IntelÇý¶¯·¨Ê½Bugµ¼ÖÂʹÓÃDirectXµÄWindowsÀûÓñÀÀ£

°ä²¼¹¦·ò 2023-02-13
1¡¢IntelÇý¶¯·¨Ê½Bugµ¼ÖÂʹÓÃDirectXµÄWindowsÀûÓñÀÀ£

      

¾ÝýÌå2ÔÂ10ÈÕ±¨Â·£¬Î¢Èí°µÊ¾ÔÚ×°ÖÃ2022Äê11ÔÂÀÛ»ý¸üкó£¬WindowsϵͳÉÏʹÓÃDirectXµÄÀûÓ÷¨Ê½»á²úÉú±ÀÀ£¡£ÊÜÓ°ÏìÓû§»á´ÓʹÓÃDirectXµÄÀûÓ÷¨Ê½Öп´µ½apphelp.dllÃýÎó£¨ÀûÓ÷¨Ê½¼æÈÝÐÔ¿Í»§¶Ë¿â£©£¬Ô­ÒòÊÇÓ¢ÌØ¶ûGPUÇý¶¯·¨Ê½ÒѾ­¹ýÆÚ¡£Î¢ÈíÔÚÖÂÁ¦½¨¸´Õâ¸öÐÂÎÊÌ⣬²¢»áÔÚ¼´½«°ä²¼µÄ°æ±¾ÖÐÌṩ¸üС£ÔÚ´Ë֮ǰ£¬ÊÜÓ°ÏìµÄÓû§Äܹ»Í¨¹ý½«Intel GPUÇý¶¯·¨Ê½¸üе½×îаæÕý±¾ÁÙʱ½â¾öÕâ¸öÎÊÌâ¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-says-intel-driver-bug-crashes-apps-on-windows-pcs/


2¡¢Ó²¼þÔì×÷ÉÌA10 NetworksÔâµ½ÀÕË÷ÍÅ»ïPlayµÄ¹¥»÷

      

ýÌåÓÚ2ÔÂ10ÈÕ±¨Â·£¬¼ÓÀû¸£ÄáÑǵÄÍøÂçÓ²¼þÔì×÷ÉÌA10 NetworksÔâµ½ÁËÀÕË÷ÍÅ»ïPlayµÄ¹¥»÷¡£ÊÂÎñ²úÉúÔÚ2023Äê1ÔÂ23ÈÕ£¬µ÷²éÈ·¶¨¹¥»÷ÕßÉè·¨»ñµÃÁ˶Թ²ÏíÇý¶¯Æ÷µÄ½Ó¼ûȨÏÞ£¬×°ÖÃÁ˶ñÒâÈí¼þ£¬²¢ÇÔÈ¡ÁËÓëÈËÁ¦×ÊÔ´¡¢²ÆÕþºÍ˾·¨Ö°ÄÜÓйصÄÊý¾Ý¡£Ä¿Ç°£¬¸Ã¹«Ë¾¹À¼Æ´ËÊÂÎñ²»»á¶ÔÆäÔËÓª²úÉú³Á´óÓ°Ïì¡£PlayÓÚ2ÔÂ9ÈÕ½«A10 NetworksÔö³¤µ½ÆäÍøÕ¾£¬²¢ÍþвҪÔÚ2ÔÂ12ÈÕ¹«¿ªÇÔÈ¡µÄÎļþ¡£


https://www.bleepingcomputer.com/news/security/a10-networks-confirms-data-breach-after-play-ransomware-attack/


3¡¢ÓòÃû×¢²áÉÌNamecheapµÄÓʼþÕÊ»§±»ºÚ·¢ËÍ´óÁ¿´¹µöÓʼþ

      

ýÌå2ÔÂ12Èճƣ¬ÓòÃû×¢²áÉÌNamecheapµÄÓʼþÕÊ»§ÔÚÖÜÈÕÍíÉÏÔâµ½¹¥»÷£¬·¢ËÍ´óÁ¿Ö¼ÔÚÇÔÈ¡ÊÕ¼þÈ˵ÄÐÅÏ¢ºÍ¼ÓÃÜÇ®±ÒÇ®°üµÄ´¹µöÓʼþ¡£´¹µö»î¶¯ÆðÍ·ÓÚ4:30 PM ET×óÓÒ£¬Ô´ÓÚNamecheapÓÃÀ´·¢ËÍÐø¶©Í¨ÖªºÍÓªÏúÓʼþµÄµç×ÓÓʼþƽ̨SendGrid¡£ÕâЩ´¹µöÓʼþ¼ÙÒâDHL»òMetaMask£¬ÆäÖÐDHLµÄÓʼþ¼Ù×°³ÉʵÏÖ°ü¹üµÝËÍËùÐèµÄµÝËÍ·ÑÕ˵¥£¬MetaMaskµÄÓʼþÔò¼Ù×°ÊDZØÐëµÄKYCÑéÖ¤¡£


https://www.bleepingcomputer.com/news/security/namecheaps-email-hacked-to-send-metamask-dhl-phishing-emails/


