1¡¢IBMºÍPonemon InstituteÁªºÏÐû²¼2019ÄêÊý¾Ýй¶±¾Ç®µ÷Ñб¨¸æ
ƾ֤IBMºÍPonemon InstituteÁªºÏÐû²¼µÄ2019Äê¶ÈÊý¾Ýй¶±¾Ç®µ÷Ñб¨¸æ£¬£¬£¬£¬2019ÄêÊý¾Ýй¶µÄÈ«Çòƽ¾ù±¾Ç®Îª392ÍòÃÀÔª£¬£¬£¬£¬±È2018ÄêÔöÌíÁË1.5£¥¡£¡£¡£¡£¡£¡£2014ÄêµÄÊý×ÖÊÇ350ÍòÃÀÔª£¬£¬£¬£¬2014ÖÁ2019Äêʱ´ú¹²ÔöÌíÁË12%¡£¡£¡£¡£¡£¡£ÕâÒ»Êý×Ö×î¸ßµÄ¹ú¼ÒÊÇÃÀ¹ú£¬£¬£¬£¬´ï819ÍòÃÀÔª£¬£¬£¬£¬ÊÇÈ«Çòƽ¾ùˮƽµÄÁ½±¶¶à¡£¡£¡£¡£¡£¡£Êý¾Ýй¶±¾Ç®×î¸ßµÄÐÐÒµÊÇÒ½ÁƱ£½¡£¬£¬£¬£¬¸ÃÐÐÒµ2019ÄêµÄƽ¾ùÊý×ÖÊÇ645ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¸Ã±¨¸æº¸ÇÁË2018Äê7ÔÂÖÁ2019Äê4ÔÂʱ´ú16¸ö¹ú¼ÒºÍµØÇøÄÚµÄ17¸öÐÐÒµµÄ507ÆðÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityintelligence.com/posts/whats-new-in-the-2019-cost-of-a-data-breach-report/
2¡¢ÐÂP2PÈ䳿²¡¶¾Crypto-MinersÔÚÒ°ÍâÆð¾¢Èö²¥
Yoroi-Cybaze Z-LabÑо¿Ö°Ô±·¢Ã÷Ò»ÖÖÔÚÒ°ÍâÈö²¥Crypto-MinersµÄP2PÈ䳿²¡¶¾¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þαװ³ÉÖøÃû¸èÊֵijªÆ¬ºÏ¼¯£¬£¬£¬£¬Ê¹ÓÃP2P¹²ÏíÍøÂç¾ÙÐÐÈö²¥¡£¡£¡£¡£¡£¡£´ÓBitTorrentÍøÂçÏÂÔØµÄÎļþÊÇÒ»¸ö°üÀ¨ÆäËü¼¸¸öÎļþµÄSFXÎĵµ£¬£¬£¬£¬ÕâÖÖÎĵµÔÊÐí¹¥»÷ÕßÒþ²Ø¶ñÒâµÄPEÄÚÈݲ¢ÏÔÖø½µµÍɱ¶¾ÒýÇæµÄ¼ì²âÂÊ¡£¡£¡£¡£¡£¡£×îÖÕµÄpayloadÊÇÒ»¸öÍÚ¿óÈí¼þ£¬£¬£¬£¬µ«¹¥»÷ÕßÒ²¿ÉÄܻὫÆäÌæ»»ÎªRAT»òÀÕË÷²¡¶¾¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/88795/malware/p2p-worm-spreading-crypto-miners.html
3¡¢ºÚ¿ÍʹÓýüÆÚWordPress²å¼þÖеÄXSSÎó²îÈö²¥¶ñÒâ¹ã¸æ
WordfenceÑо¿ÍŶӷ¢Ã÷Ò»¸öÕýÔÚ¾ÙÐеĶñÒâ¹ã¸æ»î¶¯£¬£¬£¬£¬¹¥»÷ÕßʹÓÃWordPress²å¼þComing Soon Page&Maintenance ModeÖеÄXSSÎó²î£¬£¬£¬£¬ÏòÓû§ÍÆËͶñÒâ¹ã¸æ¡£¡£¡£¡£¡£¡£ÕâЩ¶ñÒâ¹ã¸æ½«Óû§Öض¨ÏòÖÁÊÖÒÕÖ§³ÖÕ©Æ¡¢¶ñÒâAPKÏÂÔØºÍÒ©Æ·¹ã¸æµÈ¶ñÒâÍøÕ¾¡£¡£¡£¡£¡£¡£¸Ã²å¼þÖеÄÎó²îÊÇÒ»¸ö´æ´¢ÐÍXSSÎó²î£¬£¬£¬£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß×¢Èë¶ñÒâJavaScript»òHTML´úÂë¡£¡£¡£¡£¡£¡£¸Ã²å¼þµÄ1.7.8¼°¸üµÍ°æ±¾Êܵ½Ó°Ï죬£¬£¬£¬²å¼þµÄ×îа汾ÒÑÐÞ¸´ÁËÕâ¸öÎó²î¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/hackers-exploit-recent-wordpress-plugin-bugs-for-malvertising/
4¡¢Ñо¿ÍŶÓÅû¶Comodo AntivirusÖеĶà¸öÇå¾²Îó²î
