¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20181127
°ä²¼¹¦·ò 2018-11-27
µÂ¹úµ±¾Ö°ä²¼¼ÒÍ¥¼°Ó×ÐͰ칫£¨SOHO£©Â·ÓÉÆ÷µÄ°²È«Ö¸ÄÏ£¬Ö¼ÔÚ¶Ô·ÓÉÆ÷°²È«Ôì¶©³ß¶È»¯µÄ¹æ¶¨¡£Õâ·Ý22Ò³µÄÎĵµ×ÛºÏÁË·ÓÉÆ÷³§ÉÌ¡¢µçÐŹ«Ë¾ºÍÓ²¼þÉçÇøµÄ¶¨¼û£¬ÓÉÁª¹úÐÅÏ¢°²È«°ì¹«ÊÒ£¨BSI£©½øÐа䲼¡£Ò»Ð©³ÁÒªµÄ½¨ÒéÔ̺¬Â·ÓÉÆ÷±ØÐëÖ§³Ö²¢ÇÒĬÈÏʹÓÃWPA2ºÍ̸£»WiFiÃÜÂëµÄ³¤¶Åצ¸Ã²»¶ÌÓÚ20λ£»ÃÜÂëÑéÖ¤±ØÐëÔ¤·À±©Á¦¹¥»÷£»Â·ÓÉÆ÷²»µÃ´øÓÐÈκÎδ¼Í¼µÄºóÃÅÕË»§µÈ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/germany-proposes-router-security-guidelines/2¡¢×êÑÐÅú×¢Ò»°ëÒÔÉϵÄPHIÐÅϢй¶ÓëÒ½ÁÆ»ú¹¹µÄÄÚ²¿ºöÂÔÓйØ
ÃÜЪ¸ùÖÝÁ¢´óѧºÍÔ¼º²»ôÆÕ½ð˹´óѧµÄÒ»ÏîÐÂ×êÑÐÅú×¢£¬53%µÄÓ×ÎÒ½¡È«ÐÅÏ¢£¨PHI£©Ð¹Â¶ÊÂÎñÊÇÓÉÒ½ÁÆ»ú¹¹µÄÄÚ²¿³É·Öµ¼Öµġ£¸Ã×êÑзÖÎöÁË7ÄêÄÚÃÀ¹ú²úÉúµÄ½«½ü1800ÆðPHIй¶ÊÂÎñ£¬ÆäÖÐ33¼ÒÒ½Ôº²úÉúÁ˲»Ö¹1Æðй¶ÊÂÎñ¡£ÕâЩй¶µÄÔÒò¹²ÓÐ6À࣬Ô̺¬ÍµÇÔ¡¢Î´ÊÚȨ½Ó¼û¡¢ºÚ¿Í¹¥»÷»òITÊÂÎñ¡¢ÃÔʧ¡¢²»µ±´ëÖÃÒÔ¼°ÆäËü¡£ÆäÖÐ53%µÄй¶ÓëÄÚ²¿³É·ÖÓйأ¬¶ø²»ÊÇÓɺڿͻò±í²¿³É·Öµ¼Ö¡£
ÔÎÄÁ´½Ó£º
https://www.helpnetsecurity.com/2018/11/26/internal-negligence-data-breaches/3¡¢IntelÕë¶Ô¹í»ê±äÌåµÄ½¨¸´´ó·ù½µµÍÁËLinux 4.20ÖеĻúÄÜ
IntelÕë¶Ô¹í»ê±äÌå2£¨CVE-2017-5715£©µÄ½¨¸´´ëÊ©´ó·ù½µµÍÁËLinuxÄÚºË4.20ÖеĻúÄÜ¡£Æ¾¾ÝPhoronixµÄ»ù×¼²âÊÔ£¬¾ß±¸³¬Ï̼߳¼ÊõµÄCPU£¨¼´Core i3ÒÔÉÏ£©ÊÜÓ°Ïì×î´ó£¬Æ¾¾Ý²âÊÔÀûÓ÷¨Ê½µÄ·ÖÆç£¬ÔÚCore i9ÉÏ×î¸ß¿É´ïµ½30%-50%µÄ»úÄܽµÂ䣬ÕâÏÔÈ»ÊDz»³É½ÓÊܵġ£¸ÃÎÊÌâÓëSTIBPÓйأ¬STIBPÊÇIntelÌṩµÄÈý¸ö½¨¸´´ëʩ֮һ£¬ÆäËüÁ½¸öÊÇIBRSºÍIBPB¡£
ÔÎÄÁ´½Ó£º
https://nakedsecurity.sophos.com/2018/11/26/spectre-mitigation-guts-linux-4-20-performance/4¡¢×êÑÐÍÅ¶Ó°ä²¼ÒÆ¶¯¶ñÒâÈí¼þXLoaderºÍFakeSpyµÄ·ÖÎö»ã±¨
