¡¾Çå¾²²¥±¨¡¿Wi-FiͬÃËÕýʽÐû²¼ÐÂÒ»´úÇå¾²±ê×¼WPA3£¬£¬£¬£¬£¬¿É½øÒ»²½Ìá¸ßÍøÂçÇå¾²ÐÔ
±¾ÖÜÒ»Wi-FiͬÃËÕýʽÐû²¼ÐÂÒ»´úÇå¾²±ê×¼WPA3£¬£¬£¬£¬£¬WPA3ÊÇÓÃÓÚWi-FiÅþÁ¬µÄÓû§Éí·ÝÑéÖ¤ÊÖÒÕµÄ×îа汾¡£¡£¡£WPA3ÓÐÁ½ÖÖÇ徲ģʽ£¬£¬£¬£¬£¬WPA3-PersonalºÍWPA3-Enterprise£¬£¬£¬£¬£¬ÕâÁ½ÖÖÇ徲ģʽµÄÖ÷񻂿±ðÔÚÓÚÉí·ÝÑéÖ¤½×¶Î¡£¡£¡£¹ØÓÚÆóÒµ¡¢Õþ¸®ºÍ½ðÈÚÍøÂçÖÐʹÓõÄ×°±¸£¬£¬£¬£¬£¬½¨ÒéʹÓÃWPA3-EnterpriseÇ徲ģʽ£¬£¬£¬£¬£¬WPA3-PersonalÔòÊÇÃæÏòͨË×СÎÒ˽¼ÒÓû§¡£¡£¡£Wi-FiͬÃËÌåÏÖWPA3µÄSAEËã·¨Äܹ»µÖÓù±©Á¦¹¥»÷£¬£¬£¬£¬£¬WPA3½«ÔÚ¶à´Îʧ°ÜʵÑéºó×èÖ¹ÈÏÖ¤ÇëÇ󡣡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/new-wpa3-wi-fi-standard-released/
¡¾ÍþвÇ鱨¡¿Çå¾²Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶Ô¶«ÄÏÑǵĹ¥»÷»î¶¯Rancor
Palo Alto NetworksµÄUnit 42Ñо¿ÍŶÓÊӲ쵽Õë¶Ô¶«ÄÏÑǵÄһϵÁй¥»÷»î¶¯£¬£¬£¬£¬£¬Æä¶ñÒâÈí¼þµÄ·Ö·¢ºÍÄ¿µÄµÄÑ¡Ôñ¾ßÓи߶ÈÕë¶ÔÐÔ¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ¸Ã¹¥»÷ÕßÊÇÒ»¸öδ֪µÄ×éÖ¯Rancor£¬£¬£¬£¬£¬RancorÖ÷ҪʹÓÃÁ½¸ö¶ñÒâÈí¼þ¼Ò×壬£¬£¬£¬£¬DDKONGºÍPLAINTEE¡£¡£¡£DDKONGÊÇÆäÖ÷ÒªµÄ¶ñÒâÈí¼þ¹¤¾ß£¬£¬£¬£¬£¬PLAINTEEËÆºõÊÇÐÂÔöÌíµÄ¹¤¾ß¡£¡£¡£Æä¹¥»÷Ä¿µÄ°üÀ¨µ«²»ÏÞÓÚÐÂ¼ÓÆÂºÍ¼íÆÒÕ¯¡£¡£¡£ÕâЩ¹¥»÷»î¶¯´Ó´¹ÂÚÐÅÏ¢×îÏÈ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÔΪÆäÖ÷ÒªÕë¶ÔÕþÖÎʵÌå¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://researchcenter.paloaltonetworks.com/2018/06/unit42-rancor-targeted-attacks-south-east-asia-using-plaintee-ddkong-malware-families/
¡¾ÍþвÇ鱨¡¿Ñо¿Ö°Ô±³Æ2017ÄêµÄÿһ¸ö¼ÓÃÜÇ®±ÒICOƽ¾ù°üÀ¨5¸öÇå¾²Îó²î
Positive.com·¢Ã÷2017ÄêµÄÿһ¸ö¼ÓÃÜÇ®±ÒICOƽ¾ù±£´æ5¸öÇå¾²Îó²î£¬£¬£¬£¬£¬´ó´ó¶¼Îó²î¶¼ÊÇÔÚICO×Ô¼ºµÄÖÇÄܺÏÔ¼Öз¢Ã÷µÄ¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ2017ÄêËùÓеÄICOÒÆ¶¯Ó¦Óö¼±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬ÁíÍâÈý·ÖÖ®Ò»µÄÎó²î·ºÆðÔÚICOµÄwebÓ¦ÓÃÖУ¬£¬£¬£¬£¬Îó²î¹æÄ£°üÀ¨´úÂë×¢È롢ЧÀÍÆ÷Ãô¸ÐÊý¾Ýй¶¡¢²»Çå¾²µÄÊý¾Ý´«ÊäÒÔ¼°í§ÒâÎļþ¶ÁÈ¡µÈ¡£¡£¡£ICO×éÖ¯ÕßÍùÍùûÓÐΪÆäÏîĿע²áÉ罻ýÌåÕË