ÔÚGoogle DocsÖÐÊäÈëÌØ¶¨µÄµ¥´Êºó»áµ¼ÖÂÆäÍß½â
Ðû²¼Ê±¼ä 2022-05-07¾ÝýÌå5ÔÂ6ÈÕ±¨µÀ£¬Google DocsÖдæÔÚÒ»¸öÎÊÌ⣬ÔÚÆäÖÐÊäÈëÌØ¶¨µÄµ¥´Êºó»áµ¼ÖÂÍ߽⡣¸ÃÎÊÌâÊ×ÏÈÓÉÓû§Eliza Callahan·¢ÏÖ£¬µ±ÆäÔÚÎĵµÖÐÊäÈë¡°And.And.And.And.And.And.¡±Ê±£¬ÊÕµ½´íÎóÏûÏ¢¡°Unable to load file¡±£¬¶øÇÒÎÞ·¨ÔÙ¼ì²ì»ò±à¼Îĵµ¡£¾¹ý²âÊÔ£¬Ð¡Ð´µÄ¡°and.and.and.and.and.and.¡±²»»á´¥·¢¸ÃÎÊÌ⣬µ«Ïàͬ¸ñʽµÄ×Ö·û´®´æÔÚͬÑùµÄÎÊÌ⣬ÖîÈç"But.But.But.But.But."µÈ¡£Ñо¿ÈËÔ±ÍÆ²âÓë¡°ÏÔʾÓï·¨½¨Ò顱ѡÏîÓйأ¬Ä¿Ç°GoogleÍŶÓÕýÔÚ½â¾ö¸ÃÎÊÌâ¡£
https://www.bleepingcomputer.com/news/technology/google-docs-crashes-on-seeing-and-and-and-and-and/
2¡¢ÊÕÕ®·þÎñENCollectÅäÖôíÎóй¶Áè¼Ý160ÍòÌõ¼Ç¼
Äþ¾²¹«Ë¾UpGuardÔÚ5ÔÂ5ÈÕ³ÆÆä·¢ÏÖÁËÒ»¸öÅäÖôíÎóµÄElasticSearch·þÎñÆ÷£¬Éæ¼°Ó¡¶ÈºÍ·ÇÖÞ½ðÈÚ·þÎñ»ú¹¹´û¿îµÄ²ÆÕþÐÅÏ¢¡£¸ÃElasticSearchÊôÓÚÕ®Îñ´ßÊÕ·þÎñƽ̨ENCollect£¬×ܹ²ÓÐ5.8GBÊý¾Ý£¬1686363Ìõ¼Ç¼¡£ÆäÖаüÂÞ°üÂÞÐÕÃû¡¢´û¿î½ð¶î¡¢³öÉúÈÕÆÚ¡¢ÕʺŵȸöÈËÐÅÏ¢£¬ÒÔ¼°ÊôÓÚ²úÎï¹ÜÀíÔ±¡¢¹«Ë¾¿Í»§ºÍÊÕ¿îÊðÀíµÄ48043¸öÓʼþµØÖ·¡£Ñо¿ÈËÔ±ÓÚ2ÔÂ16ÈÕ¼ì²âµ½¸ÃÊý¾Ý¿â£¬2ÔÂ28ÈÕÆäÒѱ»±£»¤ÆðÀ´¡£
https://thehackernews.com/2022/05/thousands-of-borrowers-data-exposed.html
3¡¢Ò˼ҼÓÄôó·Ö¹«Ë¾ÒÑй¶½ü10ÍòÃû¿Í»§µÄ¸öÈËÐÅÏ¢
¾Ý5ÔÂ6ÈÕ±¨µÀ£¬Ò˼ҼÓÄôó·Ö¹«Ë¾ÒÑй¶Լ95000Ãû¿Í»§µÄ¸öÈËÐÅÏ¢¡£¸Ã¹«Ë¾ÔÚÉùÃ÷ÖÐÌåÏÖ£¬²¿ÃÅÖ÷¹ËµÄ¸öÈËÐÅÏ¢·ºÆðÔÚÒ˼ҼÓÄôó¹«Ë¾Ò»ÃûÔ±¹¤ÔÚ3ÔÂ1ÈÕÖÁ3ÈÕÆÚ¼äÀûÓÃÒ˼ҵÄÖ÷¹ËÊý¾Ý¿â½øÐÐµÄ "Ò»°ãËÑË÷ "µÄ½á¹ûÖС£´Ë´Îй¶Á˿ͻ§µÄÐÕÃû¡¢ÓʼþµØÖ·¡¢µç»°ºÅÂëºÍÓÊÕþ±àÂëµÈÐÅÏ¢¡£¸Ã¹«Ë¾ÌåÏÖËûÃÇĿǰÎÞ·¨ÍƲ⵼Ö´˴ÎʼþµÄÔÒò£¬µ«ÒѾ½ÓÄÉÐж¯½â¾ö¸ÃÎÊÌ⣬²¢ÒѾÖ÷¶¯Ïò¼ÓÄôóÒþ˽¼à¹Ü»ú¹¹Í¨±¨ÁËÕâһʼþ¡£
https://www.infosecurity-magazine.com/news/data-breach-ikea-canada/
