Ħ¸ùÊ¿µ¤ÀûÒòй¶Êý°ÙÍò¿Í»§ÐÅÏ¢Ö§¸¶3500ÍòÃÀÔª·£¿î
Ðû²¼Ê±¼ä 2022-09-23
¾Ý9ÔÂ21ÈÕ±¨µÀ£¬ÃÀ¹ú֤ȯ½»Ò×ίԱ»á(SEC)Ðû²¼£¬Ä¦¸ùÊ¿µ¤Àû£¨Morgan Stanley£©ÒÑͬÒâÖ§¸¶3500ÍòÃÀÔªµÄ·£¿î¡£SEC³Æ£¬Õâ¼Ò½ðÈÚ·þÎñ¹«Ë¾Î´Äܱ£»¤Ô¼Äª1500Íò¿Í»§µÄ¸öÈËÐÅÏ¢¡£´Ó2015Ä꿪ʼ£¬¸Ã¹«Ë¾¶à´ÎƸÇëÒ»¼Ò¹«Ë¾À´´¦ÖÃÊýǧ̨±¨·ÏÉ豸¡£È»¶ø£¬Õâ¼Ò¹«Ë¾ÔÚÊý¾ÝÏú»Ù·½ÃæÃ»ÓоÑ飬ÉõÖÁ½«Êýǧ̨É豸³öÊÛ¸øµÚÈý·½£¬ÆäÖаüÂÞÁ˿ͻ§ÐÅÏ¢µÄÉ豸£¬È»ºóÕâЩÉ豸ÔÚÅÄÂôÍøÕ¾Éϱ»×ªÊÛ¡£¸Ã¹«Ë¾ÊÔͼȡ»ØÕâЩÉ豸£¬µ«ÆäÖоø´ó¶àÊýÎÞ·¨»Ö¸´¡£
https://www.securityweek.com/morgan-stanley-pay-35m-fine-exposing-information-millions-customers
2¡¢Windows 11 22H2¹¦Ð§¸üе¼ÖÂNVIDIA·ºÆðÐÔÄÜÎÊÌâ
¾ÝýÌå9ÔÂ22Èճƣ¬±¾ÖÜÔçЩʱºòÐû²¼µÄWindows 11 22H2¹¦Ð§¸üÐÂÔÚ×°ÓÐNVIDIA GPUµÄϵͳÉÏÒýÆðÁËÓÎÏ·ÐÔÄÜÎÊÌâ¡£ÓÉÓÚ°²×°¸Ã¸üкóCPUʹÓÃÂÊÃ÷ÏÔϽµ£¬²¿ÃÅÍæ¼ÒÔÚÍæÓÎϷʱ»á·ºÆð¿¨¶ÙºÍÑÏÖØÖͺó¡£ÓÐȤµÄÊÇ£¬Æ¾¾Ý¶à¸öÓû§µÄ³ÂËߣ¬Ôڻعö¸üкó£¬ÓÎÏ·ÐÔÄÜÎÊÌ⽫Ïûʧ¡£ËäȻ΢ÈíÉÐδ½éÈë²¢ÊÓ²ìÕâЩÓû§³ÂËߣ¬µ«NVIDIAÖÊÁ¿±£Ö¤²¿ÃÅ֤ʵ£¬¸Ã¹«Ë¾ÒѾÒâʶµ½Õâ¸öÎÊÌ⣬²¢ÔÚÌáÐÑÊÜÓ°ÏìµÄRedditÓû§Ìṩ¸ü¶àµÄ·´À¡¡£
https://www.bleepingcomputer.com/news/gaming/windows-11-22h2-causing-gaming-issues-for-some-nvidia-users/
3¡¢ÐÄ»³²»ÂúµÄ¿ª·¢ÈËÔ±ÔÚTwitter¹ûÈ»Lockbit 3.0¹¹½¨Æ÷
ýÌå9ÔÂ21ÈÕ±¨µÀ³Æ£¬ÀÕË÷Èí¼þLockBit×îмÓÃÜÆ÷µÄ¹¹½¨Æ÷ÒѾй¶¡£Ñо¿ÈËÔ±3xp0rt³Æ£¬ÐÂ×¢²áµÄTwitterÓû§Ali QushjiÌåÏÖËûÃǵÄÍŶÓÈëÇÖÁËLockBits·þÎñÆ÷²¢ÕÒµ½ÁËLockBit 3.0µÄ¹¹½¨Æ÷¡£Ö®ºó£¬ÃûΪprotonleaksÒ²¹ûÈ»Á˸ù¹½¨Æ÷µÄ¸±±¾¡£LockBitµÄ´ú±íLockBitSuppÉù³ÆËûÃÇûÓб»ÈëÇÖ£¬¶øÊÇÒ»¸ö¶ÔLockbitµÄÁìµ¼²ã¸ÐÓ¦²»ÂúµÄ¿ª·¢ÈËԱй¶Á˹¹½¨Æ÷¡£¸Ã¹¹½¨Æ÷¿É±»ÈκÎÈËÓÃÀ´¿ìËÙ¹¹½¨Æô¶¯¹¥»÷ËùÐèµÄ¿ÉÖ´ÐÐÎļþ£¬°üÂÞ¼ÓÃÜÆ÷¡¢½âÃÜÆ÷ºÍÒÔÌØ¶¨·½Ê½Æô¶¯½âÃÜÆ÷µÄרÓù¤¾ß¡£
https://www.bleepingcomputer.com/news/security/lockbit-ransomware-builder-leaked-online-by-angry-developer-/
4¡¢PythonÖÐÒÑ´æÔÚ15ÄêµÄ©¶´¿ÉÓ°ÏìÁè¼Ý35Íò¿ªÔ´´æ´¢¿â
