×êÑÐÍŶӷ¢ÏÖ½ü3200¸öÒÆ¶¯ÀûÓÿÉй¶Twitter APIÃÜÔ¿
°ä²¼¹¦·ò 2022-08-03
¾ÝýÌå8ÔÂ1ÈÕ±¨Â·£¬°²È«¹«Ë¾CloudSEK·¢ÏÖÁË3207¸öÒÆ¶¯ÀûÓ÷¨Ê½¿Éй¶Twitter APIÃÜÔ¿¡£½Ó¼ûTwitterµÄAPI±ØÒªÌìÉúÃÜÔ¿ºÍ½Ó¼ûÁîÅÆ£¬ËüÃdzäÈÎÀûÓ÷¨Ê½µÄÓû§ÃûºÍÃÜÂ룬ÒÔ¼°½«´ú±íÆä·¢³ö API ÒªÇóµÄÓû§¡£Òò¶ø£¬°ÑÎÕÕâЩÐÅÏ¢¹¥»÷ÕßÄܹ»´´½¨Ò»¸öTwitter botÐÛʦ£¬²¢ÓпÉÄÜÀûÓÃËüÔÚÉ罻ýÌåÆ½Ì¨ÉÏ´«²¼ÐéαÐÅÏ¢¡£APIÃÜԿй¶ͨ³£ÊÇÓÉÓÚÀûÓ÷¨Ê½¿ª·¢ÈËÔ±µÄÃýÎóµ¼Ö£¬ËûÃǽ«Éí·ÝÑéÖ¤ÃÜԿǶÈëTwitter API£¬µ«Ôڰ䲼ʱ½¡Íüɾ³ý£¬CloudSEK½¨Ò鿪·¢ÈËԱʹÓÃAPIÃÜÔ¿ÂÖ»»À´±£»¤Éí·ÝÑéÖ¤ÃÜÔ¿¡£
https://thehackernews.com/2022/08/researchers-discover-nearly-3200-mobile.html
2¡¢Outlook»áÔڲ鿴ÓÐUberÊÕÌõµÈ±í¸ñµÄÓʼþʱÖÕ³¡ÏìÓ¦
¾Ý8ÔÂ1ÈÕ±¨Â·£¬Outlookµç×ÓÓʼþ¿Í»§¶ËÔڲ鿴´øÓÐUberÊÕÌõµÈ±í¸ñµÄµç×ÓÓʼþʱ»á³öÏÖ±ÀÀ£ÎÊÌ⡣΢ÈíÚ¹Êͳƣ¬µ±´ò¿ª¡¢»Ø¸´»òת·¢Ò»Ð©Ô̺¬¸´ÔÓ±í¸ñµÄµç×ÓÓʼþʱ£¬Outlook »áÖÕ³¡ÏìÓ¦¡£¸üÔã¸âµÄÊÇ£¬ÓµÓÐÒ»Ñù±í¸ñÄÚÈݵĵç×ÓÓʼþÒ²»áµ¼ÖÂMicrosoft WordÖÕ³¡ÏìÓ¦¡£Microsoft WordÍŶÓÒѾ¿ª·¢ÁËÒ»¸ö²¹¶¡£¬ÔÚ¾¹ýÑéÖ¤ºó½«ºÜ¿ì°ä²¼¸øBetaͨ·¿Í»§¡£¸Ã¹«Ë¾²¹³ä˵£¬Ê¹ÓÃCurrent ChannelµÄOutlook°æ±¾µÄÓû§½«ÔÚ2022Äê8ÔÂ9ÈÕÐÇÆÚ¶þÊÕµ½²¹¶¡¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-outlook-is-crashing-when-reading-uber-receipt-emails/
3¡¢VMware½¨¸´¶à¸ö²úÆ·ÖеÄÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶(CVE-2022-31656)
8ÔÂ2ÈÕ£¬VMware°ä²¼°²È«¸üУ¬½¨¸´ÁËÑϳÁµÄÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶(CVE-2022-31656)¡£¸Ã·ì϶»áÓ°ÏìVMware Workspace ONE Access¡¢Identity ManagerºÍvRealize Automation£¬CVSSÆÀ·ÖΪ9.8£¬¿É±»Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÓÃÀ´»ñµÃÖÎÀíԱȨÏÞ¡£´Ë±í£¬¸Ã¹«Ë¾»¹½¨¸´ÁËÆäËü¶à¸ö·ì϶£¬Ô̺¬Ô¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2022-31658¡¢CVE-2022-31659ºÍCVE-2022-31665£©ºÍ±¾µØÌáȨ·ì϶£¨CVE-2022-31660¡¢CVE- 2022-31661ºÍCVE-2022-31664£©µÈ¡£
