¡¾Íþвµý±¨¡¿×êÑÐÍŶӷ¢ÏÖÕë¶Ô°ÍÎ÷ÒøÐеÄDNS½Ù³Ö¹¥»÷»î¶¯
Radware×êÑÐÍŶӷ¢ÏÖ¹¥»÷ÕßÔÚÕë¶Ô°ÍÎ÷µÄDLink DSL·ÓÉÆ÷£¬Í¨¹ýDNS½Ù³Ö¹¥»÷½«ÒøÐÐÓû§³Á¶¨ÏòÖÁ´¹µöÍøÕ¾²¢ÇÔÈ¡ÆäÒøÐÐÕË»§µÄµÇ¼ʹ´¦¡£¹¥»÷ÕßÅú¸ÄÁËÕâЩ·ÓÉÆ÷É豸ÖеÄDNSÉèÖ㬽«ÆäÖ¸Ïò¶ñÒâµÄDNS·þÎñÆ÷£¨69.162.89.185ºÍ198.50.222.136£©£¬ÕâЩÉ豸ÔÚ½Ó¼ûBanco de Brasil£¨www.bb.com.br£©ºÍItau Unibanco£¨www.itau.com.br£©Ê±½«±»³Á¶¨ÏòÖÁ¶ñÒâµÄipµØÖ·¡£×êÑÐÈËԱǿµ÷³Æ£¬ÕâÖÖ½Ù³Ö²»±ØÒªÈκεÄÓû§½»»¥¡£
ÔÎÄÁ´½Ó£ºhttps://security.radware.com/ddos-threats-attacks/threat-advisories-attack-reports/dns-hijacking-brazil-banks/
¡¾Íþвµý±¨¡¿×êÑÐÍŶÓÑÝʾÈôºÎ¹¥»÷Ò½ÁÆÉ豸£¬·ÂÕÕºÍÅú¸Ä»¼ÕßµÄÐÔÃüÌåÕ÷
McAfee×êÑÐÍŶÓÑÝʾÈôºÎ¹¥»÷Ò½ÁÆÉ豸²¢·ÂÕÕºÍÅú¸Ä»¼ÕßµÄÐÔÃüÌåÕ÷¡£RWHATºÍ̸ÊÇÒ½ÁÆÉ豸ÓÃÓÚ¼à¿Ø»¼Õß²¡ÇéºÍÐÔÃüÌåÕ÷µÄÍøÂçºÍ̸֮һ£¬×êÑÐÈËÔ±·¢ÏָúÍ̸ûÓÐʹÓÃÉí·ÝÑéÖ¤ºÍ¼ÓÃÜ£¬²¢ÇÒ·¢ËÍÁËһЩÃô¸ÐµÄ¡¢ÓÉHIPAA¹ÜÔìµÄ»¼ÕßÐÅÏ¢£¬ÀýÈçÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢»¼Õß´²Î»ºÅºÍ·¿¼äºÅµÈ¡£×êÑÐÈËÔ±Äܹ»Í¨¹ýµ¥Ò»µÄ²½Ö轫ÐÅÏ¢×¢ÈëºÍ̸ÖÐÀ´·ÂÕÕºÍÅú¸Ä»¼ÕßµÄÊý¾Ý£¬Õâ¿ÉÄܺýŪҽÎñÈËÔ±£¬µ¼ÖÂÑϳÁµÄºó¹û¡£
ÔÎÄÁ´½Ó£ºhttps://securingtomorrow.mcafee.com/mcafee-labs/80-to-0-in-under-5-seconds-falsifying-a-medical-patients-vitals/
¡¾¶ñÒâÈí¼þ¡¿°²È«×êÑÐÈËÔ±·¢ÏÖÀÕË÷Èí¼þDharmaµÄбäÖÖCmb
°²È«×êÑÐÈËÔ±Michael Gillespie·¢ÏÖÀÕË÷Èí¼þDharmaµÄÒ»¸öбäÖÖ£¬¸Ã±äÖÖÔÚ¼ÓÃܵÄÎļþºó¸½¼Ó.cmbÀ©´óÃû¡£Ä¿Ç°»¹Ã»Óз¨×ÓÃâ·Ñ½âÃܸñäÖÖ¼ÓÃܵÄÎļþ¡£¹¥»÷ÕßÊ×ÏÈÔÚInternetÉÏɨÃ迪ÆôÁËTCP¶Ë¿Ú3389µÄÖ÷»ú£¬¶øºóͨ¹ý±©Á¦ÆÆ½âÆäRDPÃÜÂ룬²¢ÔÚ»ñµÃ½Ó¼ûȨÏÞºóÊÖ¶¯×°ÖÃÀÕË÷Èí¼þDharma¡£¸Ã±äÖÖÔÚ¼ÓÃÜÎļþºó¸½¼ÓµÄÀ©´óÃûÀàËÆÓÚ.id-[id].[email].cmbµÄÌåʽ¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/new-cmb-dharma-ransomware-variant-released/