Ç÷Ïò¿Æ¼¼×êÑÐÍŶӰ䲼¹ØÓÚAndroid¶ñÒâÈí¼þXLoaderºÍFakeSpyµÄ·ÖÎö»ã±¨¡£XLoader³öÏÖÓÚ2018Äê4Ô£¬¶øFakeSpyÔòÔÚ6Ô·ÝÏòAndroidÓû§ÌáÒé¹¥»÷¡£½ØÖÁ10Ô£¬È«Çò¹²ÓÐ384748ÃûÊܺ¦ÕßÊܵ½XLoaderºÍFakeSpyµÄ¹¥»÷£¬ÆäÖдó²¿ÃÅλÓÚº«¹úºÍÈÕ±¾¡£Æ¾¾ÝÇ÷Ïò¿Æ¼¼µÄÐÂ×êÑУ¬XLoaderºÍFakeSpyҪôÊôÓÚͳһ¸ö¹¥»÷×éÖ¯£¬ÒªÃ´ËüÃǵÄÔËÓªÕßÖ®¼ä´æÔÚÁªÏµ¡£Í¨¹ý¶ÈÎöXLoaderºÍFakeSpyµÄ´úÂë½á¹¹ºÍÐÐΪģʽ£¬×êÑÐÈËÔ±»¹ÒÔΪFakeSpyÓë·¸×ïÍÅ»ïYanbian Gang´æÔÚ¹ØÁª¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/a-look-into-the-connection-between-xloader-and-fakespy-and-their-possible-ties-with-the-yanbian-gang/5¡¢¿¨°Í˹»ù°ä²¼2019Äê½ðÈÚÍþвºÍ¼ÓÃÜÇ®±ÒÍþвµÄÇ÷ÏòÔ¤²â
¿¨°Í˹»ù³¢ÊÔÊÒ°ä²¼¹ØÓÚ2019Äê½ðÈÚ»ú¹¹¡¢¼ÓÃÜÇ®±ÒÒÔ¼°¹¤ÒµÆóÒµµÄÍþвÇ÷ÏòµÄÔ¤²â·ÖÎö¡£2019Ä깤ҵÆóÒµÃæ¶ÔµÄÌôÕ½Ô̺¬¹¥»÷Ãæ²»ÐÝÔö³¤¡¢·¸×ï·Ö×ÓºÍÌØÊ⼯ÌåµÄÐËÖÂÈÕÒæÔö³¤¡¢ÐÅÏ¢²»Í¨Ã÷µ¼Öµ͹ÀͨÀýÍþвˮƽÒÔ¼°¶ÔÍþвϸ½ÚµÄÎó»áµ¼ÖÂδÄܽøÐÐ×îÓű£»¤¡£¹ØÓÚ¼ÓÃÜÇ®±ÒµÄÔ¤²âÔòÔ̺¬¶ÔÇø¿éÁ´Óô¦µÄË÷Çó»òÐí»áÒþû¡¢¼ÓÃÜÇ®±Ò×÷Ϊ֧¸¶¼¿Á©µÄÓô¦¿ÉÄܻήÂäÒÔ¼°¼ÓÃÜÇ®±ÒµÄ¼ÛÖµ²»»áÔٻص½2017ÄêµÄ¸ßλ¡£¹ØÓÚ½ðÈÚ»ú¹¹µÄÔ¤²âÔ̺¬¿ÉÄÜ»á²úÉúͨ¹ýÉúÎï¼ø±ðÊý¾ÝÖ´ÐеÄ͵ÇÔ£¬Õë¶ÔÓ¡°ÍµØÓò¡¢¶«ÄÏÑǺÍÖÐÅ·µÄ½ðÈÚÍþв¿ÉÄÜ»á¼Ó¾ç£¬¹©¸øÁ´¹¥»÷½«»á³ÖÐøµÈ¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/ksb-cyberthreats-to-financial-institutions-2019-overview-and-predictions/88944/6¡¢Å·ÖÞÐ̾¯×éÖ¯¹Ø¹Ø³¬¹ý3.36Íò¸öÊÛ¼ÙÓòÃû
ƾ¾ÝÅ·ÖÞÐ̾¯×éÖ¯µÄÐÂΟ壬ŷÃ˸÷µØµÄ·¨ÂÉ»ú¹¹Òѳɹ¦¹Ø¹ØÁË33654¸öÏúÊÛ¼ÙðαÁÓ²úÆ·£¨Ô̺¬¼ÙÒ©¡¢µÁ°æµçÓ°¡¢µÁ°æÒôÀֵȣ©µÄÓòÃû¡£´Ë±í£¬ÖªÊ¶²úȨ·¸×ïе÷ͬÃË£¨IPC3£©»¹¿ÛÁôÁË12ÃûÏÓÒÉÈ˲¢²é»ñÁ˼ÛÖµ³¬¹ý100ÍòÅ·ÔªµÄÕË»§¡£¸ÃÐж¯ÊÇ2014ÄêÆô¶¯µÄ½ø¹¥ÊÛ¼ÙµÄIn Our Sites£¨IOS£©Ðж¯µÄÒ»Á¬¡£
ÔÎÄÁ´½Ó£º
https://www.europol.europa.eu/newsroom/news/operation-takes-down-over-33-600-internet-domains-selling-counterfeits-goodsÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·ÒëºÍÕû¶Ù


¾©¹«Íø°²±¸11010802024551ºÅ