΢Èí°ä²¼2023Äê1Ô·ݰ²È«¸üÐÂ×ܼƽ¨¸´98¸ö·ì϶
°ä²¼¹¦·ò 2023-01-111¡¢Î¢Èí°ä²¼2023Äê1Ô·ݰ²È«¸üÐÂ×ܼƽ¨¸´98¸ö·ì϶
1ÔÂ10ÈÕ£¬Î¢Èí°ä²¼2023Äê1Ô·ݵÄÖܶþ²¹¶¡£¬×ܼƽ¨¸´ÁË98¸ö·ì϶¡£ÆäÖÐÔ̺¬Òѱ»»ý¼«ÀûÓõÄWindows¸ß¼¶±¾µØ¹ý³ÌŲÓÃ(ALPC)ȨÏÞÌáÉý·ì϶£¨CVE-2023-21674£©¡£Î¢Èí°µÊ¾ÕâÊÇÒ»¸öɳºÐÌÓÒÝ·ì϶£¬³É¹¦ÀûÓô˷ì϶¿É»ñµÃSYSTEMȨÏÞ£¬Ä¿Ç°Éв»Ã÷ÏÔ¹¥»÷ÕßÈôºÎÓô˷ì϶¡£´Ë±í£¬»¹½¨¸´ÁËÒ»¸öÒѹ«¿ªÅû¶µÄWindows SMB Witness ServiceÌáȨ·ì϶£¨CVE-2023-21549£©¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-january-2023-patch-tuesday-fixes-98-flaws-1-zero-day/
2¡¢Èû¶ûάÑÇ³ÆÆäÄÚÕþ²¿ÍøÕ¾ºÍ»ù´¡ÉèÊ©Ôâµ½ÂÅ´ÎDDoS¹¥»÷
¾ÝýÌå1ÔÂ9ÈÕ±¨Â·£¬Èû¶ûάÑǵ±¾Ö³ÆÆäÄÚÕþ²¿µÄÍøÕ¾ºÍIT»ù´¡ÉèÊ©Ôâµ½ÁËÂŴδó¹æÄ£DDoS¹¥»÷¡£Èû¶ûάÑÇÊ׸®±´¶û¸ñÀ³µÂ°µÊ¾£¬Æù½ñΪֹËûÃÇÒѾÕмÜÁËÎå´ÎÕë¶ÔÆäIT»ù´¡ÉèÊ©µÄ´óÐ͹¥»÷¡£¸Ã¹úµ±¾Ö²¹³ä·£¬¼ÓÇ¿µÄ°²È«ºÍ̸Òѱ»¼¤»î£¬Õâ¿ÉÄܻᵼÖ¹¤×÷¿ìÂʱäÂý£¬Ä³Ð©·þÎñżȻ»áÖжϣ¬µ«ÕâЩ¶¼ÊÇΪÁ˱£»¤ÄÚÕþ²¿µÄÊý¾Ý¡£Ä¿Ç°£¬ÉÐÎÞºÚ¿ÍÍÅ»ïÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£
https://therecord.media/serbian-government-reports-massive-ddos-attack-amid-heightened-tensions-in-balkans/
3¡¢×êÑÐÈËÔ±ÑÝʾÈôºÎÀûÓÃText-to-SQLÄ£ÐÍÌìÉú¶ñÒâ´úÂë
¾Ý1ÔÂ9ÈÕ±¨Â·£¬×êÑÐÈËÔ±ÑÝʾÁËÈôºÎÀûÓÃText-to-SQLÄ£ÐÍÌìÉú¶ñÒâ´úÂ룬¿ÉÓÃÀ´ÍøÂçÃô¸ÐÐÅÏ¢²¢ÌáÒéDoS¹¥»÷¡£ÎªÁ˸üºÃµØÓëÓû§½»»¥£¬´óÁ¿µÄÊý¾Ý¿âÀûÓ÷¨Ê½Ñ¡È¡AI¼¼Êõ£¬½«ÈËÀàÎÊÌâת»¯ÎªSQL²éÎÊ£¨¼´Text-to-SQL£©¡£×êÑз¢ÏÖ£¬ÌØÔìµÄpayload¿É±»±øÆ÷»¯ÒÔÔËÐжñÒâSQL²éÎÊ£¬¹¥»÷Õß¿ÉÓÃÀ´Åú¸Äºó¶ËÊý¾Ý¿â²¢¶Ô·þÎñÆ÷½øÐÐDoS¹¥»÷¡£´Ë±í£¬ÓкöಽÖèÄܹ»Í¨¹ýʹѵÁ·Ñù±¾Öж¾À´ÔÚ»ùÓÚԤѵÁ·Ëµ»°Ä£ÐÍ(PLM)µÄ¿ò¼ÜÖÐÖ²ÈëºóÃÅ£¬ÀýÈç½øÐе¥´Ê´úÌæµÈ¡£
https://thehackernews.com/2023/01/new-study-uncovers-text-to-sql-model.html
4¡¢Î¢ÈíÅû¶Kinsing½üÆÚʹÓõÄÈëÇÖKubernetesµÄ²½Öè