¡¾Êý¾Ýй¶¡¿×êÑÐÈËÔ±³ÆGoDaddyÒòAWSÅäÖÃÃýÎóµ¼Ö²¿ÃÅÊý¾Ýй¶
UpGuard×êÑÐÍŶӷ¢ÏÖGoDaddyÒòAWSÅäÖÃÃýÎóµ¼Ö²¿ÃÅÊý¾Ýй¶£¬Ð¹Â¶Éæ¼°µÄÎļþËÆºõÊÇGoDaddyÔÚAWSÔÆÉÏÔËÐеĻù´¡ÉèÊ©¡£Ð¹Â¶µÄÎļþÔ̺¬Ô¼3.1Íò¸öϵͳµÄ¸ù»ùÅäÏàÐÅÏ¢£¬ÈçÖ÷»úÃû¡¢²Ù×÷ϵͳ¡¢¹¤×÷¸ºÔØ¡¢AWSÇøÓò¡¢ÄÚ´æºÍCPU¹æ¸ñµÈ£¬ÉõÖÁ»¹Ô̺¬AWSÔÚ·ÖÆçÇé¿öÏ´ÍÓëµÄÕÛ¿ÛÐÅÏ¢µÈ¡£ÏÖʵÉÏ£¬ÕâЩÊý¾ÝÖ±½Óй¶ÁËÒ»¸ö¹æÄ£¼«¶È´óµÄAWSÔÆ»ù´¡ÉèÊ©²¿Êð»·¾³¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75271/data-breach/godaddy-aws-data-leak.html
¡¾°²È«²¥±¨¡¿ÃÀ¹úTSAÈÏ¿ÉÕë¶ÔÃÀ¹ú¹«ÃñµÄÐÂ¼à¿ØÏîÄ¿Quiet Skies
ƾ¾ÝÃÀ¹úÔËÊ䰲ȫÖÎÀí¾Ö£¨TSA£©£¬½ü¼¸¸öÔÂÀ´Quiet SkiesÏîÄ¿ÒѾ¼à¿ØÁËÔ¼5000Ãû¹úÄÚº½°àÉϵÄÃÀ¹ú¹«Ãñ¡£¸ÃÏîĿּÔÚÍøÂ繫Ãñ¼°ÆäÐÐΪµÄ¿í·ºÐÅÏ¢£¬ÆäÊܵ½ÁËÒþÖÔ±£»¤Ö÷ÒåÕߵį·ÆÀ£¬ÓÉÓÚµ±¾Ö¶ÔûÓÐÉæÏÓ·¸×ï»ò²Î¼Ó¿Ö²À×éÖ¯µÄÃÀ¹ú¹«ÃñÖ´ÐÐÁË¼à¿Ø¡£Æ¾¾ÝQuiet SkiesÏîÄ¿£¬Ã¿Ìì³Ë×ø¹úÄÚº½°àµÄ¹«ÃñÖж¼ÓÐÔ¼40-50È˱»Ñ¡ÖУ¬ÆäÖÐÔ¼ÓÐ35ÈË»áÊܵ½¿Õ¾¯µÄ¸ú×ÙºÍ¼à¿Ø¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75263/digital-id/quiet-skies-surveillance-us.html
¡¾·ì϶²¹¶¡¡¿×êÑÐÈËÔ±Åû¶25¿îAndroidÖÇÄÜÊÖ»úÖеÄ47¸ö°²È«·ì϶
Kryptowire°²È«×êÑÐÈËÔ±Åû¶25¿îAndroidÖÇÄÜÊÖ»úµÄ¹Ì¼þºÍĬÈÏÀûÓÃÖеÄ47¸ö°²È«·ì϶£¬ÆäÖÐÔÚÃÀ¹úÏúÊÛµÄÊÖ»úÐͺÅΪ11¿î¡£Ãûµ¥ÉϵÄÖÇÄÜÊÖ»úÆ·ÅÆ£¨OEM£©Ô̺¬ÖÐÐË¡¢Ë÷Äᡢŵ»ùÑÇ¡¢LG¡¢»ªË¶ºÍAlcatelµÈ¡£Ò»Ð©·ì϶ÔÊÐí¹¥»÷Õß´ÓÓû§µÄÊÖ»úÖмìË÷»ò·¢ËͶÌÐÅ¡¢½ØÆÁ»ò¼ÆÁ¡¢¼ìË÷ÁªÏµÈËÁÐ±í¡¢Ç¿Ôì×°ÖõÚÈý·½ËÁÒâÀûÓÃÒÔ¼°´ÓÉ豸ÉϲÁ³ýÓû§µÄÊý¾ÝµÈ¡£¾ßÌå·ì϶ÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/vulnerabilities-found-in-the-firmware-of-25-android-smartphone-models/