4¡¢¼ÓÀû¸£ÄáÑÇÖݶà¸öÒ½ÁÆ×éÖ¯Êý¾Ýй¶ӰÏìÔ¼330Íò»¼Õß

      

¾Ý2ÔÂ11ÈÕ±¨Â·£¬¼ÓÀû¸£ÄáÑÇHeritage Provider NetworkÖеĶà¸öÒ½ÁÆ×éÖ¯Ôâµ½ÀÕË÷¹¥»÷£¬Ð¹Â¶3300638Ãû»¼ÕßµÄÐÅÏ¢¡£ÊÜÓ°Ïì×éÖ¯Ô̺¬Regal Medical GroupºÍLakeside Medical OrganizationµÈ¡£¹¥»÷²úÉúÔÚ2022Äê12ÔÂ1ÈÕ£¬RegalÔÚ12ÔÂ2ÈÕ·¢ÏÖ²¿ÃÅ·þÎñÆ÷ÎÞ·¨½Ó¼û£¬¾­µ÷²éÈ·¶¨ÕâЩ·þÎñÆ÷ϰȾÁ˶ñÒâÈí¼þ¡£RegalÔÚ֪ͨÊÜÓ°ÏìÓû§£¬²¢½«ÎªÆäÌṩΪÆÚÒ»ÄêµÄNorton LifeLockÃâ·ÑÐÅÓþ¼à¿Ø¡£


https://www.theregister.com/2023/02/11/ransomware_regal_medical_group/


5¡¢OtorioÅû¶ÎÞÏßIIoTÉ豸ÖÐÓ°Ïì¹Ø¼ü»ù´¡ÉèÊ©µÄ·ì϶

      

2ÔÂ9ÈÕ±¨Â·³Æ£¬¹¤ÒµÍøÂ簲ȫ¹«Ë¾OtorioÔÚ4¼Ò·ÖÆç¹©¸øÉ̵ÄÎÞÏß¹¤ÒµÎïÁªÍø(IIoT)É豸Öз¢ÏÖÁË38¸ö·ì϶¡£¹¥»÷ÕßÄܹ»ÀûÓÃÕâЩ·ì϶»ñµÃ¶ÔÄÚ²¿OTϵͳµÄ³õʼ½Ó¼ûȨÏÞ£¬²¢Èƹý°²È«²ã²¢ÈëÇÖÖ¸±êÍøÂ磬ӰÏì¹Ø¼ü»ù´¡ÉèÊ©¡£ÆäÖУ¬ÓÐÈý¸öÓ°ÏìETIC Telecom µÄÔ¶³Ì½Ó¼û·þÎñÆ÷(RAS)µÄ·ì϶£¨CVE-2022-3703¡¢CVE-2022-41607ºÍCVE-2022-40981£©£¬¿ÉÄܱ»ÀûÓÃÀ´ÆëÈ«½ÚÔìÒ×ÊÜÓ°ÏìµÄÉ豸¡£


https://thehackernews.com/2023/02/critical-infrastructure-at-risk-from.html


6¡¢TrendMicro·¢ÏÖÀûÓÃÐéα¹¤×÷Õë¶Ô¶«Å·µØÓòµÄ¹¥»÷»î¶¯

      

2ÔÂ9ÈÕ£¬Trend MicroÅû¶ÁËÀûÓÃÐéα¹¤×÷»úÓöÕë¶Ô¶«Å·µØÓòµÄ¹¥»÷»î¶¯¡£¸Ã»î¶¯ÖУ¬¹¥»÷ÕßʹÓÃÁ˼¸¸ö¸ß¶È»ìºÏÇÒ¿ª·¢²»¼°µÄ×Ô½ç˵¼ÓÔØ·¨Ê½£¬ÒÔ·½±ãÓÃÇÔÈ¡·¨Ê½EnigmaϰȾÓë¼ÓÃÜÇ®±ÒÐÐÒµÓйصÄÈË¡£¾ÝϤ£¬EnigmaÊÇ¿ªÔ´µÄC#¶ñÒâÈí¼þStealeriumµÄÅú¸Ä°æ±¾¡£³ýÁËÕâЩ¼ÓÔØ·¨Ê½Ö®±í£¬¹¥»÷Õß»¹ÀûÓÃIntelÇý¶¯·¨Ê½·ì϶£¨CVE-2015-2291£©À´¼ÓÔØÖ¼ÔÚ½µµÍMicrosoft DefenderÁîÅÆÆëÈ«ÐԵĶñÒâÇý¶¯·¨Ê½¡£


https://www.trendmicro.com/en_us/research/23/b/enigma-stealer-targets-cryptocurrency-industry-with-fake-jobs.html