1¡¢IBMºÍPonemon Institute½áºÏ°ä²¼2019ÄêÊý¾Ýй¶³É±¾µ÷Ñл㱨
ƾ¾ÝIBMºÍPonemon Institute½áºÏ°ä²¼µÄ2019Äê¶ÈÊý¾Ýй¶³É±¾µ÷Ñл㱨£¬2019ÄêÊý¾Ýй¶µÄÈ«Çò¾ùÔȳɱ¾Îª392ÍòÃÀÔª£¬±È2018ÄêÔö³¤ÁË1.5£¥¡£2014ÄêµÄÊý×ÖÊÇ350ÍòÃÀÔª£¬2014ÖÁ2019ÄêÆÚ¼ä¹²Ôö³¤ÁË12%¡£ÕâÒ»Êý×Ö×î¸ßµÄ¹ú¶ÈÊÇÃÀ¹ú£¬´ï819ÍòÃÀÔª£¬ÊÇÈ«Çò¾ùÔÈˮƽµÄÁ½±¶¶à¡£Êý¾Ýй¶³É±¾×î¸ßµÄÐÐÒµÊÇÒ½ÁƱ£½¡£¬¸ÃÐÐÒµ2019ÄêµÄ¾ùÔÈÊý×ÖÊÇ645ÍòÃÀÔª¡£¸Ã»ã±¨º¸ÇÁË2018Äê7ÔÂÖÁ2019Äê4ÔÂÆÚ¼ä16¸ö¹ú¶ÈºÍµØÓòÄÚµÄ17¸öÐÐÒµµÄ507ÆðÊý¾Ýй¶ÊÂÎñ¡£
ÔÎÄÁ´½Ó£ºhttps://securityintelligence.com/posts/whats-new-in-the-2019-cost-of-a-data-breach-report/
2¡¢ÐÂP2PÈ䳿²¡¶¾Crypto-MinersÔÚÒ°±í»ý¼«´«²¼
Yoroi-Cybaze Z-Lab×êÑÐÈËÔ±·¢ÏÖÒ»ÖÖÔÚÒ°±í´«²¼Crypto-MinersµÄP2PÈ䳿²¡¶¾¡£¸Ã¶ñÒâÈí¼þ¼Ù×°³É³ÛÃû¸èÊֵijªÆ¬ºÏ¼¯£¬ÀûÓÃP2P¹²ÏíÍøÂç½øÐд«²¼¡£´ÓBitTorrentÍøÂçÏÂÔØµÄÎļþÊÇÒ»¸öÔ̺¬ÆäËü¼¸¸öÎļþµÄSFXÎĵµ£¬ÕâÖÖÎĵµÔÊÐí¹¥»÷Õß°µ²Ø¶ñÒâµÄPEÄÚÈݲ¢ÏÔÖø½µµÍɱ¶¾ÒýÇæµÄ¼ì²âÂÊ¡£×îÖÕµÄpayloadÊÇÒ»¸öÍÚ¿óÈí¼þ£¬µ«¹¥»÷ÕßÒ²¿ÉÄܻὫÆä´úÌæÎªRAT»òÀÕË÷²¡¶¾¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/88795/malware/p2p-worm-spreading-crypto-miners.html
3¡¢ºÚ¿ÍÀûÓýüÆÚWordPress²å¼þÖеÄXSS·ì϶´«²¼¶ñÒâ¸æ°×
Wordfence×êÑÐÍŶӷ¢ÏÖÒ»¸öÔÚ½øÐеĶñÒâ¸æ°×»î¶¯£¬¹¥»÷ÕßÀûÓÃWordPress²å¼þComing Soon Page&Maintenance ModeÖеÄXSS·ì϶£¬ÏòÓû§ÍÆËͶñÒâ¸æ°×¡£ÕâЩ¶ñÒâ¸æ°×½«Óû§³Á¶¨ÏòÖÁ¼¼ÊõÖ§³¶à¿Æ¡¢¶ñÒâAPKÏÂÔØºÍÒ©Æ·¸æ°×µÈ¶ñÒâÍøÕ¾¡£¸Ã²å¼þÖеķì϶ÊÇÒ»¸ö´æ´¢ÐÍXSS·ì϶£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß×¢Èë¶ñÒâJavaScript»òHTML´úÂë¡£¸Ã²å¼þµÄ1.7.8¼°¸üµÍ°æ±¾Êܵ½Ó°Ï죬²å¼þµÄ×îа汾Òѽ¨¸´ÁËÕâ¸ö·ì϶¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/hackers-exploit-recent-wordpress-plugin-bugs-for-malvertising/