΢ÈíÔÚ1ÔÂ5ÈÕÅû¶ÁËKinsing½üÆÚʹÓõÄÈëÇÖKubernetes»·¾³µÄ³õʼ½Ó¼û¼¼Êõ¡£KinsingÊÇÒ»ÖÖLinux¶ñÒâÈí¼þ£¬Õë¶ÔÈÝÆ÷»¯»·¾³½øÐмÓÃÜÍÚ¾ò¡£ËüʹÓõĵÚÒ»ÖÖ²½ÖèÊÇÀûÓÃÒ×±»¹¥»÷µÄ¾µÏñ£¬¹¥»÷Õß»áѰÕÒÆäÖеÄÔ¶³Ì´úÂëÖ´Ðзì϶À´·Ö·¢Æäpayload£¬±»ÀûÓõÄÀûÓ÷¨Ê½Ô̺¬PHPUnit¡¢Liferay¡¢WebLogicºÍWordpressµÈ¡£ÁíÒ»ÖÖ²½ÖèÊÇÀûÓÃÅäÖÃÃýÎóµÄPostgreSQL·þÎñÆ÷£¬¹¥»÷ÕßÄܹ»Ê¹ÓöàÖÖÃýÎóÅäÖÃÀ´»ñµÃPostgres·þÎñÆ÷µÄ½Ó¼ûȨÏÞ¡£
https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/initial-access-techniques-in-kubernetes-environments-used-by/ba-p/3697975
5¡¢SAIFÈ¥Äê10ÔµÄÊý¾ÝÎ¥¹æ¿ÉÄÜ»áй¶¿Í»§µÄÒ½ÁÆÐÅÏ¢
ýÌå1ÔÂ9Èճƣ¬¶íÀÕ¸ÔÖݵŤÉËÅâ³¥±£ÏÕ¹«Ë¾SAIF Corp.ÔÚ10Ô·ݲúÉúÁËÒ»´ÎÊý¾ÝÎ¥¹æ£¬¿ÉÄÜ»áй¶±£µ¥³ÖÓÐÈËÒÔ¼°¹¤ÉËÅâ³¥Ë÷ÅâÈ˵ÄÐÅÏ¢¡£SAIFÚ¹ÊÍ·£¬10ÔÂ24ÈÕδ¾ÊÚȨµÄÓ×ÎÒ¿ÉÄܽӼûºÍ»ñÈ¡ÆäÍøÂçÖеÄÎļþ¡£·ÖÎö·¢ÏÖ´ó²¿Ãű»½Ó¼ûµÄÊý¾ÝÀ´×Ô2003ÄêÖ®Ç°ÍøÂçµÄÐÅÏ¢£¬Éæ¼°Éç»á±£ÏÕºÅÂë¡¢²ÆÕþÕʺÅÒÔ¼°Ò½ÁÆÐÅÏ¢¡£´Ë±í£¬2022Äê9ÔÂ24ÈÕÖÁ10ÔÂ25ÈÕÊÕµ½ÁËSAIF¹ØÓÚË÷ÅâµÄÊéÃæÍ¨Ñ¶µÄË÷ÅâÈË£¬ÆäÐÅÏ¢Ò²¿ÉÄܱ»Ð¹Â¶¡£SAIFÒÑÓÚ12ÔÂ8ÈÕ½«´ËÊÂ֪ͨ¿Í»§£¬ÉÐδÅû¶¿ÉÄÜÊÜÓ°ÏìµÄÈËÊý¡£
https://www.databreaches.net/oregon-workers-compensation-claimants-and-policyholders-may-have-had-their-personal-information-hacked/
6¡¢Check Point°ä²¼¹ØÓÚ2022ÄêÍøÂç¹¥»÷Ç÷ÏòµÄ·ÖÎö»ã±¨
Check PointÔÚ1ÔÂ5ÈÕ°ä²¼Á˹ØÓÚ2022ÄêÍøÂç¹¥»÷Ç÷ÏòµÄ·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬Óë2021ÄêÏà±È£¬2022ÄêÈ«ÇòÍøÂç¹¥»÷Ôö³¤ÁË38%¡£¹¥»÷ÊýÁ¿ÔÚµÚËÄʱ¶È´ïµ½º¹Çàиߣ¬¾ùÔÈÿ¸ö×é֯ÿÖÜÔâµ½1168´Î¹¥»÷¡£2022ÄêÔâµ½¹¥»÷×î¶àµÄÈý´óÐÐÒµÊǽÌÓý×êÑÓ×¢µ±¾ÖºÍÒ½ÁƱ£½¡ÐÐÒµ¡£·ÇÖ޵Ĺ¥»÷ÊýÁ¿×î¶à£¬Ã¿¸ö×é֯ÿÖܾùÔÈÔâµ½1875´Î¹¥»÷£¬Æä´ÎÊÇÑÇÌ«µØÓò£¨1691´Î£©¡£´Ë±í£¬ÀÕË÷Èí¼þÉú̬ϵͳÔÚ³ÖÐø·¢Õ¹ºÍ׳´ó£¬ÐγÉÁ¶¯üÓ׸ü½Ã½ÝµÄ¹¥»÷ÍŻּÔÚÈÆ¹ý·¨ÂÉÐж¯¡£
https://blog.checkpoint.com/2023/01/05/38-increase-in-2022-global-cyberattacks/


¾©¹«Íø°²±¸11010802024551ºÅ