¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20190220
°ä²¼¹¦·ò 2019-02-20
Bitdefender×êÑÐÍŶÓÔÙÒ»´ÎÓëÂÞÂíÄáÑǾ¯·½ºÍÅ·ÖÞÐ̾¯×éÖ¯ºÏ×÷£¬°ä²¼ÁËÀÕË÷Èí¼þGandCrabµÄÃâ·Ñ½âÃÜÆ÷¡£´Ë½âÃÜÆ÷¿É½âÃÜGandCrab×îа汾5.0.4µ½5.1¼ÓÃܵÄÎļþ£¬2018Äê11ÔÂÒÔÀ´£¬ÕâЩ°æ±¾Ò»ÏòÔÚ»ý¼«½øÐжñÒâ»î¶¯¡£ÔÚ´Ë֮ǰ£¬BitdefenderÔøÓÚ2018Äê2ÔºÍ10Ô°䲼¹ýGandCrabµÄ½âÃÜÆ÷£¬¿É½âÃÜGandCrab°æ±¾1.x¡¢4.xºÍ5.0.0µ½5.0.3¡£Æ¾¾ÝBitdefenderµÄÄÚ²¿Êý¾Ý£¬Æä½âÃÜÆ÷Òѱ»³¬¹ý1ÍòÃûÊܺ¦ÕßËùʹÓ㬲¢Ô®ÊÖËûÃÇÃâÓÚÖ§¸¶³¬¹ý500ÍòÃÀÔªµÄÊê½ð¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/bitdefender-releases-third-gandcrab-ransomware-free-decrypter-in-the-past-year/2¡¢Å·ÖÞµçÐų߶ÈлáETSIÍÆ³öÈ«ÇòÎïÁªÍø°²È«³ß¶È
Å·ÖÞµçÐų߶ÈлᣨETSI£©ÍƳöеÄÈ«ÇòºÏÓõÄÎïÁªÍø°²È«³ß¶È£¬ÒÔÍÆ¶¯Ïû·Ñ¼¶ÎïÁªÍø²úÆ·µÄ°²È«»ù×¼µÄ¸Ä½ø¡£¸Ã³ß¶È£¨ETSI TS 103 645£©½øÕ¹ÔÚ¼¤ÀøÔì×÷É̸ĽøÄÚÖÃÒþÖԺͰ²È«±£»¤µÄͬʱΪÏû·ÑÕßÌṩ·Ö±æÊг¡²úÆ·µÄ²½Öè¡£ÊÔͼ»ñµÃETSI³ß¶ÈÈÏÖ¤µÄÔì×÷É̱»ÒªÇóÖ´Ðзì϶Åû¶Õþ²ßºÍ²»ÈÝʹÓÃÈκÎͨÓÃĬÈÏÃÜÂë¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/europe-intros-global-iot-security-1-1/3¡¢Ó¡¶ÈIndane¹«Ë¾Ð¹Â¶Ô¼679ÍòAadhaar¿Í»§µÄÓ×ÎÒÐÅÏ¢
·¨¹ú°²È«×êÑÐÔ±Baptiste RobertÔÚһλÄäÃûÓ¡¶È×êÑÐÈËÔ±µÄÔ®ÊÖÏ£¬·¢ÏÖÓ¡¶È¹úÓÐÒº»¯Ê¯ÓÍÆø¹«Ë¾IndaneµÄ¹ÙÍøÐ¹Â¶ÁËÊý°ÙÍòAadhaar¿Í»§µÄÓ×ÎÒÐÅÏ¢¡£Robert°µÊ¾£¬ËûÄܹ»ÀûÓÃIndaneÒÆ¶¯APPÖеķì϶ÕÒµ½11062¸öÓÐЧµÄ¾ÏúÉÌID£¬²¢ÇÒÀûÓÃÕâЩIDÔÚ¾ÏúÉÌÃÅ»§ÍøÕ¾ÉÏ»ñÈ¡AadhaarÓû§µÄÓ×ÎÒÐÅÏ¢£¬Ô̺¬AadhaarºÅÂë¡¢ÐÕÃûºÍסַ¡£Robert¹À¼ÆÊÜÓ°ÏìµÄÓû§ÊýԼΪ679Íò¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2019/02/indane-aadhaar-leak.html4¡¢Google EarthÒâ±íй¶̨¾üÊ»ùµØµÄµØÀíµØÎ»

