²¿ÃÅOutLookÕÊ»§ÐÅϢй¶£»Ð¶ñÒâÈí¼þ¿É´Û¸ÄCATºÍMRIɨÃèÒǵÄÒ½ÁÆÉ¨ÃèÁ˾Ö

°ä²¼¹¦·ò 2019-04-15
1.΢ÈíÔâºÚ¿Í¹¥»÷£¬²¿ÃÅÓû§µÄOutLookÕÊ»§ÐÅϢй¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


΢Èí֤ʵ1ÔÂ1ÈÕÖÁ3ÔÂ29ÈÕÆÚ¼ä¹¥»÷ÕßÈëÇÖÁËÒ»¸ö¿Í»§Ö§³Ö´úÀíÕË»§£¬²¢ÀûÓøÃÕË»§½Ó¼ûÁ˿ͻ§Ö§³ÖÃÅ»§ÍøÕ¾¼°²¿ÃÅOutLookÓû§µÄÓйØÐÅÏ¢¡£ÕâЩÐÅÏ¢Ô̺¬µç×ÓÓʼþµØÖ·¡¢Îļþ¼ÐÃû³Æ¡¢ÓʼþÖ÷Ìâ¼°ÁªÏµÈ˵ç×ÓÓʼþµØÖ·£¬µ«²»Ô̺¬Óʼþ¼°¸½¼þµÄÄÚÈÝ¡£Ä¿Ç°Éв»Ã÷ÏÔ¹¥»÷µÄ¾ßÌåϸ½Ú£¬µ«Î¢Èí°µÊ¾ÒѾ­½ûÓÃÁ˸ôúÀíÕË»§µÄÍ´´¦£¬²¢Í¨ÖªËùÓÐÊÜÓ°ÏìµÄÓû§¡£Î¢ÈíҲûÓÐй©ÊÜÓ°ÏìµÄÓû§×ÜÊý¡£

   

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/04/microsoft-outlook-email-hack.html


2.°®´ïºÉÖÝÀ¶Ê®×Ö»á¹ÙÍøÔâºÚ¿ÍÈëÇÖ£¬²¿ÃÅÓû§µÄÓ×ÎÒÐÅϢй¶

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°®´ïºÉÖÝÀ¶Ê®×Ö»áµÄµçÉÌÍøÕ¾ÓÚ3ÔÂ21ÈÕÔâºÚ¿ÍÈëÇÖ£¬¹¥»÷ÕßÊÔͼÌáÒéڲƭÐÔµÄÂòÂô£¬µ«Ã»Óгɹ¦¡£´Ë±í£¬¹¥»÷Õß»¹½Ó¼ûÁËÔ̺¬Óû§PHIÐÅÏ¢µÄ»ã¿îÎļþ£¬Ð¹Â¶µÄÐÅÏ¢Ô̺¬Óû§µÄÐÕÃû¡¢µÇ¼Ç/¶©ÔĺÅÂë¡¢·þÎñÈÕÆÚ¡¢Ò½ÁÆ·þÎñÌṩÕßµÄÃû×Ö¡¢»¼ÕßÕ˺𢏶¿îÐÅÏ¢µÈ£¬µ«²»Ô̺¬Éç»á°²È«ºÅÂë¡¢¼ÝÕÕID¼°ÐÅÓþ¿¨ºÅÂ롣ƾ¾Ýµ÷²éÁ˾Ö£¬À¶Ê®×Ö»áÒÔΪ¹¥»÷Õß½Ó¼ûÁËÔ¼1%µÄÓû§ÐÅÏ¢¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/blue-cross-of-idaho-notice-of-privacy-breach/


3.ºÚ¿ÍÍÅ»ïÔÚÍøÉϰ䲼ÊýǧÃûÃÀ¹ú¾¯Ô±ºÍÁª¹ú¼éϸµÄÓ×ÎÒÊý¾Ý

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

¾Ý±íýTechcrunch±¨Â·£¬Ò»¸öºÚ¿ÍÍÅ»ïÐû³ÆÈëÇÖÁËÊýÊ®¸öFBI´ÓÊôÍøÕ¾£¬²¢ÇÔÈ¡ÁËÊôÓÚÃÀ¹úÁª¹ú»ú¹¹ºÍ¹«¹²·þÎñ×éÖ¯Ô±¹¤µÄ³¬¹ýÒ»°ÙÍòÌõÊý¾Ý¡£¸ÃÍÅ»ïÔÚÍøÉϰ䲼ÁËÊýÊ®¸öÎļþ£¬ÆäÖÐÔ̺¬Ô¼4000ÃûÃÀ¹ú¾¯Ô±ºÍÁª¹ú¼éϸµÄ¾ßÌåÓ×ÎÒÐÅÏ¢£¬ÕâЩÐÅÏ¢Ô̺¬ÐÕÃû¡¢Ó×ÎҺ͵±¾ÖÓÊÏ䵨ַ¡¢Ö°Î»¡¢µç»°ºÅÂëºÍÓÊÕþµØÖ·¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/83763/data-breach/fbi-affiliated-websites-hack.html