4¡¢¶íÂÞ˹¾ÆÀà·ÖÏúµÄÏà¹ØÍøÕ¾EGAISÔâµ½DDoS¹¥»÷
¾ÝýÌå5ÔÂ5Èճƣ¬¶íÂÞ˹µÄһЩ¾ÆÀ๫˾Éù³ÆÎÞ·¨Æ¾¾ÝÕþ¸®¹æÔòµÄÒªÇó·ÃÎÊEGAISÍøÕ¾¡£EGAISÊǶíÂÞ˹¾Æ¾«ÒûÁÏͳһ×Ô¶¯»¯ÐÅϢϵͳ£¬Æä·þÎñÖжϵ¼Ö¶íÂÞ˹¾ÆÀàµÄÔËÊäºÍÅäËÍÔÚ¹ýÈ¥¼¸ÌìÊܵ½Á˾޴óµÄÓ°Ïì¡£´Ë´Î¹¥»÷»î¶¯¿ÉÄÜÓëÎÚ¿ËÀ¼µÄIT ArmyÓйأ¬ÒòΪÏà¹ØÍøÕ¾½üÆÚÒѱ»¸ÃÍÅ»ïÁÐΪĿ±ê¡£Õâ²»ÊǵÚÒ»´ÎÕë¶Ô¶íÂÞ˹ÄÚ²¿²úÎ﹩ӦÁ´µÄ¹¥»÷£¬3ÔÂ·ÝÆäÈâÀàÉú²úÉÌMiratorgÔâµ½Á˹¥»÷£¬Í×еãλÓÚ¸ÃÁìÓò¹«Ë¾Ê¹ÓõĹú¼ÒÐÅϢϵͳVetIS¡£
https://www.bleepingcomputer.com/news/security/ukraine-s-it-army-is-disrupting-russias-alcohol-distribution/
5¡¢ÃÀ¹úNISTÐû²¼¹ØÓÚ¹ÜÀí¹©Ó¦Á´·çÏÕµÄÍøÂçÄþ¾²Ö¸ÄÏ
5ÔÂ5ÈÕ£¬ÃÀ¹ú¹ú¼Ò³ß¶ÈÓë¼¼ÊõÑо¿Ôº(NIST)Ðû²¼Á˹ØÓÚ¹ÜÀí¹©Ó¦Á´·çÏÕµÄÍøÂçÄþ¾²Ö¸ÄÏ¡£¸ÃÖ¸ÄÏ×ܹ²326Ò³£¬ÄÚÈÝ´ÓÆÀ¹ÀÍâ¹ú¶ÔÈí¼þºÍ²úÎ↑·¢µÄ¿ØÖÆ£¬µ½Ê¹ÓÃÍⲿIT·þÎñÌṩÉÌÏà¹ØµÄ·çÏÕ£¬ÎªÊ¶±ðºÍÓ¦¶Ô¹©Ó¦Á´µÄÍþвÌṩָµ¼¡£NISTÑо¿ÈËÔ±³Æ£¬×éÖ¯ÐèÒª±£Ö¤ËûÃǹºÖúÍʹÓõŤ¾ßÊÇÖµµÃÐÅÀµµÄ£¬ÕâÒ»Ö¸ÄÏ¿ÉÒÔ×ÊÖúÆäÁ˽âҪעÒâÄÄЩ·çÏÕÒÔ¼°½ÓÄÉÄÄЩÐж¯À´Ó¦¶Ô¡£ÓÉÓÚÖ¸Äϵij¤¶ÈºÍÅÓ´óÐÔ£¬NIST¼Æ»®Ðû²¼¿ìËÙÈëÃÅÖ¸ÄÏ£¬ÒÔ×ÊÖú¸Õ¿ªÊ¼½øÐй©Ó¦Á´·çÏÕ¹ÜÀíµÄ×éÖ¯¡£
https://thehackernews.com/2022/05/nist-releases-updated-guidance-for.html
6¡¢TrendMicroÐû²¼¶ñÒâÈí¼þ¿ò¼ÜNetDookaµÄ·ÖÎö³ÂËß
TrendMicroÔÚ5ÔÂ5ÈÕÐû²¼Á˹ØÓÚжñÒâÈí¼þ¿ò¼ÜNetDookaµÄ·ÖÎö³ÂËß¡£NetDookaͨ¹ýPrivateLoaderµÄPPI£¨°´°²×°¸¶·Ñ£©·þÎñ·Ö·¢£¬¾ßÓмÓÔØ·¨Ê½¡¢ÊÍ·Å·¨Ê½¡¢±£»¤Çý¶¯·¨Ê½²¢ÒÀÀµÓÚ×Ô½çËµÍøÂçͨÐÅÐÒé¡£¸ÃRATͨ¹ýTCP½ÓÊÕÃüÁ²¢¾ßÓжàÖÖ¹¦Ð§£¬ÀýÈçÖ´ÐÐÎļþ²Ù×÷¡¢¼Ç¼¼üÅÌ»÷¼ü¡¢Ö´ÐÐshellÃüÁʹÓÃÖ÷»ú×ÊÔ´½øÐÐDDoS¹¥»÷»òÖ´ÐÐÔ¶³Ì×ÀÃæ²Ù×÷µÈ¡£Ñо¿ÈËÔ±ÌåÏÖ£¬ËäÈ»¸Ã¹¤¾ßÈÔ´¦ÓÚÔçÆÚ¿ª·¢½×¶Î£¬µ«ËüÒѾ·Ç³£Ç¿´ó¡£
https://www.trendmicro.com/en_us/research/22/e/netdooka-framework-distributed-via-privateloader-ppi.html