Google EarthÔÚÆä3DµØÍ¼µÄиüÐÂÖУ¬Òâ±íй¶ÁĘ̈¾üÊ»ùµØµÄÃô¸ÐµØÀíλÏàÐÅÏ¢¡£Ì¨±±°²¿ÓµÄ°®¹úÕßµ¼µ¯°ÂÃØ»ùµØ¡¢°²È«¾ÖºÍ¾üʵý±¨¾ÖµÄ·ÀÓù»ù´¡ÉèÊ©µÄλÏàÐÅÏ¢¶¼Ôâй¶£¬ÉõÖÁÔ̺¬È·ÇеĵØÎ»¡¢¾üÊ»ùµØ²¼¾Ö¡¢¹¹Öþ½á¹¹ºÍµ¼µ¯·¢ÉäÆ÷µÄµØÎ»µÈϸ½Ú¡£Ì¨°µÊ¾ÒѳÉÁ¢×¨ÃŵŤ×÷×飬Óë¹È¸èºÏ×÷ÒÔ½øÐÐÊʵ±µÄµ÷Õû¡£
ÔÎÄÁ´½Ó£º
https://cyware.com/news/google-earth-inadvertently-leaks-taiwans-sensitive-military-sites-43c25ab35¡¢LG±Ê¼Ç±¾µçÄÔµÄDevice ManagerÀûÓôæÔÚÌáȨ·ì϶
°²È«×êÑÐÈËÔ±Jackson T.·¢ÏÖLG±Ê¼Ç±¾µçÄÔµÄLG Device ManagerÀûÓ÷¨Ê½ÖдæÔÚÒ»¸öÌáȨ·ì϶¡£¸Ã·ì϶£¨CVE-2019-8372£©Óëµ×²ãÓ²¼þ½Ó¼û£¨LHA£©µÄÄÚºËģʽÇý¶¯·¨Ê½Óйأ¬·ÇÖÎÀíÔ±µÄ¹¥»÷Õß¿ÉÀûÓø÷ì϶ÌáȨÖÁSYSTEMȨÏÞ¡£JacksonÓÚ2018Äê11ÔÂ18ÈÕÏòLG»ã±¨Á˸÷ì϶£¬²¢°ä²¼ÁËÓйØPoCÊÓÆµ¡£LGÒѾ½¨¸´Á˸÷ì϶£¬²¢ÔÚ°ä²¼²¹¶¡¸üС£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/81323/hacking/lg-device-manager-flaw.html6¡¢NCBPÔâºÚ¿ÍÈëÇÖ£¬µ¼ÖÂ139¼Ò²ÍÌüµÄPoSϵͳϰȾ¶ñÒâÈí¼þ
ÃÀ¹úÃ÷ÄáËÕ´ïÖݵÄPoSϵͳ¹©¸øÉÌNCBPÐû³ÆÆäITϵͳÔâµ½ºÚ¿ÍÈëÇÖ£¬µ¼ÖÂ139¼Ò¾Æ°É¡¢²Í¹ÝºÍ¿§·ÈµêµÄPoSϵͳϰȾ¶ñÒâÈí¼þ¡£¸Ã¹¥»÷ÊÂÎñ²úÉúÔÚ1ÔÂ3ÈÕ£¬Æ¾¾ÝNCBPµÄ±íÊö£¬¹¥»÷ÕßÖ²ÈëµÄ¶ñÒâÈí¼þ¿ÉÇÔȡˢ¿¨Óû§µÄÐÕÃû¡¢ÐÅÓþ¿¨ºÅÂë¡¢ÓÐЧÆÚºÍCVVÂëµÈÐÅÏ¢¡£NCBPÈÔÔÚ½øÇ°½øÒ»²½µÄµ÷²é£¬ÒÔÈ·¶¨·ÖÆçÆóÒµÊÜÓ°ÏìµÄˮƽ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/pos-firm-says-hackers-planted-malware-on-customer-networks/
ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·ÒëºÍÕû¶Ù


¾©¹«Íø°²±¸11010802024551ºÅ