4.ÃÀ¹ú¸ñÁÖά¶ûÊÐÔâÐÂÀÕË÷Èí¼þRobbinHood¹¥»÷£¬ÊÂÎñÈÔÔÚµ÷²é

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÐÂÀÕË÷Èí¼þRobbinHoodÔÚ»ý¼«½øÐй¥»÷»î¶¯£¬×êÑÐÈËÔ±ÉÐÎ´ÍøÂçµ½RobbinHoodµÄÑù±¾£¬µ«ÒÑÓжàÃûÊܺ¦ÕßÖÐÕС£RobbinHoodµÄÊê½ðÊÇÃ¿Ì¨ÍÆËã»ú3±ÈÌØ±Ò»òÕû¸öÍøÂç7±ÈÌØ±Ò£¬²¢ÔÚµÚËÄÌìÖ®ºóÊê½ðÖðÈÕÔö³¤1ÍòÃÀÔª¡£ÔÚRobbinHoodµÄTorÖ§¸¶Ò³ÃæÉÏ£¬¹¥»÷ÕßÇ¿µ÷ËûÃǼ«¶È¹ØÇÐÊܺ¦ÕßµÄÒþÖÔ£¬²¢½«ÔÚÊܺ¦Õ߸¶¿îºóɾ³ýÓйؼͼ£¬Ô̺¬¼ÓÃÜÃÜÔ¿ºÍIPµØÖ·¡£Ã½Ì屨·³Æ±±¿¨ÂÞÀ´ÄÉÖݵĸñÁÖά¶ûÊÐÔâµ½RobbinHood¹¥»÷£¬Óйط¨ÂÉ»ú¹¹ÔÚ½øÐе÷²é¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/robbinhood-ransomware-claims-its-protecting-your-privacy/


5.д¹µö»î¶¯The Nasty List£¬ÖØÒªÇÔÈ¡InstagramÓû§Í´´¦

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


еĴ¹µöȦÌס°The Nasty List¡±£¨ÁîÈËÌÖÑáµÄÃûµ¥£©ÔÚInstagramÉÏ´«²¼£¬ÖØÒªÇÔÈ¡Óû§µÄµÇ¼ʹ´¦¡£¸Ã´¹µöÐÅÏ¢Ðû³ÆÖ¸±êÓû§»òÓû§µÄ°é´¦ÓÚÒ»¸öÁîÈËÌÖÑáµÄÃûµ¥ÉÏ£¬²¢Ô̺¬Ãûµ¥¾ßÌåÐÅÏ¢µÄÁ´½Ó£¬µ«¸ÃÁ´½ÓÖ¸ÏòÒ»¸öαÔìµÄInstagramµÇÂ¼Ò³Ãæ£¬ÆäÏÖʵÓòÃûΪnastylist-instatop50[.]me¡£Ò»µ©Óû§ÊäÈëÍ´´¦£¬¹¥»÷Õß½«ÀûÓÃËûÃǵÄÕË»§½øÒ»²½´«²¼¸ÃȦÌס£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/the-nasty-list-phishing-scam-is-sweeping-through-instagram/


6.жñÒâÈí¼þ¿É´Û¸ÄCATºÍMRIɨÃèÒǵÄÒ½ÁÆÉ¨ÃèÁ˾Ö

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ben-Gurion´óѧµÄÒ»¸ö×êÑÐÍŶÓÑÝʾÁËÒ»ÖÖ¿ÉÄÜ´Û¸ÄÒ½ÁÆÉ¨ÃèÁ˾ֵÄжñÒâÈí¼þ£¬ÕâÖÖ¶ñÒâÈí¼þ¿É´Û¸ÄɨÃè³öµÄÒ½ÁÆÍ¼Ïñ£¬½«Ö×ÁöÔö³¤µ½Í¼ÏñÖлòÊÇ´ÓͼÏñÖÐÒÆ³ýÖ×Áö£¬ÒÔÎóµ¼Ò½ÉúµÄÕïÖÎÁ˾Ö¡£×êÑÐÈËÔ±²âÊÔÁË70ÕÅͼÏñ£¬³É¹¦ºýŪÁËÈýÃû·ÅÉä¿ÆÒ½ÉúºÍÒ½ÔºµÄ×Ô¶¯É¸Ñ¡ÏµÍ³¡£×êÑÐÈËÔ±³ÆÕâÖÖ¹¥»÷µÄÔ­ÒòÊÇÒ½ÁÆÉ豸µÄ°²È«´ëÊ©²»¼°£¬ÀýÈç¶Ìȱ¶ÔͼÏñµÄÊðÃûºÍ¼ÓÃÜ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.pandasecurity.com/mediacenter/news/new-malware-healthcare-sector/