ÃÀ¹úÐÁÆÕÉÔì×÷¹«Ë¾Ôâµ½ÍøÂç¹¥»÷µ¼ÖÂÔËÓªÊܵ½Ó°Ïì
°ä²¼¹¦·ò 2023-10-131¡¢ÃÀ¹úÐÁÆÕÉÔì×÷¹«Ë¾Ôâµ½ÍøÂç¹¥»÷µ¼ÖÂÔËÓªÊܵ½Ó°Ïì
¾Ý10ÔÂ12ÈÕ±¨Â·£¬ÐÁÆÕÉÔì×÷¹«Ë¾£¨Simpson Manufacturing£©Ôâµ½¹¥»÷£¬µ¼ÖÂÔËÓªÊܵ½Ó°Ïì¡£ÕâÊÇÃÀ¹úµÄÒ»¼Ò¹¹ÖþºÍ½á¹¹×ÊÁϳö²úÉÌ£¬2022Äê¾»ÏúÊÛ¶îΪ21.2ÒÚÃÀÔª¡£¸Ã¹«Ë¾°µÊ¾£¬10ÔÂ10ÈÕ£¬ËûÃǵÄIT»ù´¡ÉèÊ©ºÍÀûÓ÷¨Ê½ÒòÍøÂ簲ȫÊÂÎñÖжϡ£·¢ÏÖ¶ñÒâ»î¶¯ºó£¬Ôì×÷É̹عØÁ˲¿ÃÅϵͳÒÔ¶ôÔì½øÒ»²½µÄ¹¥»÷¡£ÓÉÓÚ²¹¾È±ØÒª¹¦·ò£¬Òò¶øÔËÓªµÄÔÝÍ£»¹½«³ÖÐøÒ»¶Î¹¦·ò¡£Ö»¹ÜÐÁÆÕÉûй©¹¥»÷ÀàÐÍ£¬µ«¹Ø¹ØÏµÍ³Í¨³£ÊǶÔÀÕË÷¹¥»÷µÄÏìÓ¦¡£
https://www.securityweek.com/simpson-manufacturing-takes-systems-offline-following-cyberattack/
2¡¢ÔÆÌṩÉÌShadow PC³¬¹ý50Íò¿Í»§µÄÐÅÏ¢±»ÏúÊÛÔÚ°µÍø
¾ÝýÌå10ÔÂ12ÈÕ±¨Â·£¬ºÚ¿ÍÐû³ÆÏúÊ۸߶ËÔÆÍÆËã·þÎñÌṩÉÌShadow PC³¬¹ý500000Ãû¿Í»§µÄÊý¾Ý¡£Shadowй©£¬ËûÃǵÄÒ»ÃûÔ±¹¤ÔÚ9Ôµ×Ôâµ½ÁËÉ繤¹¥»÷¡£¹¥»÷ʼÓÚDiscordƽ̨£¬ÒÔSteamƽ̨ÉϵÄÒ»¿îÓÎϷΪ»Ï×ÓÏÂÔØÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¸Ã¶ñÒâÈí¼þ³É¹¦ÇÔÈ¡ÁËÉí·ÝÑéÖ¤cookie£¬Ê¹ºÚ¿Í¿ÉÄܵǼ¸Ã¹«Ë¾µÄSaaSÌṩÉ̵ÄÖÎÀí½çÃæ£¬²¢ÀûÓô˽ӼûȨÏÞÇÔÈ¡¿Í»§ÐÅÏ¢¡£Ä³ºÚ¿Í³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬²¢ÏúÊÛ533624ÃûÓû§µÄÊý¾Ý£¬°µÊ¾³ýÁËShadowÒѾȷÈϵÄÊý¾Ý±í£¬ËûÃÇ»¹»ñµÃÁËIPÏνÓÈÕÖ¾¡£
https://www.bleepingcomputer.com/news/security/shadow-pc-warns-of-data-breach-as-hacker-tries-to-sell-gamers-info/
3¡¢BianLianÐû³ÆÒÑÇÔÈ¡¼ÓÄô󺽿չ«Ë¾Ô¼210GBµÄÊý¾Ý
ýÌå10ÔÂ11Èճƣ¬BianLian¶Ô¼ÓÄô󺽿չ«Ë¾Ôâµ½µÄ¹¥»÷ÕÆ¹Ü£¬²¢°µÊ¾ÒÑÍøÂçÔ¼210GBµÄÊý¾Ý¡£¸Ã¹«Ë¾ÔÚ9ÔµÄÒ»·ÝÉêÃ÷ÖаµÊ¾£¬Ö»Óв¿ÃÅÔ±¹¤ÓÐÏÞµÄÓ×ÎÒÐÅϢй¶¡£µ«BianLianÐû³ÆÇÔÈ¡ÁË´Ó2008Äêµ½2023ÄêµÄ¼¼ÊõºÍÔËÓªÊý¾Ý£¬Ô̺¬¹«Ë¾¼¼ÊõºÍ°²È«µÄ¾ßÌåÐÅÏ¢¡¢SQL±¸·Ý¡¢Ô±¹¤Ó×ÎÒÐÅÏ¢¡¢¹©¸øÉ̺͹©¸øÉ̵ÄÊý¾Ý¡¢»úÃÜÎļþÒÔ¼°¹«Ë¾Êý¾Ý¿âµÄµµ°¸£¬²¢ÌṩÁ˽ØÍ¼×÷Ϊ֤¾Ý¡£¼ÓÄô󺽿հµÊ¾£¬ËûÃÇ֪·BianLianµÄÍþв£¬µ«Ã»ÓÐ֤ʵ¸ÃÍÅ»ï¾ÍÊÇÕâ´ÎÊÂÎñµÄÄ»ºóºÚÊÖ¡£
https://www.bleepingcomputer.com/news/security/bianlian-extortion-group-claims-recent-air-canada-breach/
