4G·ÓÉÆ÷¶à¸ö·ì϶£¬²¨¼°ÖÐÐË¡¢Netgear¼°TP-LINK£»iOSͨѶ¼Ò×ÔâSQLite¹¥»÷£»¼ÑÄܵ¥·´Ïà»ú¶à¸ö·ì϶

°ä²¼¹¦·ò 2019-08-13
1¡¢¼ÑÄܵ¥·´Ïà»ú´æÔÚ¶à¸ö·ì϶£¬Ò×ÔâÀÕË÷Èí¼þ¹¥»÷

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

CheckPoint×êÑÐÈËÔ±Eyal Itkin·¢ÏÖ¼ÑÄÜÊýÂëÏà»ú¹Ì¼þÖдæÔÚ6¸ö°²È«·ì϶£¬ÕâЩ·ì϶¿Éͨ¹ýUSB¼°WiFiÀûÓã¬ÔÊÐí¹¥»÷ÕßÈëÇÖ²¢ÊÕÊÜÏà»ú¡£Æ¾¾Ý¼ÑÄܰ䲼µÄ²¼¸æ£¬ÊÜÓ°ÏìµÄ²úÆ·Ô̺¬EOSϵÁе¥·´¼°ÎÞ·´Ïà»ú¡¢PowerShot SX740 HS¡¢SX70 HSÒÔ¼°G5X Mark II¡£ÕâЩ·ì϶Óë¼ÑÄܵÄͼƬ´«ÊäºÍ̸£¨PTP£©µÄʵÏÖÓйØ£¬¹¥»÷Õß¿Éͨ¹ýÎÞÏß¹¥»÷µÄ·½Ê½Ïò¼ÑÄÜÏà»úÖ²ÈëÀÕË÷Èí¼þ¡£¼ÑÄÜĿǰ½öΪEOS 80D°ä²¼Á˽¨¸´²¹¶¡¡£


Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/08/dslr-camera-hacking.html


2¡¢iOSͨѶ¼Ò×ÔâSQLite¹¥»÷£¬¿Éµ¼ÖÂÀûÓñÀÀ£»òÇÔÈ¡ÃÜÂë


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

Æ»¹ûiOSµÄͨѶ¼ÀûÓÃÒ×ÔâSQLite¹¥»÷¡£Æ¾¾ÝCheck Point×êÑÐÈËÔ±µÄ±íÊö£¬¸Ã¹¥»÷ÒÀÀµÓÚSQLiteÖеÄÒ»¸öÒÑÖª·ì϶£¬¸Ã·ì϶ÔÚ·¢ÏÖ4ÄêºóÈÔ佨¸´£¨±»ÏóÕ÷Ϊ²»³ÁÒªµÄ£©¡£ÔÚ´úÌæÁËiOSͨѶ¼ÀûÓÃÖеÄÒ»¸ö×é¼þºó£¬×êÑÐÈËÔ±¿ÉÀûÓø÷ì϶ÔÚiPhone»òiPadÉÏÔËÐжñÒâ´úÂë¡£³öÓÚÑÝʾµÄÖ÷ÕÅ£¬×êÑÐÈËÔ±Ö»ÊÇÈÃÀûÓñÀÀ££¬µ«ËûÃǰµÊ¾¿ÉÀûÓöñÒⷨʽÇÔÈ¡Óû§µÄÃÜÂë¡£


Ô­ÎÄÁ´½Ó£ºhttps://appleinsider.com/articles/19/08/10/apples-ios-contacts-app-claimed-to-be-vulnerable-to-sqlite-hack


3¡¢4G·ÓÉÆ÷¶à¸ö·ì϶£¬²¨¼°ÖÐÐË¡¢Netgear¼°TP-LINK

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

×êÑÐÈËÔ±ÔÚDEF CON´ó»áÉÏÅû¶ÁË4G·ÓÉÆ÷ÖеĶà¸ö°²È«·ì϶£¬ÊÜÓ°ÏìµÄÆ·ÅÆÔ̺¬ÖÐÐË¡¢Netgear¼°TP-LINK¡£ÖÐÐËMF920Öеķì϶Ô̺¬ÐÅϢй¶·ì϶£¨CVE-2019-3411£¬CVSS7.5£©ºÍ´úÂëÖ´Ðзì϶£¨CVE-2019-3412£¬CVSS9.8£©¡£Netgear Nighthawk M1ÒÆ¶¯Â·ÓÉÆ÷Öеķì϶Ô̺¬CSRF·ì϶£¨CVE-2019-14526£©¼°Post-AuthºÅÁî×¢Èë·ì϶£¨CVE-2019-14527£©¡£TP-LINK M7350Öеķì϶Ô̺¬Pre-AuthºÅÁî×¢È루CVE-2019-12103£©ÒÔ¼°Post-AuthºÅÁî×¢È루CVE-2019-12103£©¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/4g-router-vulnerabilities-let-attackers-take-full-control/


