Æ»¹û°ä²¼°²È«¸üУ¬½¨¸´¶à¸ö²úÆ·Öеķì϶ £»¼ÓÃÜÇ®±ÒÂòÂôËùKuCoinÔâ¹¥»÷£¬1.5ÒÚÃÀԪǮ±Ò±»µÁ

°ä²¼¹¦·ò 2020-09-27

1.Æ»¹û°ä²¼°²È«¸üУ¬½¨¸´¶à¸ö²úÆ·Öеķì϶


1.png


Æ»¹û°ä²¼°²È«¸üУ¬½¨¸´ÁËmacOS Catalina¡¢High SierraºÍMojave£¬ÒÔ¼°Windows iCloudÖеĶà¸ö·ì϶ ¡£Õâ´Î½¨¸´µÄ·ì϶±ðÀëΪI/O×é¼þµÄÔ½½ç¶ÁÈ¡·ì϶£¨CVE-2020-9973£©£¬Éæ¼°ËÄ´¦ÖöñÒâµÄUSDÎļþ£¬¿Éµ¼ÖÂËÁÒâ´úÂëÖ´ÐлòDoS¹¥»÷ £»ImageIOÖеÄÔ½½ç¶ÁÈ¡·ì϶£¨CVE-2020-9961£©£¬¿Éµ¼ÖÂËÁÒâ´úÂëÖ´ÐÐ £»É³ºÐÖеķì϶£¨CVE-2020-9968£©¿ÉÔÊÐí¶ñÒâÀûÓ÷¨Ê½½Ó¼ûÊÜÏ޶ȵÄÎļþ £»WebKitÖеķì϶£¨CVE-2020-9952£©¿ÉÔÊÐí¿çÕ¾µã¾ç±¾¹¥»÷ £»MailÖзì϶£¨CVE-2020-9941£©¿ÉʹԶ³Ì¹¥»÷Õ߸ü¸ÄÀûÓ÷¨Ê½×´Ì¬ ¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2020/09/25/apple-releases-security-updates


2.Google°ä²¼Chrome 85°²È«¸üУ¬½¨¸´¶à¸ö·ì϶


2.png


Google°ä²¼Chrome 85°²È«¸üУ¬½¨¸´¶à¸ö·ì϶ ¡£ÆäÖÐÔ̺¬Ô½½ç¶ÁÈ¡·ì϶£¨CVE-2020-15960 £©£¬À©´óÖеÄÕ½ÊõÖ´Ðв»¼°·ì϶£¨CVE-2020-15961£©¡¢´®ÐÐÖ´ÐеÄÕ½Êõ²»¼°·ì϶£¨CVE-2020-15962£©¡¢À©´óÖеÄÕþ²ßÖ´Ðв»¼°£¨CVE-2020-15963£©¡¢V8ÖеÄÔ½½çд·ì϶£¨CVE-2020-15965£©¡¢À©´óÖеÄÕþ²ßÖ´Ðв»¼°£¨CVE-2020-15966£©ºÍýÌåÖеÄÊý¾ÝÑéÖ¤²»¼°·ì϶£¨CVE-2020-15964£© ¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/chrome-vulnerabilities-expose-users-attacks-malicious-extensions


3.¼ÓÃÜÇ®±ÒÂòÂôËùKuCoinÔâ¹¥»÷£¬1.5ÒÚÃÀԪǮ±Ò±»µÁ


3.jpg


×ܲ¿Î»ÓÚÐÂ¼ÓÆÂµÄ¼ÓÃÜÇ®±ÒÂòÂôËùKuCoinÅû¶ÆäÔâµ½ÁËÍøÂç¹¥»÷£¬¼ÛÖµ1.5ÒÚÃÀÔªµÄÇ®±Ò±»µÁ ¡£¸Ã¹«Ë¾ÔÚÉêÃ÷ÖÐ֤ʵ£¬Ò»ºÚ¿ÍÈëÇÖÁËÆäϵͳ£¬²¢µÁÈ¡ÁËÆäÈÈÇ®°üÖеÄËùÓÐ×ʲú£¬Ô̺¬±ÈÌØ±Ò¡¢erc -20´ú±ÒÒÔ¼°ÆäËûÀàÐ͵Ĵú±Ò ¡£Æ¾¾ÝÓû§×·×Ù±»µÁ×ʽðµÄEtheriumµØÖ·£¬Ä¿Ç°¹À¼ÆËðʧ×îÓ×Ϊ1.5ÒÚÃÀÔª ¡£KuCoin°µÊ¾£¬Ä¿Ç°ÒѾ­Æô¶¯Á˰²È«É󼯣¬µ«ÆäÉÐδ·µ»ØÆäËûÆÀÂÛÒªÇó ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/kucoin-cryptocurrency-exchange-hacked-for-150-million/