4¡¢Cofense³ÆÀûÓÃLinkedInÖÇÄÜÁ´½ÓµÄ´¹µö»î¶¯¼¤Ôö
CofenseÔÚ10ÔÂ11Èճƣ¬Æä·¢ÏÖÀÄÓÃLinkedInÖÇÄÜÁ´½ÓÀ´Èƹý¼ì²âµÄ´¹µö¹¥»÷¼¤Ôö£¬Ö¼ÔÚÇÔÈ¡MicrosoftÕÊ»§Í´´¦¡£ÐÂÒ»ÂÖ¹¥»÷²úÉúÔÚ7ÔÂÖÁ8ÔÂÆÚ¼ä£¬Ô̺¬800¶à·âÓʼþºÍ80¸ö¹ÖÒìµÄÖÇÄÜÁ´½Ó£¬Ô´×Ôд´½¨»ò±»ÈëÇÖµÄLinkedInÆóÒµÕÊ»§¡£Êý¾ÝÏÔʾ£¬Õâ´Î»î¶¯ÖØÒªÕë¶ÔµÄÊǽðÈÚ¡¢Ôì×÷¡¢ÄÜÔ´¡¢¹¹ÖþºÍÒ½ÁƱ£½¡ÁìÓò¡£ÖÇÄÜÁ´½ÓÊÇLinkedIn Sales Navigator·þÎñµÄÒ»²¿ÃÅ£¬ÓÃÓÚÓªÏúºÍ¸ú×Ù£¬CofenseÔçÔÚ2021Äê¾Í·¢ÏÖ¹ýÀûÓÃLinkedInÖÇÄÜÁ´½ÓµÄ´ó¹æÄ£´¹µö¹¥»÷¡£
https://cofense2022stg.wpengine.com/blog/linkedin-smart-links-credential-phishing-campaign/
5¡¢Proofpoint°ä²¼2023ÄêÒ½ÁÆÐÐÒµµÄ°²È«·ÖÎö»ã±¨
10ÔÂ11ÈÕ£¬ProofpointÓëPonemonºÏ×÷£¬°ä²¼ÁË2023ÄêÒ½ÁÆÐÐÒµµÄ°²È«·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬88%µÄÊÜ·ÃʵÌåÔÚ´Óǰ12¸öÔÂÄÚ¾ùÔȾÀúÁË40´Î¹¥»÷£¬Ò½ÁÆ»ú¹¹Ôâµ½¹¥»÷µÄ¾ùÔÈ×ܳɱ¾Îª499ÍòÃÀÔª£¬±ÈÉÏÄêÔö³¤13%¡£ÀÕË÷Èí¼þÒÀÈ»ÊÇÒ½ÁÆ»ú¹¹Ê¼ÖÕ´æÔÚµÄÍþв£¬54%µÄÊÜ·ÃÕß³ÆÔâµ½ÁËÀÕË÷¹¥»÷£¬¸ßÓÚ2022ÄêµÄ41%¡£ËùÓÐÊܷûú¹¹ÔÚ´ÓǰÁ½ÄêÄÚÖÁÉÙ²úÉú¹ýÒ»´ÎÉæ¼°Ãô¸ÐºÍ»úÃÜÒ½ÁÆÊý¾ÝµÄÃÔʧ»òй¶ÊÂÎñ¡£BEC¹¥»÷¸üÊܹØ×¢£¬²»°²´ËÀ๥»÷µÄÈË´ÓÈ¥ÄêµÄ46%Ô¾ÉýÖÁ62%¡£
https://www.proofpoint.com/us/newsroom/press-releases/second-annual-ponemon-institute-report-finds-two-thirds-healthcare
6¡¢Critical Start°ä²¼2023ϰëÄêÍþÐ²Ì¬ÊÆ·ÖÎö»ã±¨
10ÔÂ11ÈÕ±¨Â·³Æ£¬Critical Start°ä²¼ÁË2023ϰëÄêÍþÐ²Ì¬ÊÆµÄ·ÖÎö»ã±¨¡£»ã±¨µÄÖØÒª·¢ÏÖÔ̺¬£ºÀûÓÃQRÂëµÄ´¹µö¹¥»÷³ÊÉÏÉýÇ÷Ïò£¬¹¥»÷Õß½«QRÂëǶÈëPNG»òPDFÖУ¬¼Ù×°³ÉMicrosoft °²È«Í¨Öª£»½ÌÓýÊÇ×îÒ×Ôâµ½¹¥»÷µÄÐÐÒµÖ®Ò»£¬2023Äê·ì϶ÀûÓÃÕ¼K-12ѧÌÃÍøÂçÊÂÎñµÄ29%£¬¶ø´¹µö¹¥»÷Õ¼30%£»ÀÕË÷Èí¼þ¼¯ÌåµÄºÏ×÷±È֮ǰÉèÏëµÄ¸ü¿í·º£¬¸ü¾ßÌ嵨·ÖÏíTTP£»Microsoft TeamsÔÊÐí±í²¿ÕÊ»§Ö±½ÓÏòÔ±¹¤·¢ËÍÓк¦Îļþ£¬´Ó¶øÈƹý°²È«¼ì²â£¬ÕâÔö³¤Á˹¥»÷³É¹¦µÄ·çÏÕ¡£
https://www.criticalstart.com/resources/h2-2023-cyber-threat-intelligence-threat-report/


¾©¹«Íø°²±¸11010802024551ºÅ