Linux KDE 4/5´æÔÚ佨¸´µÄºÅÁî×¢Èë·ì϶£»Smominru½Ù³Ö50¶àÍǫ̀µçÄÔÍÚ¿ó£»CSA°ä²¼ÔÆÍÆËã11ÏîÍþвÁбí
°ä²¼¹¦·ò 2019-08-08
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/kde-desktop-linux-vulnerability.html
2¡¢BinanceÔâµ½ÀÕË÷£¬¹¥»÷ÕßÍþв°ä²¼1ÍòÃû¿Í»§µÄKYCÐÅÏ¢
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/binance-kyc-data-leak.html
3¡¢ÐǰͿËÊý¾Ý¿âSQL×¢Èë·ì϶¶³ö½ü100ÍòÌõ²ÆÕþ¼Í¼
°²È«×êÑÐÔ±Eugene LimÓÚ4ÔÂ8ÈÕÔÚÐÇ°Í¿ËµÄÆóÒµÊý¾Ý¿âÖз¢ÏÖÒ»¸öSQL×¢Èë·ì϶£¬¸Ã·ì϶µ¼Ö½ü100ÍòÌõ²ÆÕþ¼Í¼¶³ö£¬Ô̺¬Ë°ÎñÐÅÏ¢¡¢ÊÕÌõÒÔ¼°¹¤×ʵ¥Êý¾ÝµÈ¡£×êÑÐÈËԱͨ¹ý¸Ã¹«Ë¾ÔÚHackerOneÉϵķì϶¼Î½±´òËãÌá½»ÁË·ì϶£¬ÐǰͿËÔÚÁ½ÌìÄÚ½¨¸´Á˸ÃÎÊÌâ¡£×êÑÐÈËÔ±Òò¶ø»ñµÃÁË4000ÃÀÔªµÄ¼Î½±¡£¸Ã·ì϶»ã±¨ÓÚ8ÔÂ6ÈÕÔÚHackerOneÉÏÅû¶¡£
ÔÎÄÁ´½Ó£ºhttps://www.securityweek.com/sql-injection-vulnerability-exposed-starbucks-financial-records
4¡¢½©Ê¬ÍøÂçSmominru½Ù³Ö50¶àÍǫ̀µçÄÔÍڿ󣬲¢ÇÔȡʹ´¦ÐÅÏ¢
Carbon BlackµÄTAU×êÑÐÍŶӷ¢ÏÖÒ»¸öÐµĹ¥»÷»î¶¯SmominruÔÚͨ¹ý½©Ê¬ÍøÂçÍÚÈ¡ÃÅÂÞ±Ò£¬²¢ÇÒÇÔÈ¡Óû§µÄ½Ó¼ûÍ´´¦¡£SmominruÒѾ³É¹¦½Ù³ÖÁËÈ«Çò³¬¹ý50Íǫ̀»úе£¬TAU°µÊ¾¸Ã½©Ê¬ÍøÂçÖÁÉÙÒѾ»îÔ¾ÁËÁ½Ä꣬²¢ÇÒÖØÒªÍ¨¹ýÓÀºãÖ®À¶´«²¼£¬Êܺ¦ÕßÖØÒªÎ»ÓÚÑÇÌ«µØÓò¡£×êÑÐÈËÔ±½«ÕâÖÖ½áºÏÍÚ¿óºÍÍ´´¦ÇÔÈ¡µÄ¹¥»÷³ÆÖ®Îªaccess mining¡£×êÑÐÈËÔ±»¹·¢ÏÖSmominruÓëÁíÒ»¸ö½©Ê¬ÍøÂçMyKings´æÔÚ¹ØÁª¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/new-cryptojacking-campaign-strikes-half-a-million-pcs/
5¡¢°Í»ù˹̹ÄÐ×Óͨ¹ý»ß¸AT£¦TÔ±¹¤·¸·¨½âËø200¶àÍò²¿ÊÖ»ú
°Í»ù˹̹һÃûÄÐ×Ó±»Ö¸¿ØÔÚÎåÄêµÄ¹¦·òÄÚͨ¹ý»ß¸AT£¦TµçÐŹ«Ë¾µÄÔ±¹¤·¸·¨½âËø200¶àÍò²¿ÊÖ»úÒÔ¼°Ôڸù«Ë¾µÄÍøÂçÉÏÖ²Èë¶ñÒâÈí¼þ¡£¸ÃÃûÄÐ×ÓÊÇÏÖÄê34ËêµÄ°Í»ù˹̹¹«ÃñMuhammad Fahd£¬Æ¾¾ÝÃÀ¹úÁª¹úµ±¾ÖµÄ¸æ×´Ê飬FahdÔÚ2012ÄêÖÁ2017ÄêÆÚ¼äÏòAT£¦TÄÚ²¿Ô±¹¤»ß¸³¬¹ý100ÍòÃÀÔª£¬ÒÔ·¸·¨½âËø±»AT£¦T¹«Ë¾Ëø¶¨µÄÊÖ»úÉ豸¡£ÔÚ²Î¼ÓÆä´òËãµÄһЩԱ¹¤±»AT&T¿ª³ýºó£¬Fahd»¹Ïò¸Ã¹«Ë¾ÄÚÍø×°ÖöñÒ⹤¾ß£¬Ê¹Æä¿ÉÄÜͨ¹ýAT£¦TÍÆËã»úÔ¶³Ì½âËøÊÖ»ú¡£Fahd½«Ãæ¶Ô³¤´ï20ÄêµÄ½ûïÀ¡£
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/sim-device-unlocking-malware.html
6¡¢Ôư²È«Í¬ÃËCSA°ä²¼Õë¶ÔÔÆÍÆËãµÄ11Ïî×îÐÂÍþвÁбí
ÔÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/cloud-security-alliance-releases/


¾©¹«Íø°²±¸11010802024551ºÅ