ÃÀ¹úÄÜÔ´²¿Ðû²¼2019ÄêQ1µçÁ¦ÍøÂç½ôÆÈÇéÐκÍ×ÌÈű¨¸æ£» £»PrinterLogic´òÓ¡ÖÎÀíÈí¼þ¶à¸öÎó²î£¬ £¬£¬£¬¿Éµ¼ÖÂRCE

Ðû²¼Ê±¼ä 2019-05-06
1¡¢ÃÀ¹úÄÜÔ´²¿Ðû²¼2019ÄêQ1µçÁ¦ÍøÂç½ôÆÈÇéÐκÍ×ÌÈű¨¸æ

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
 
ƾ֤ÃÀ¹úÄÜÔ´²¿Ðû²¼µÄ2019ÄêµÚÒ»¼¾¶ÈµçÁ¦ÍøÂç½ôÆÈÇéÐκÍ×ÌÈű¨¸æ£¬ £¬£¬£¬3ÔÂ5ÈÕÉÏÎç9:12µ½ÏÂÖç6:57ʱ´ú±±ÃÀµçÍøÔâÓöµ½Ò»¸ö¡°µ¼ÖµçÁ¦ÏµÍ³ÔËÓªÖÐÖ¹µÄÍøÂçÊÂÎñ¡±£¬ £¬£¬£¬ÊÜÓ°ÏìµÄµØÇø°üÀ¨¼ÓÖݵĿ˶÷ÏØºÍÂåɼí¶ÏØ¡¢ÓÌËûÖݵÄÑκþÏØºÍ»³¶íÃ÷ÖݵĿµ¸¥Ë¹ÏØ¡£¡£Æ¾Ö¤ÃÀ¹úÄÜÔ´²¿µÄ½ç˵£¬ £¬£¬£¬¡°ÍøÂçÊÂÎñ¡±ÊÇÖ¸¡°Î´ÊÚȨ»á¼û¡±µ¼ÖµÄÍøÂçÖÐÖ¹£¬ £¬£¬£¬µ«Ã»Óиü¶àÐÅÏ¢Åú×¢¸ÃÊÂÎñÊÇÔ¶³ÌºÚ¿Í¹¥»÷ÕվɯóÒµÄÚ²¿µÄ¹¥»÷¡£¡£´ÓÀúÊ·ÉÏ¿´£¬ £¬£¬£¬±±ÃÀµçÍø´ÓδÔâµ½ÍøÂç¹¥»÷µ¼ÖÂµÄÆÆËð»òÖÐÖ¹£¬ £¬£¬£¬ÈôÊÇÊÂÇéÊôʵ£¬ £¬£¬£¬ÕâÒ»ÊÂÎñ¿ÉÄܳÉΪÀúÊ·ÐÔµÄÊÂÎñ¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://blog.avast.com/western-us-power-grid-hit-by-cyber-event

2¡¢ºÚ¿Íͨ¹ý±©Á¦¹¥»÷½ÓÊÜ29¸öIoT DDoS½©Ê¬ÍøÂç

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
 
ƾ֤ZDNet±¨µÀ£¬ £¬£¬£¬ÃûΪSubbyµÄºÚ¿Íͨ¹ý±©Á¦¹¥»÷½ÓÊÜÁË29¸öIoT DDoS½©Ê¬ÍøÂç¡£¡£SubbyʹÓÃÁËÓû§Ãû×ÖµäºÍ³£ÓÃÃÜÂëÁбíÀ´¶ÔÕâ29¸ö½©Ê¬ÍøÂçµÄC&C»ù´¡ÉèÊ©¾ÙÐб©Á¦¹¥»÷£¬ £¬£¬£¬ÆäÖÐһЩÉèʩʹÓÃÁ˽ÏÁ¿ÈõµÄƾ֤£¬ £¬£¬£¬ÀýÈçroot:root¡¢admin:admin¡¢oof:oofµÈ¡£¡£Æ¾Ö¤SubbyµÄ˵·¨£¬ £¬£¬£¬ÕâЩ½©Ê¬ÍøÂç¶¼½ÏÁ¿Ð¡£¬ £¬£¬£¬ÏÖʵµÄbot×ÜÊý½öΪ2.5Íò¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/hacker-takes-over-29-iot-botnets/

3¡¢Ñо¿ÍŶÓÖÒÑÔÕë¶ÔOffice 365ÕÊ»§µÄ½ÓÊÜÀ˳±

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
 
ƾ֤Barracuda NetworksµÄÆÊÎö£¬ £¬£¬£¬3Ô·ÝÕë¶ÔÔÆµç×ÓÓÊÏäµÄATO£¨ÕË»§½ÓÊÜ£©¹¥»÷¼¤Ôö£¬ £¬£¬£¬½öÔÚÒ»¸öÔÂÄÚ¹¥»÷Õß¾Íͨ¹ýÊýǧ¸öÊÜËðµÄOffice 365 ÕË»§·¢ËÍÁËÁè¼Ý150Íò·âÀ¬»øÓʼþ¡£¡£Ñо¿Ö°Ô±³ÆËùÓеÄÊӲ칤¾ßÖÐÓÐÁè¼Ý1/4£¨29%£©µÄÆóÒµÔâµ½Õë¶ÔOffice 365ÕÊ»§µÄ¹¥»÷£¬ £¬£¬£¬ÕâЩ¹¥»÷°üÀ¨×²¿â¡¢±©Á¦¹¥»÷µÈ¡£¡£¹¥»÷Õßͨ¹ýÊÜËðÕË»§¾ÙÐÐÐÅÏ¢ÇÔÈ¡¡¢²ÆÎñÊý¾ÝÇÔÈ¡¡¢Éí·Ý͵ÇÔÒÔ¼°BECڲƭµÈ·½·¨»ñµÃÀûÒæ¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/researchers-warn-office-365-1/