4¡¢Cloud Atlasй¥»÷»î¶¯£¬ÖØÒªÕë¶Ô¶íÂÞ˹¡¢ÎÚ¿ËÀ¼¼°ÖÐÑÇ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

ÔÚ2019Äê1ÔÂÖÁ7ÔÂÆÚ¼ä£¬¿¨°Í˹»ù×êÑÐÈËÔ±·¢ÏÖÓëÍøÂç¼äµý×éÖ¯Cloud AtlasÓйصĶà¸ö´¹µö»î¶¯£¬ÕâЩ´¹µö¹¥»÷ÖØÒªÕë¶Ô¶íÂÞ˹¡¢ÎÚ¿ËÀ¼ÒÔ¼°ÖÐÑǵØÓò¡£×Ô2018ÄêÒÔÀ´£¬Cloud AtlasÒ»ÏòûÓиü»Ú¸ÄTTPS£¨Õ½Êõ¡¢¹¤¾ßºÍÁ÷³Ì£©¡£ÆäÖØÒªpayloadÊÇÄ£¿é»¯ºóÃÅPowerShower£¬¸ÃºóÃſɽӹÜPowerShell¼°VBSÖ¸Áî²¢Ö´ÐС£ÔÚÐµĹ¥»÷»î¶¯ÖУ¬¸Ã×éÖ¯»¹¿ªÊÍÁËÁíÒ»¸öºóÃÅVBShower¡£


Ô­ÎÄÁ´½Ó£ºhttps://securelist.com/recent-cloud-atlas-activity/92016/


5¡¢Ð´¹µö»î¶¯ÀûÓÃAWSÍйܴ¹µöÍøÕ¾£¬ÀÄÓÃÔÆ´æ´¢³ÉΪ³±Ë®

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

Proofpoint×êÑÐÈËÔ±·¢ÏÖÒ»¸öÕë¶ÔDocuSignÆ·ÅÆµÄ´¹µöÓʼþ¹¥»÷£¬¹¥»÷ÕßÀÄÓÃAWSµÄ·þÎñÀ´ÍÐ¹ÜÆä´¹µöµÇ½ҳ£¨landing page£©¡£Ëæ×ÅÔ½À´Ô½¶àµÄ¹¥»÷ÕßÀûÓÃDropbox¡¢Google DriveµÈÏû·Ñ¼¶ÔÆ´æ´¢ÍÐ¹ÜÆä¶ñÒâpayload£¬´¹µöÕßÒ²Ô½À´Ô½¶àµØÀÄÓÃËüÃÇÍÐ¹ÜÆä´¹µö¹¤¾ß°ü¡£Æ¾¾ÝProofpointµÄ·¢ÏÖ£¬2019ÄêһЩ´¹µöÕ߯ðͷתÏòÀûÓÃAWS¡¢AzureµÈÆóÒµ¼¶¹«¹²ÔÆ´æ´¢¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/microsoft-office-phishers-move-to-enterprise-aws-landing-pages/

6¡¢ÐÂÔ¶¿ØÄ¾ÂíSaefko£¬ÖØÒªÍ¨¹ýuÅ̽øÐд«²¼

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

Zscaler×êÑÐÈËÔ±·¢ÏÖÒ»¸öеÄÔ¶¿ØÄ¾ÂíSaefkoÔÚ°µÍøÉÏÏúÊÛ£¬¸ÃľÂíÔ̺¬¶àÖÖÖ°ÄÜ£¬ÖØÒªÍ¨¹ýuÅÌ´«²¼¡£Saefko¿ÉÇÔÈ¡ChromeµÄº¹Çàä¯ÀÀ¼Í¼£¬½«Êý¾Ý·¢Ë͸øC&C·þÎñÆ÷ÒÔ¼°½Ó¹Ü²¢Ö´ÐÐC&CµÄºÅÁî¡£ÕâЩºÅÁîÔ̺¬ÆÁÄ»½ØÍ¼¡¢¼üÅ̼ͼ¡¢Â¼ÔìÊÓÆµ¡¢ÏÂÔØ²¢Ö´ÐÐÆäËüpayloadµÈ¡£ÆäÇÔÈ¡µÄÐÅÏ¢ÖØÒªÔ̺¬ÐÅÓþ¿¨ÐÅÏ¢¡¢ÓÎÏ·Õ˺š¢¼ÓÃÜÇ®±Ò¡¢É罻ýÌåÍùÀ´ÒÔ¼°¹ºÎï¼Í¼µÈ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.securityweek.com/saefko-multi-layered-rat-can-spread-usb-drives