TrellixÑо¿ÈËÔ±ÔÚ9ÔÂ21Èճƣ¬PythonÖÐÒÑ´æÔÚ15ÄêµÄ©¶´¿ÉÄÜ»áÓ°ÏìÁè¼Ý350000¸ö¿ªÔ´ÏîÄ¿¡£ÕâÊÇÒ»¸ö·¾¶±éÀú©¶´£¨CVE-2007-4559£¬CVSSÆÀ·Ö6.8£©£¬¿É±»ÓÃÀ´ÁýÕÖÈÎÒâÎļþ²¢µ¼Ö´úÂëÖ´ÐУ¬´æÔÚÓÚPython tarfile°üµÄʹÓÃδ´¦ÖõÄtarfile.extract()º¯Êý»òtarfile.extractall()µÄÄÚÖÃĬÈÏÖµµÄ´úÂëÖС£´ËÍ⣬Trellix»¹Ðû²¼ÁËÒ»¸öÃûΪCreosoteµÄ×Ô½ç˵ӦÓã¬ÓÃÓÚɨÃèÒ×ÊÜCVE-2007-4559¹¥»÷µÄÏîÄ¿¡£
https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/tarfile-exploiting-the-world.html
5¡¢MicrosoftÅû¶ÁËÕë¶ÔÓ¡¶ÈµÄAndroid¶ñÒâÈí¼þµÄϸ½Ú
9ÔÂ21ÈÕ£¬MicrosoftÅû¶ÁËÕë¶ÔÓ¡¶ÈµÄAndroid¶ñÒâÈí¼þ·Ö·¢»î¶¯¡£¸Ã»î¶¯Ê¼ÓÚÒ»Ìõ°üÂÞ¶ñÒâÁ´½ÓµÄSMSÏûÏ¢£¬Á´½Ó»áÏÂÔØÒ»¸öαÔìµÄÒøÐн±ÀøÓ¦Ó÷¨Ê½¡£ÕâЩαÔìÓ¦ÓõÄC2·þÎñÆ÷ÓëÆäËû75¸ö»ùÓÚ¿ªÔ´Ç鱨µÄ¶ñÒâAPKÓйء£¸Ã¶ñÒâÈí¼þ¾ßÓÐRAT¹¦Ð§£¬¿ÉÀ¹½ØÖØÒªµÄ֪ͨ£¬ÀýÈç´«ÈëÏûÏ¢£¬ÕâÏÔÈ»ÊÇΪÁË»ñµÃÒøÐкͽðÈÚ»ú¹¹Ê¹ÓõÄ2FAÏûÏ¢¡£Ñо¿ÈËԱǿÁÒ½¨ÒéÓû§²»Òªµã»÷¶ÌÐÅ¡¢Óʼþ»òÏûÏ¢Ó¦ÓÃÖÐÊÕµ½µÄδ֪Á´½Ó£¬²¢È·±£ÒøÐÐÓ¦Ó÷¨Ê½ÊÇ´Ó¹Ù·½Ó¦Ó÷¨Ê½É̵êÏÂÔØµÄ¡£
https://www.microsoft.com/security/blog/2022/09/21/rewards-plus-fake-mobile-banking-rewards-apps-lure-users-to-install-info-stealing-rat-on-android-devices/
6¡¢VMwareÐû²¼2022°æµÄÄê¶ÈÈ«ÇòʼþÏìÓ¦Íþв·ÖÎö³ÂËß
¾ÝýÌå9ÔÂ20ÈÕ±¨µÀ£¬VMwareÔÚ½üÆÚÐû²¼ÁË2022°æµÄÄê¶ÈÈ«ÇòʼþÏìÓ¦Íþв·ÖÎö³ÂËß¡£VMwareÔÚ³ÂËßÖÐÌá³öÁË8¸öÖ÷Òª·¢ÏÖ£ººáÏòÔ˶¯ÊÇеÄÕ½³¡£»Deepfake¹¥»÷ÃÍÔö13%£¬66%µÄÊÜ·ÃÕßÔÚ¹ýÈ¥Ò»ÄêÖÐÄ¿¶ÃÁË´ËÀ๥»÷£»65%µÄÊÜ·ÃÕ߳ƶíÎÚÕ½ÕùÒÔÀ´¹¥»÷»î¶¯ÓÐËùÔö¼Ó£»23%µÄ¹¥»÷Σ¼°APIÄþ¾²ÐÔ£»62%µÄÊÜ·ÃÕßÔÚ¹ýÈ¥Ò»ÄêÄÚÓöµ½¹ýÁãÈÕ©¶´£¬±ÈÈ¥ÄêÔö¼Ó11%£»½ü60%µÄÊÜ·ÃÕßÔÚ¹ýÈ¥Ò»ÄêÄÚÔâµ½¹ýÀÕË÷¹¥»÷£»ITÑо¿ÈËÔ±ÕýÔÚ»¹»÷£»IT¾ëµ¡ÂʱÈÈ¥ÄêÂÔÓÐϽµ£¬µ«ÈÔÈ»ÊÇÒ»¸öÒªº¦ÎÊÌâ¡£
https://www.vmware.com/content/dam/learn/en/amer/fy23/pdf/1553238_Global_Incident_Response_Threat_Report_Weathering_The_Storm.pdf