»§£¬£¬£¬£¬£¬Ê¹ÆäÓû§Ò×ÊÜÉç½»¹¤³ÌºÍ´¹ÂÚ¹¥»÷¡£¡£¡£×îºó£¬£¬£¬£¬£¬ICO×éÖ¯ÕßÍùÍùδÄÜΪÆäÃô¸ÐÕË»§ÆôÓÃË«ÒòËØÈÏÖ¤£¬£¬£¬£¬£¬µ¼Ö¹¥»÷Õß¿ÉÄÜÐ®ÖÆ¹Ù·½ÍøÕ¾»òÇ®°ü¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/researchers-last-year-s-icos-had-five-security-vulnerabilities-on-average/
¡¾ÍþвÇ鱨¡¿Çå¾²Ñо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þThanatosµÄ½âÃܹ¤¾ß
˼¿ÆTalosÐû²¼ÀÕË÷Èí¼þThanatosµÄÃ⺬»ìÃܹ¤¾ß£¬£¬£¬£¬£¬¸Ã¹¤¾ßÔÚThanatos°æ±¾1ºÍ1.1ÒÔ¼°ÆäËüÒÑÖª°æ±¾É϶¼ÓÐÓᣡ£¡£Thanatosͨ¹ýŲÓÃGetTickCount»ñȡϵͳÔËÐÐʱ¼äµÄºÁÃëÊý£¬£¬£¬£¬£¬È»ºóÌìÉú¼ÓÃÜÃÜÔ¿£¬£¬£¬£¬£¬²¢Ê¹ÓÃ(AES)-256¾ÙÐмÓÃÜ¡£¡£¡£Òò´ËÆäÃÜÔ¿ÊÇÒ»¸ö32λµÄÖµ£¬£¬£¬£¬£¬ÔÚÆ½¾ùÿÃë10Íò´ÎµÄ±©Á¦ÆÆ½âÏ£¨²âÊÔÐéÄâ»úµÄ»ù×¼£©£¬£¬£¬£¬£¬»ñµÃÃÜÔ¿ÐèÒªÔ¼14·ÖÖÓµÄʱ¼ä¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://blog.talosintelligence.com/2018/06/ThanatosDecryptor.html
¡¾ÆÊÎö±¨¸æ¡¿Ñо¿ÍŶÓÐû²¼¹ØÓÚ¹ã¸æÈí¼þPbotµÄбäÌåµÄÆÊÎö±¨¸æ
¿¨°Í˹»ùʵÑéÊÒ·¢Ã÷¹ã¸æÈí¼þPBot£¨PythonBot£©µÄбäÌ壬£¬£¬£¬£¬¸Ã±äÌåÊÔͼÔÚÓû§µÄä¯ÀÀÆ÷ÉÏ×°ÖÃ¹ã¸æ²å¼þ£¬£¬£¬£¬£¬ÕâЩ²å¼þ»áÔÚÍøÒ³ÉÏÌí¼ÓÖÖÖÖ¹ã¸æ£¬£¬£¬£¬£¬²¢½«Óû§Öض¨Ïòµ½¹ã¸æÍøÕ¾¡£¡£¡£PBotµÄ¿ª·¢Ö°Ô±Ò»Ö±Ðû²¼¸Ã±äÌåµÄа汾£¬£¬£¬£¬£¬Ã¿¸ö°æ±¾¶¼»áʹ¾ç±¾»ìÏý±äµÃÔ½·¢Öش󡣡£¡£ÔÚ4Ô·ݿ¨°Í˹»ù¼ì²âµ½Áè¼Ý5Íò´Î×°ÖÃPBotµÄʵÑ飬£¬£¬£¬£¬ÔÚ5Ô·ÝÕâÒ»Êý×ÖÉõÖÁ»¹ÔÚÔöÌí¡£¡£¡£PBotÖ÷ÒªÕë¶Ô¶íÂÞ˹¡¢ÎÚ¿ËÀ¼ºÍ¹þÈø¿Ë˹̹µÄÓû§¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securelist.com/pbot-evolving-adware/86242/
¡¾Çå¾²Îó²î¡¿Ñо¿Ö°Ô±³ÆJolokiaµÄ¹ýʧÉèÖÿÉÄܵ¼ÖÂÐÅϢй¶»òDoS
Çå¾²Ñо¿Ö°Ô±Mat Mannion·¢Ã÷Jolokia Java Management Extensions£¨JMX£©±£´æÒ»Ð©Çå¾²Îó²î£¬£¬£¬£¬£¬¿ÉÄܵ¼Ö¾ܾøÐ§ÀÍ¡¢ÐÅϢй¶µÈÕë¶ÔJava WebЧÀÍÆ÷µÄDZÔÚ¹¥»÷¡£¡£¡£Mannion³ÆJolokiaµÄĬÈÏÉèÖò¢²»Çå¾²£¬£¬£¬£¬£¬Ã»ÓоÙÐÐÊʵ±ÉèÖõÄJolokia¿ÉÄܸøÍøÕ¾´øÀ´Î£º¦£¬£¬£¬£¬£¬ÉõÖÁ°üÀ¨Ò»Ð©½ðÈÚ»ú¹¹µÄÍøÕ¾¡£¡£¡£Mannion»¹Ðû²¼ÁËÕë¶ÔApache Tomcat 8µÄPoC¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://matmannion.com/jolokiapwn/