4¡¢×êÑÐÍŶÓÅû¶Comodo AntivirusÖеĶà¸ö°²È«·ì϶
TenableÅû¶Comodo Antivirus/Comodo Antivirus AdvancedÖеĶà¸ö°²È«·ì϶£¬Ô̺¬±¾µØÌáȨ·ì϶£¨CVE-2019-3969£©¡¢ËÁÒâÎļþдÈë·ì϶£¨CVE-2019-3970£©¡¢»Ø¾ø·þÎñ·ì϶£¨CVE-2019-3971£©¡¢Ô½½ç¶Á·ì϶£¨CVE-2019-3972£©ÒÔ¼°Ô½½çд·ì϶£¨CVE-2019-3973£©¡£ÕâЩ·ì϶ӰÏìÁËComodo Antivirus°æ±¾12.0.0.6810£¬µ«CVE-2019-3973Ö»Ó°ÏìÁË11.0.0.6582¼°Ö®Ç°µÄ°æ±¾¡£×êÑÐÈËÔ±ÔÚgithubÉϰ䲼ÁËÓйØPoC¡£
ÔÎÄÁ´½Ó£ºhttps://www.tenable.com/security/research/tra-2019-34
5¡¢ÃÀ¹ú¹ú¶È°²È«¾Ö´òËã³ÉÁ¢ÐÂÍøÂ簲ȫÀíÊ»á
7ÔÂ23ÈÕÃÀ¹ú¹ú¶È°²È«¾Ö£¨NSA£©°ä·¢´òËã³ÉÁ¢Ò»¸öеÄÍøÂ簲ȫ·ÀÓù²¿ÃÅ£¬¸Ã²¿ÃŽ«×¨Ò»ÓÚ±£»¤ÃÀ¹úÃâÊܱí¹úµÄÍøÂçÍþв¡£Ð²¿Ãű»¶¨ÃûÎªÍøÂ簲ȫÀíÊ»ᣨCybersecurity Directorate£©£¬½«ÓÚ10ÔÂ1ÈÕÆðÍ·ÔËÓª¡£Æ¾¾ÝNSAµÄ˵·¨£¬ÍøÂ簲ȫÀíÊ»áµÄ½ÇÉ«½«ÊǸÄÉÆÃÀ¹úÔÚ¹úÄÚµÄÍøÂç°²È«Ì¬ÊÆ£¬ËüµÄÒ»Ïî³ÁÒª¹¤×÷½«Êǵý±¨¹²ÏíºÍ·ì϶ÆÀ¹À¡£Anne Neuberger½«³ÉΪ¸Ã²¿ÃŵĵÚÒ»Î»ÍøÂ簲ȫ×ܼࡣËý½«Ö±½ÓÏòNSA¾Ö³¤Paul Nakasone½«¾ü»ã±¨¹¤×÷¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/nsa-to-establish-a-defense-minded-division-named-the-cybersecurity-directorate/
6¡¢Ç°Î÷ÃÅ×ÓºÏͬ¹¤ÈÏ¿ÉÔÚ¹«Ë¾µç×Ó±í¸ñÖÐÖ²ÈëÂß¼Õ¨µ¯
ǰÎ÷ÃÅ×ÓºÏͬ¹¤David TinleyÈÏ¿ÉÔÚΪ¹«Ë¾´´½¨µÄµç×Ó±í¸ñÖÐÖ²ÈëÂß¼Õ¨µ¯£¬Ëû½«Ãæ¶Ô×î¸ß10ÄêµÄ½ûïÀÒÔ¼°25ÍòÃÀÔªµÄ·£¿î¡£Æ¾¾ÝÓйط¨Í¥Îļþ£¬TinleyΪÎ÷ÃÅ×ÓµÄMonroeville PA´¦Ê´¦ÌṩÁ˽üÊ®ÄêµÄÈí¼þ·þÎñ£¬ËûÔÚ¸ø¹«Ë¾´´½¨ÓÃÓÚÖÎÀíÉ豸¶©µ¥µÄµç×Ó±í¸ñʱֲÈëÁËÂß¼Õ¨µ¯£¬ÕâЩըµ¯»áÔÚÌØ¶¨ÈÕÆÚ´¥·¢£¬µ¼ÖÂÎļþ±ÀÀ£¡£Ã¿´Î±ÀÀ£Ê±Tinley³ÇÊÐÊÕÈ¡ÓöÈÀ´½¨¸´¸ÃÎļþ£¬Ö±µ½Á½ÄêºóÎ÷ÃÅ×Ó·¢ÏÖÁËÂß¼Õ¨µ¯²¢Ìá³öÁËÖ¸¿Ø¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/siemens-contractor-pleads-guilty-to-planting-logic-bomb-in-company-spreadsheets/