4.Twitter³ÆÒòÆä·þÎñÅäÖÃÃýÎó£¬Óû§µÄAPIÃÜÔ¿¿ÉÄÜ»áй¶


4.jpg


Twitter³ÆÒòÆäDeveloperÃÅ»§ÉÏ·þÎñÅäÖÃÃýÎó£¬Óû§µÄAPIÃÜÔ¿¿ÉÄÜ»áй¶ ¡£developer.twitter.comÊÇ¿ª·¢ÈËÔ±ÖÎÀíTwitterÀûÓ÷¨Ê½ºÍ¸½¼ÓAPIÃÜÔ¿µÄÃÅ»§£¬Í¬Ê±Ò²Ô̺¬TwitterÕË»§µÄ½Ó¼ûÁîÅÆºÍÃÜÔ¿ ¡£¸ÃÍøÕ¾ÒòÅäÖÃÎÊÌâ»áÏòä¯ÀÀÆ÷·¢ËÍÃýÎóÖ¸ÁʹÆä´´½¨ºÍ´æ´¢APIÃÜÔ¿¡¢ÕË»§½Ó¼ûÁîÅÆºÍÕÊ»§ÃÜÂëµÄ¸±±¾ ¡£¶ÔÓÚʹÓù«¹²»ò¹²ÏíÍÆËã»úµÄ¿ª·¢ÈËÔ±À´Ëµ£¬ËûÃǵÄAPIÃÜÔ¿ºÜ¿ÉÄܻᱻй¶ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/twitter-warns-of-possible-api-keys-leak/


5.×êÑÐÈËÔ±·¢ÏÖ¿Éͨ¹ýä¯ÀÀÆ÷µÇÂ¼ÈÆ¹ýTikTokµÄMFA


5.jpg


×êÑÐÈËÔ±·¢ÏÖ¿Éͨ¹ýä¯ÀÀÆ÷µÇÂ¼ÈÆ¹ýTikTokµÄMFA ¡£ÔÚTikTokÍÆ³ö¶à³É·ÖÉí·ÝÑéÖ¤£¨MFA£©Ò»¸öÔºó£¬×êÑÐÈËÔ±·¢Ïָð²È«Ö°ÄܽöÕë¶ÔÒÆ¶¯ÀûÓ÷¨Ê½ÆôÓ㬶øÆäÍøÕ¾ÔòδÆôÓà ¡£Òò¶ø£¬ºÚ¿ÍÄܹ»Í¨¹ýÆäÍøÕ¾µÇ¼ӵÓÐÊܺ¦Æ¾Ö¤µÄÕÊ»§À´ÈƹýMFA ¡£ÓÉÓÚÍøÒ³°æµÄÖÐTikTokÓû§¿ÉÓõÄÑ¡ÏîÓÐÏÞ£¬Ö»ÄÜÉÏ´«ºÍ°ä²¼ÊÓÆµ£¬Òò¶ø¹¥»÷ÕßÒ²ÎÞ·¨Í¨¹ý¸ü¸ÄÓû§ÃÜÂëÒÔÆëÈ«½Ù³ÖÕÊ»§ ¡£µ«Êǰ²È«×êÑÐÔ±Zach Edwards°µÊ¾£¬¹¥»÷ÕßÄܹ»ÌáÒé´ó¹æÄ £»Ù°ù»î¶¯£¬ÀýÈçȦÌ×Ðû´«»òÕþÖÎÐû´«µÈ¸÷ÀàÖ÷Ìâ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/you-can-bypass-tiktoks-mfa-by-logging-in-via-a-browser/


6.NIST°ä²¼ÍøÂ簲ȫʵ¼ÊÖ¸ÄÏÒÔÔ®ÊÖ×éÖ¯´ÓÍøÂç¹¥»÷Öи´Ô­


6.jpg


ÃÀ¹ú¹ú¶È³ß¶È¼¼Êõ×êÑÐÔº£¨NIST£©°ä²¼ÁËÒ»·ÝÍøÂ簲ȫʵ¼ÊÖ¸ÄÏ£¬ÒÔÔ®ÊÖ×éÖ¯´ÓÍøÂç¹¥»÷Öи´Ô­ ¡£¸ÃÖ¸ÄÏÖ¸³ö£¬ÀÕË÷Èí¼þ¹¥»÷ÊÇĿǰӰÏìÆóÒµµÄ×î¾ß·ÛËéÐԵijɷÖÖ®Ò»£¬¹ÌÈ»×îÃÎÏëµÄ×ö·¨ÊÇÔÚÀÕË÷Èí¼þ¹¥»÷µÄÔçÆÚ¼ì²â³öËü²¢°ä²¼Ô¤¾¯ÐźÅ£¬ÒÔ½«ÆäÓ°Ïì×îÓ×»¯»òÆëÈ«×èÖ¹Ëü ¡£µ«ÈÔÓкöà×éÖ¯±»ÈëÇÖ£¬²¢±ØÒªÖ¸ÄÏÀ´Ô®ÊÔìä´ÓÖи´Ô­ ¡£NISTµÄNCCoE´´½¨Ïàʶ¾ö¹æ»®À´½â¾öÕâÐ©ÍøÂ簲ȫÌôÕ½£¬²¢Õë¶Ô¼¸¸ö²âÊÔÓÃÀý(ÀÕË÷Èí¼þ¹¥»÷¡¢¶ñÒâÈí¼þ¹¥»÷¡¢Óû§Åú¸ÄÅäÖÃÎļþ¡¢ÖÎÀíÔ±Åú¸ÄÓû§Îļþ¡¢ÖÎÀíÔ±»ò¾ç±¾ÃýÎóµØÅú¸ÄÊý¾Ý¿â»òÊý¾Ý¿âģʽ)½øÐвâÊÔÁË ¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/09/24/nist-guide-recover-ransomware/