¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20190127
°ä²¼¹¦·ò 2019-01-27Cobalt StrikeжñÒâ»î¶¯ÀûÓÃGoogleÔÆ¶Ëƽ̨·Ö·¢payload
https://www.infosecurity-magazine.com/news/targeted-attacks-abusing-google/
ÐÂÍøÂç´¹µö¹¥»÷ͬʱ³½·¢ÀÕË÷Èí¼þGandcrabºÍÒøÐÐľÂíUrsnif
https://threatpost.com/phishing-gandcrab-ursnif/141182/
¡¾¶ñÒâÈí¼þ¡¿
жñÒâÈí¼þRazy£¬ÀûÓÃä¯ÀÀÆ÷µÄ¶ñÒâ²å¼þÇÔÈ¡¼ÓÃÜÇ®±Òhttps://threatpost.com/razy-browser-extensions-theft/141181/
¡¾·ì϶²¹¶¡¡¿
Phoenix Contact½¨¸´FL SWITCH¹¤Òµ»¥»»»úÖеÄ6¸ö°²È«·ì϶https://www.securityweek.com/flaws-expose-phoenix-contact-industrial-switches-attacks
Check Point½¨¸´ZoneAlarm·À»ðǽÖеı¾µØÌáȨ·ì϶
https://securityaffairs.co/wordpress/80310/hacking/zonealarm-provilefe-escalation.htmlÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·ÒëºÍÕû¶Ù


¾©¹«Íø°²±¸11010802024551ºÅ