https://www.bleepingcomputer.com/news/security/vmware-urges-admins-to-patch-critical-auth-bypass-bug-immediately/
4¡¢OneTouchPointÔâµ½ÀÕË÷¹¥»÷Ó°ÏìÖÁÉÙ34¼ÒÒ½ÁÆ»ú¹¹
ýÌå8ÔÂ1Èճƣ¬´òÓ¡ºÍÓʼþ·þÎñÌṩÉÌOneTouchPointÔâµ½ÀÕË÷¹¥»÷ºó£¬Æä34¼Ò¿Í»§ÒѰ䲼Êý¾Ýй¶֪ͨ¡£¸Ã¹«Ë¾Îª¶à¼Ò½¡È«±£ÏÕ¹«Ë¾ºÍÒ½ÁÆ»ú¹¹Ìṩ·þÎñ£¬Æä7ÔÂ27Èյİ䲼µÄ¹«¸æÖÐÏÔʾ£¬ËüÓÚ4ÔÂ28ÈÕÔÚϵͳÖз¢ÏÖÁ˼ÓÃÜÎļþ¡£OneTouchPointûÓÐй©Óм¸¶àÈËÊܵ½ÁËÕâ´ÎÊÂÎñµÄÓ°Ï죬ҲûÓÐÀÕË÷ÍÅ»ïÉêÃ÷¶Ô´ËÊÂÕÆ¹Ü¡£×êÑÐÈËÔ±°µÊ¾£¬Õû¸ö2021ÄêºÍ2022Ä꣬Õë¶ÔÒ½ÁÆ×éÖ¯µÄÀÕË÷¹¥»÷´ÓδÖÕ³¡¡£
https://therecord.media/at-least-34-healthcare-orgs-affected-by-alleged-ransomware-attack-on-onetouchpoint/
5¡¢¹ú»áÒéԱй©ÃÀ¹úÁªÍõ·¨Í¥¼Í¼ϵͳÔâµ½·¸·¨½Ó¼û
ýÌå7ÔÂ29ÈÕ±¨Â·£¬ÃÀ¹ú¶àÒéԺ˾·¨Î¯Ô±»áÖ÷ϯ½ÜÂ޵¡¤ÄɵÂÀÕ£¨D-NY£©Ð¹Â©£¬Õë¶ÔÃÀ¹ú˾·¨ÏµÍ³µÄÍøÂç¹¥»÷ÈëÇÖÁ˹«¹²ÎļþÖÎÀíϵͳ¡£Nadler³Æ£¬Èý¸ö¹¥»÷ÕßÈëÇÖÁ˹«¼Ò½Ó¼û·¨Ôºµç×ӼͼºÍ°¸¼þÖÎÀí/µç×Ó°¸¼þµµ°¸(PACER)ϵͳ£¬¸ÃϵͳÌṩÁ˶ÔÕû¸öÃÀÍõ·¨ÔºÏµÍ³ÎļþµÄ½Ó¼ûȨÏÞ¡£ÊÂÎñ²úÉúÔÚ2020ËêÊ×£¬ÓÚ3Ô³õ´Î·¢ÏÖ£¬Ëü¿ÉÄÜ»áÓ°Ïìδ¾öµÄÃñʺÍÐÌÊÂËßËÏ¡£Ä¿Ç°£¬ÃÀ¹ú˾·¨²¿ÔÚµ÷²éÕâÒ»Â·ÍøÂçÈëÇÖÊÂÎñ¡£
https://www.infosecurity-magazine.com/news/congress-us-court-records-breach/
6¡¢Zscaler°ä²¼¹ØÓÚRaccoon StealerбäÌåµÄ·ÖÎö»ã±¨
ZscalerÔÚ7ÔÂ29ÈÕ°ä²¼Á˹ØÓÚRaccoon StealerбäÌåµÄ·ÖÎö»ã±¨¡£ÓëÒÔÇ°ÖØÒªÓÃC++±àдµÄ°æ±¾·ÖÆç£¬Raccoon Stealer v2ÊÇÓÃC˵»°±àдµÄ£¬ÓÚ7ÔÂ3ÈÕ³õ´Î³öÏÖ¡£Ð°汾»¹ÓµÓÐеĺó¶ËºÍǰ¶Ë£¬ºÍÄܹ»¸üÓÐЧµØÇÔȡʹ´¦ºÍÆäËüÊý¾ÝµÄ´úÂë¡£ËüÄܹ»ÔÚ32λºÍ64λϵͳÉÏÔËÐУ¬ÎÞÐè¶î±íµÄÒÀÀµÏ¶øÊÇÖ±½Ó´ÓÆäC2·þÎñÆ÷»ñÈ¡8¸öºÏ·¨DLL¡£´Ë±í£¬Raccoon v2ͨ¹ýʹÓö¯Ì¬½âÎöAPIÃû³Æ¶ø²»ÊǾ²Ì¬¼ÓÔØµÄ»úÔìÀ´°µ²ØÆäÒâͼµÄ±ä¶¯¡£
https://www.zscaler.com/blogs/security-research/raccoon-stealer-v2-latest-generation-raccoon-family


¾©¹«Íø°²±¸11010802024551ºÅ