßÒÔ±£»£»£»¤ËüÃÇ¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Ó°ÏìÁ˹«Ë¾µÄÄ³Ð©Æ·ÅÆºÍЧÀÍ£¬£¬£¬£¬£¬£¬°üÀ¨Ò»Ð©Ò©µêºÍµç×ÓÉÌÎñÓªÒµ¡£¡£¡£¡£¡£×èÖ¹12ÈÕÏÂÖ磬£¬£¬£¬£¬£¬²¿·Ö³¬ÊÐÆ·ÅÆÍøÕ¾Òѻָ´£¬£¬£¬£¬£¬£¬µ«HannafordµÄÍøÕ¾ÈÔ´¦ÓÚ̱»¾×´Ì¬£¬£¬£¬£¬£¬£¬²¢Ðû²¼ÐÂÎųƻָ´ÊÂÇéÕýÔÚ¾ÙÐÐÖУ¬£¬£¬£¬£¬£¬Í¬Ê±ÌáÐѿͻ§Ò©·¿ºÍTo Go¶©µ¥Êܵ½µÄÓ°Ïì¡£¡£¡£¡£¡£ÏÖÔÚÉÐÎÞºÚ¿Í×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬µ«ÁãÊÛµêºÍ³¬Êо³£³ÉΪÀÕË÷Èí¼þÍÅ»ïºÍÍøÂç·¸·¨ÍÅ»ïµÄ¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£
https://therecord.media/dutch-company-stop-shop-hannaford-cyber
3. ³¯ÏʺڿÍʹÓÃÕýµ±ÊðÃûÓ¦Óù¥»÷macOSϵͳ
11ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬³¯ÏÊÍþвÐÐΪÕßʹÓôøÓÐľÂíµÄ¼Çʱ¾Ó¦ÓóÌÐòºÍ»ùÓÚFlutter¿ò¼ÜµÄɨÀ×ÓÎÏ·¹¥»÷Apple macOSϵͳ£¬£¬£¬£¬£¬£¬ÕâЩӦÓúÍÓÎÏ·¾ùÓÉÕýµ±µÄApple¿ª·¢ÕßIDÊðÃûºÍ¹«Ö¤£¬£¬£¬£¬£¬£¬Òò´ËÄܹ»ÔÝʱͨ¹ýAppleµÄÇå¾²¼ì²é£¬£¬£¬£¬£¬£¬ÔÚmacOSϵͳÉϲ»ÊÜÏÞÖÆµØÖ´ÐС£¡£¡£¡£¡£ÕâЩӦÓóÌÐòµÄÃû³ÆÒÔ¼ÓÃÜÇ®±ÒΪÖ÷Ì⣬£¬£¬£¬£¬£¬Ó볯ÏʺڿͶԽðÈÚ͵ÇÔµÄÐËȤÏà·û¡£¡£¡£¡£¡£¾ÝJamf Threat Labs·¢Ã÷£¬£¬£¬£¬£¬£¬ÕâЩ»î¶¯¿´ËÆÊÇÈÆ¹ýmacOSÇå¾²»úÖÆµÄʵÑ飬£¬£¬£¬£¬£¬¶ø·Ç³ÉÊìÐж¯¡£¡£¡£¡£¡£´Ó2024Äê11ÔÂ×îÏÈ£¬£¬£¬£¬£¬£¬JamfÔÚVirusTotalÉÏ·¢Ã÷¶à¸ö¿´ËÆÎÞº¦È´ÅþÁ¬µ½³¯ÏÊЧÀÍÆ÷µÄÓ¦ÓóÌÐò¡£¡£¡£¡£¡£ÕâЩӦÓóÌÐòʹÓÃFlutter¿ò¼Ü¹¹½¨£¬£¬£¬£¬£¬£¬Îª¶ñÒâÈí¼þ×÷ÕßÌṩÁ˶๦ЧÐÔÇÒ¸üÄѼì²â¡£¡£¡£¡£¡£Jamf»¹·¢Ã÷Áù¸ö¶ñÒâÓ¦ÓóÌÐòÖÐÓÐÎå¸öÒÑÊðÃû²¢¹«Ö¤£¬£¬£¬£¬£¬£¬ÇÒ±£´æ»ùÓÚGolangºÍPythonµÄ±äÌå¡£¡£¡£¡£¡£Æ»¹û¹«Ë¾ÒÑ×÷·ÏÕâЩӦÓóÌÐòµÄÊðÃû£¬£¬£¬£¬£¬£¬µ«Éв»ÇåÎúËüÃÇÊÇ·ñÔøÔÚÏÖʵ²Ù×÷ÖÐʹÓùý£¬£¬£¬£¬£¬£¬ÕվɽöÓÃÓÚ²âÊÔÆÀ¹ÀÈÆ¹ýÇå¾²Èí¼þµÄÊÖÒÕ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/north-korean-hackers-create-flutter-apps-to-bypass-macos-security/
4. GoIssue£ºÐÂÐÍGitHubÍøÂç´¹ÂÚ¹¤¾ßÒý·¢Çå¾²¾¯±¨
11ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬SlashNextÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖÃûΪGoIssueµÄÐÂÐÍÖØ´óÍøÂç´¹ÂÚ¹¤¾ß£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ß¿ÉÄÜÓëGitLokerÀÕË÷»î¶¯Óйأ¬£¬£¬£¬£¬£¬×¨ÃÅÕë¶ÔGitHubÓû§¡£¡£¡£¡£¡£GoIssueÄÜ´Ó¹«¹²GitHubСÎÒ˽¼Ò×ÊÁÏÖÐÏµÍ³ÍøÂçµç×ÓÓʼþµØµã£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÕâЩÐÅÏ¢Ìᳫ´ó¹æÄ£¡¢ÓÐÕë¶ÔÐÔµÄÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¶¨Öư汾ºÍÍêÕûÔ´´úÂëµÄ»á¼û»®·ÖÊÛ¼Û700ÃÀÔªºÍ3000ÃÀÔª¡£¡£¡£¡£¡£ÀֳɵĹ¥»÷¿ÉÄܵ¼ÖÂÔ´´úÂë±»µÁ¡¢¹©Ó¦Á´±»¹¥»÷ÒÔ¼°ÆóÒµÍøÂç±»ÈëÇÖ¡£¡£¡£¡£¡£¾ÝSlashNext±¨µÀ£¬£¬£¬£¬£¬£¬GitLokerÍŶӳÉÔ±CyberluffyÓëGoIssueÓйأ¬£¬£¬£¬£¬£¬ÕâÅú×¢Á½ÖÖ¹¤¾ß¿ÉÄܱ£´æ¹ØÁª¡£¡£¡£¡£¡£GitHubÓû§Ó¦½ÓÄÉ×î¼ÑÔÚÏßÇ徲ʵ¼ù£¬£¬£¬£¬£¬£¬ÈçÇ¿ÃÜÂ롢˫ÒòËØÉí·ÝÑéÖ¤¡¢Ð¡ÐÄÍøÂç´¹ÂÚÓʼþºÍ°´ÆÚ¼ì²éOAuthÓ¦ÓÃȨÏÞ£¬£¬£¬£¬£¬£¬ÒÔ±£»£»£»¤×Ô¼ººÍ×éÖ¯ÃâÊÜDZÔÚË𺦡£¡£¡£¡£¡£Sectigo¸ß¼¶Ñо¿Ô±Jason SorokoÖ¸³ö£¬£¬£¬£¬£¬£¬GoIssue²»µ«¶ÔGitHub×é³ÉÖØ´óÍþв£¬£¬£¬£¬£¬£¬Ò²¶ÔÆäËû¿ª·¢Õ߯½Ì¨×é³ÉΣº¦£¬£¬£¬£¬£¬£¬¿ª·¢Õ߯½Ì¨ÒѳÉΪ¸ßΣº¦µÄÕ½³¡£¬£¬£¬£¬£¬£¬ÐèÒª¿ìËÙÉú³¤Çå¾²·ÀÓùÀ´Ó¦¶ÔÕâÖ֯ձ鱣´æµÄÍþв¡£¡£¡£¡£¡£
https://hackread.com/gitloker-goissue-tool-targets-github-phishing-users/
5. Form I-9 ComplianceÊý¾Ýй¶ӰÏìÈËÊýÔ¶³¬Ô¤ÆÚ
11ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬Ô±ÈËΪ¸ñÑéÖ¤½â¾ö¼Æ»®ÌṩÉÌForm I-9 ComplianceÔâÓöÁËÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬ÆäÓ°ÏìÖð½¥À©´ó£¬£¬£¬£¬£¬£¬Ô¶³¬×î³õÔ¤ÆÚ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÐÖú¿Í»§ÌîдÕþ¸®ÒªÇóµÄI-9±í¸ñÎļþ£¬£¬£¬£¬£¬£¬ÓÃÓÚÑéÖ¤ÔÚÃÀ¹úÊܹÍСÎÒ˽¼ÒµÄÉí·ÝºÍÊÂÇéÔÊÐí¡£¡£¡£¡£¡£½ñÄê2Ô³õ£¬£¬£¬£¬£¬£¬ÓÐÈËδ¾ÊÚȨ»á¼ûÁËÆäÍøÂ磬£¬£¬£¬£¬£¬4ÔÂ12ÈÕÕâÒ»ÈëÇÖÐÐΪ±»·¢Ã÷£¬£¬£¬£¬£¬£¬Ëæºó¹«Ë¾¹Ø±ÕÁËһЩϵͳ×÷ΪÏìÓ¦²½·¥¡£¡£¡£¡£¡£×î³õ£¬£¬£¬£¬£¬£¬¹«Ë¾Í¨ÖªÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ³ÆÊÜÓ°ÏìµÄÈËÊýԼΪ27,000ÈË£¬£¬£¬£¬£¬£¬µ«ËæºóÔÚ10Ô·Ý͸¶ÊÜÓ°ÏìÈËÊýÒÑÔöÌíÖÁ½ü97,000ÈË¡£¡£¡£¡£¡£¶ø×î½ü¼¸Ìì¸üеÄÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬ÏÖʵÊÜÓ°ÏìµÄÈËÊýÒÑÁè¼Ý193,000ÈË¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÐÕÃûºÍÉç»á°ü¹ÜºÅ£¬£¬£¬£¬£¬£¬ÊÜÓ°ÏìµÄСÎÒ˽¼Ò½«»ñµÃÃâ·ÑµÄÉí·Ý͵ÇÔ±£»£»£»¤ºÍÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú´Ë´ÎÊý¾Ýй¶ÊÇ·ñÉæ¼°ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬Ò²Ã»ÓÐÒÑÖªµÄÀÕË÷Èí¼þ×éÖ¯ÈϿɶԴ˴ÎÈëÇÖÈÏÕæ¡£¡£¡£¡£¡£
https://www.securityweek.com/form-i-9-compliance-data-breach-impacts-over-190000-people/
6. Microsoft Exchange Õë¶ÔÀÄÓÃÓÕÆÎó²îµÄµç×ÓÓʼþÌí¼ÓÖÒÑÔ
11ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬Î¢ÈíÅû¶ÁËÒ»¸ö¸ßÑÏÖØÐÔµÄExchange ServerÎó²î£¨CVE-2024-49040£©£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓÉSolidlabÇå¾²Ñо¿Ô±Vsevolod Kokorin·¢Ã÷£¬£¬£¬£¬£¬£¬Ó°ÏìExchange Server 2016ºÍ2019°æ±¾¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐí¹¥»÷ÕßαÔì´«Èëµç×ÓÓʼþµÄÕýµ±·¢¼þÈË£¬£¬£¬£¬£¬£¬Ìá¸ß¶ñÒâÐÂÎŵÄÓÐÓÃÐÔ¡£¡£¡£¡£¡£ÎÊÌâÔ´ÓÚSMTPЧÀÍÆ÷¶ÔÊÕ¼þÈ˵صãµÄÆÊÎö²î±ðÒÔ¼°µç×ÓÓʼþÌṩÉÌÔÊÐíʹÓò»ÇкÏRFC±ê×¼µÄ·ûºÅ¡£¡£¡£¡£¡£Î¢ÈíÔÚ±¾Ô²¹¶¡ÐÇÆÚ¶þÐû²¼Á˸üУ¬£¬£¬£¬£¬£¬Ìí¼ÓÎó²î¼ì²âºÍÖÒÑÔºá·ù£¬£¬£¬£¬£¬£¬ËäÈ»ÉÐδÐÞ²¹¸ÃÎó²î£¬£¬£¬£¬£¬£¬µ«ExchangeЧÀÍÆ÷ÏÖÔÚ½«¼ì²â¶ñÒâµç×ÓÓʼþ²¢Ìí¼ÓÖÒÑÔ¡£¡£¡£¡£¡£ÖÎÀíÔ±ÆôÓÃĬÈÏÇå¾²ÉèÖú󣬣¬£¬£¬£¬£¬ÏµÍ³½«Ä¬ÈÏÆôÓÃÎó²î¼ì²âºÍµç×ÓÓʼþÖÒÑÔ£¬£¬£¬£¬£¬£¬²¢ÔÚ¼ì²âµ½µÄ¿ÉÒɵç×ÓÓʼþÖÐÌí¼ÓÖÒÑÔ£¬£¬£¬£¬£¬£¬ÌáÐÑÓû§²»ÒªÏàÐÅδÂÄÀúÖ¤µÄÐÅÏ¢¡¢Á´½Ó»ò¸½¼þ¡£¡£¡£¡£¡£Î¢Èí½¨ÒéÓû§¼á³Ö¸Ã¹¦Ð§ÆôÓ㬣¬£¬£¬£¬£¬ÒÔ±ÜÃâÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/unpatched-microsoft-exchange-server-flaw-enables-spoofing-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