4¡¢Ñо¿Ö°Ô±·¢Ã÷100¶à¸öJenkins²å¼þ±£´æÇå¾²Îó²î

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
 
NCC GroupÇå¾²Ñо¿Ô±Viktor Gazdag·¢Ã÷100¶à¸öJenkins²å¼þ±£´æÇå¾²Îó²î¡£¡£JenkinsÊÇÓÉCloudBeesºÍJenkinsÉçÇøÎ¬»¤µÄ¿ªÔ´×Ô¶¯»¯Ð§ÀÍÆ÷£¬ £¬£¬£¬ËüÔÚÈ«ÇòÓµÓÐÁè¼Ý100ÍòÓû§¡£¡£Ò»Ð©Ò×Êܹ¥»÷µÄ²å¼þÊÇÓɵÚÈý·½¿ª·¢µÄ£¬ £¬£¬£¬ÓÃÓÚ»á¼ûTwitter¡¢AWSºÍAzureµÈЧÀÍ¡£¡£Ñо¿Ö°Ô±·¢Ã÷µÄ´ó´ó¶¼Îó²î¶¼ÊÇÃ÷ÎÄÃÜÂë´æ´¢¡¢CSRFÎó²î¡¢È±ÉÙȨÏÞ¼ì²éµÈ¡£¡£Jenkins¿ª·¢ÍŶÓÕë¶ÔÕâЩÎó²îÐû²¼ÁËÇ徲ͨ¸æ¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/84910/hacking/jenkins-plugins-flaws.html

5¡¢PrinterLogic´òÓ¡ÖÎÀíÈí¼þ¶à¸öÎó²î£¬ £¬£¬£¬¿Éµ¼ÖÂRCE

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
 
PrinterLogic´òÓ¡ÖÎÀíÈí¼þδ׼ȷÑéÖ¤ÆäSSLÖ¤ÊéºÍÈí¼þ¸üаüµÄȪԴºÍÍêÕûÐÔ£¬ £¬£¬£¬¿ÉÔÊÐí¹¥»÷ÕßÖØÐÂÉèÖÃÈí¼þ²¢Ô¶³ÌÖ´ÐдúÂ루CVE-2018-5408¡¢CVE-2018-5409£©¡£¡£±ðµÄ£¬ £¬£¬£¬PrinterLogicδ¶Ôä¯ÀÀÆ÷ÊäÈë¾ÙÐÐÌØÊâ×Ö·û¹ýÂË£¬ £¬£¬£¬¿ÉÔÊÐíδ¾­ÊÚȨµÄÔ¶³Ì¹¥»÷Õ߸ü¸ÄÉèÖÃÎļþ£¨CVE-2019-9505£©¡£¡£18.3.1.96¼°Ö®Ç°µÄ°æ±¾Ò×Êܹ¥»÷£¬ £¬£¬£¬½¨ÒéÓû§¾¡¿ì¾ÙÐÐÉý¼¶¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.kb.cert.org/vuls/id/169249/

6¡¢½üÒ»°ëµÄÃÀ¹úÆóҵûÓÐΪ¼ÓÖÝÏûºÄÕßÒþ˽·¨°¸×öºÃ×¼±¸

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾
 
ÃÀ¹ú¼ÓÖݵÄÏûºÄÕßÒþ˽·¨°¸£¨CCPA£©½«ÓÚ2020Äê1ÔÂ1ÈÕÉúЧ£¬ £¬£¬£¬µ«Ðí¶àÃÀ¹úÆóÒµ²¢Î´¶Ô´Ë×öºÃ×¼±¸¡£¡£Æ¾Ö¤¹ú¼ÊÒþ˽ר¼ÒЭ»á£¨IAPP£©ºÍOneTrustµÄÒ»Ïîµ÷ÑУ¬ £¬£¬£¬Ö»ÓÐ55%µÄÆóÒµ³Æ½«ÔÚ1ÔÂ1ÈÕ֮ǰ×öºÃ×¼±¸¡£¡£CCPAÓëGDPRÀàËÆ£¬ £¬£¬£¬Í¨¹ý¹æÔò½«Òþ˽µÄ¿ØÖÆÈ¨½»¸øÏûºÄÕߣ¬ £¬£¬£¬ÒªÇóÆóÒµÆ¾Ö¤ÍøÂçµÄÊý¾ÝΪÏûºÄÕßÌṩ¡°Õýµ±¡±µÄȨÁ¦¡£¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/nearly-half-of-us-orgs-not-ready-1/