TenableÅû¶Comodo Antivirus/Comodo Antivirus AdvancedÖеĶà¸öÇå¾²Îó²î£¬£¬£¬£¬°üÀ¨ÍâµØÌáȨÎó²î£¨CVE-2019-3969£©¡¢í§ÒâÎļþдÈëÎó²î£¨CVE-2019-3970£©¡¢¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2019-3971£©¡¢Ô½½ç¶ÁÎó²î£¨CVE-2019-3972£©ÒÔ¼°Ô½½çдÎó²î£¨CVE-2019-3973£©¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÓ°ÏìÁËComodo Antivirus°æ±¾12.0.0.6810£¬£¬£¬£¬µ«CVE-2019-3973Ö»Ó°ÏìÁË11.0.0.6582¼°Ö®Ç°µÄ°æ±¾¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚgithubÉÏÐû²¼ÁËÏà¹ØPoC¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.tenable.com/security/research/tra-2019-34
5¡¢ÃÀ¹ú¹ú¼ÒÇå¾²¾ÖÍýÏ뽨ÉèÐÂÍøÂçÇå¾²ÀíÊ»á
7ÔÂ23ÈÕÃÀ¹ú¹ú¼ÒÇå¾²¾Ö£¨NSA£©Ðû²¼ÍýÏ뽨ÉèÒ»¸öеÄÍøÂçÇå¾²·ÀÓù²¿·Ö£¬£¬£¬£¬¸Ã²¿·Ö½«×¨×¢ÓÚ±£»£»£»£»£»£»¤ÃÀ¹úÃâÊÜÍâ¹úµÄÍøÂçÍþв¡£¡£¡£¡£¡£¡£Ð²¿·Ö±»ÃüÃûÎªÍøÂçÇå¾²ÀíÊ»ᣨCybersecurity Directorate£©£¬£¬£¬£¬½«ÓÚ10ÔÂ1ÈÕ×îÏÈÔËÓª¡£¡£¡£¡£¡£¡£Æ¾Ö¤NSAµÄ˵·¨£¬£¬£¬£¬ÍøÂçÇå¾²ÀíÊ»áµÄ½ÇÉ«½«ÊǸÄÉÆÃÀ¹úÔÚº£ÄÚµÄÍøÂçÇå¾²Ì¬ÊÆ£¬£¬£¬£¬ËüµÄÒ»ÏîÖ÷ÒªÊÂÇ齫ÊÇÇ鱨¹²ÏíºÍÎó²îÆÀ¹À¡£¡£¡£¡£¡£¡£Anne Neuberger½«³ÉΪ¸Ã²¿·ÖµÄµÚÒ»Î»ÍøÂçÇå¾²×ܼࡣ¡£¡£¡£¡£¡£Ëý½«Ö±½ÓÏòNSA¾Ö³¤Paul Nakasone½«¾ü»ã±¨ÊÂÇé¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/nsa-to-establish-a-defense-minded-division-named-the-cybersecurity-directorate/
6¡¢Ç°Î÷ÃÅ×ÓÌõÔ¼¹¤ÈÏ¿ÉÔÚ¹«Ë¾µç×Ó±í¸ñÖÐÖ²ÈëÂß¼Õ¨µ¯
ǰÎ÷ÃÅ×ÓÌõÔ¼¹¤David TinleyÈÏ¿ÉÔÚΪ¹«Ë¾½¨ÉèµÄµç×Ó±í¸ñÖÐÖ²ÈëÂß¼Õ¨µ¯£¬£¬£¬£¬Ëû½«ÃæÁÙ×î¸ß10ÄêµÄî¿ÏµÒÔ¼°25ÍòÃÀÔªµÄ·£¿£¿£¿î¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ïà¹Ø·¨Í¥Îļþ£¬£¬£¬£¬TinleyΪÎ÷ÃÅ×ÓµÄMonroeville PAЧÀÍ´¦ÌṩÁ˽üÊ®ÄêµÄÈí¼þЧÀÍ£¬£¬£¬£¬ËûÔÚ¸ø¹«Ë¾½¨ÉèÓÃÓÚÖÎÀí×°±¸¶©µ¥µÄµç×Ó±í¸ñʱֲÈëÁËÂß¼Õ¨µ¯£¬£¬£¬£¬ÕâЩըµ¯»áÔÚÌØ¶¨ÈÕÆÚ´¥·¢£¬£¬£¬£¬µ¼ÖÂÎļþÍ߽⡣¡£¡£¡£¡£¡£Ã¿´ÎÍß½âʱTinley¶¼»áÊÕÈ¡ÓöÈÀ´ÐÞ¸´¸ÃÎļþ£¬£¬£¬£¬Ö±µ½Á½ÄêºóÎ÷ÃÅ×Ó·¢Ã÷ÁËÂß¼Õ¨µ¯²¢Ìá³öÁËÖ¸¿Ø¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/siemens-contractor-pleads-guilty-to-planting-logic-bomb-in-company-spreadsheets/