¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20181001

°ä²¼¹¦·ò 2018-10-01

¡¾Êý¾Ýй¶¡¿


Ó¢¹úÊØ¾Éµ³µÄ¹Ù·½»áÒéÈí¼þ´æÔÚ°²È«·ì϶£¬¶àÃû¸ß¹ÙÐÅϢй¶


https://www.zdnet.com/article/uk-conservative-party-conference-app-leaks-mps-personal-details/


Ò½ÁƱ£½¡¹«Ë¾Aspire HealthÔâµ½´¹µö¹¥»÷£¬²¿ÃÅ»¼ÕßµÄÐÅÏ¢±»ÇÔ


https://www.infosecurity-magazine.com/news/post-attack-aspire-health/


¡¾ÀÕË÷Èí¼þ¡¿


½©Ê¬ÍøÂçPhorpiexÕýÕë¶ÔÈ«ÇòÆóÒµ·Ö·¢ÀÕË÷Èí¼þGandCrab


https://www.zdnet.com/article/phorpiextrik-worm-pivots-to-infect-the-enterprise-with-ransomware-through-weak-endpoints/


¡¾°²È«·ì϶¡¿


×êÑÐÈËÔ±·¢ÏÖApple MDM¹¤¾ß´æÔÚ°²È«·ì϶£¬¿Éµ¼ÖÂÆóÒµÃô¸ÐÐÅϢй¶


https://threatpost.com/weakness-in-apple-mdm-tool-allows-access-to-sensitive-corporate-info/137737/


¡¾·ÖÎö»ã±¨¡¿


×êÑÐÍŶӰ䲼¹ØÓÚ·¸×ïÍÅ»ïCobalt GangµÄ·ÖÎö»ã±¨


https://www.secureworks.com/blog/cybercriminals-increasingly-trying-to-ensnare-the-big-financial-fish

ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·­ÒëºÍÕû¶Ù