΢ÈíÐû²¼7Ô·ÝÇå¾²¸üУ¬£¬£¬£¬ÐÞ¸´9¸ö0dayÔÚÄÚµÄ117¸öÎó²î£»£»£»£»£»£»Ê±ÉÐÆ·ÅÆGuessÔâµ½DarkSideÀÕË÷¹¥»÷й¶200GBÎļþ

Ðû²¼Ê±¼ä 2021-07-15

1.΢ÈíÐû²¼7Ô·ÝÇå¾²¸üУ¬£¬£¬£¬ÐÞ¸´9¸ö0dayÔÚÄÚµÄ117¸öÎó²î


1.jpg


΢ÈíÐû²¼ÁË2021Äê7Ô·ݵÄÖܶþ²¹¶¡£¬£¬£¬£¬ÐÞ¸´Á˰üÀ¨9¸ö0dayÔÚÄÚµÄ117¸öÎó²î¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÖУ¬£¬£¬£¬44¸öΪԶ³Ì´úÂëÖ´ÐУ¬£¬£¬£¬32¸öΪÌáȨÎó²î£¬£¬£¬£¬14¸öΪÐÅϢй¶Îó²î£¬£¬£¬£¬12¸öΪ¾Ü¾øÐ§ÀÍÎó²î£¬£¬£¬£¬8¸öΪÇå¾²¹¦Ð§ÈƹýÎó²î£¬£¬£¬£¬7¸öΪÓÕÆ­Îó²î¡£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ9¸ö0dayÖУ¬£¬£¬£¬ÓÐ4¸öÒѱ»ÔÚÔÚҰʹÓ㬣¬£¬£¬°üÀ¨PrintNightmareÎó²î£¨CVE-2021-34527£©¡¢WindowsÄÚºËÌáȨÎó²î£¨CVE-2021-33771ºÍCVE-2021-31979£©ÒÔ¼°¾ç±¾ÒýÇæÄÚ´æËð»µÎó²î£¨CVE-2021-34448£©¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2021-patch-tuesday-fixes-9-zero-days-117-flaws/


2.SolarWindsÐÞ¸´Serv-UÖÐÒѱ»Ê¹ÓõÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î


2.jpg


SolarWindsÔÚ7ÔÂ9ÈÕÐû²¼µÄServ-U 15.2.3 HF2ÖÐÐÞ¸´ÁËÒ»¸öÒѱ»Ê¹ÓõÄ0day¡£¡£¡£¡£¡£¡£MicrosoftÅû¶ÁËServ-U²úÆ·µÄÔ¶³Ì´úÂëÖ´ÐÐ0day£¨CVE-2021-35211£©£¬£¬£¬£¬Ô¶³Ì¹¥»÷ÕßʹÓôËÎó²îÄܹ»ÒÔÌØÊâȨÏÞÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬ÔÚÄ¿µÄϵͳÉÏ×°Öò¢ÔËÐгÌÐò¡¢Éó²é¡¢¸ü¸Ä»òɾ³ýÊý¾ÝµÈ¡£¡£¡£¡£¡£¡£ÏÖÔÚ¸ÃÎó²îÒѾ­³ö±»Ò°Ê¹Ó㬣¬£¬£¬µ«SolarWindsÌåÏÖ£¬£¬£¬£¬ÈôÊÇServ-UÇéÐÎÖÐδÆôÓÃSSH£¬£¬£¬£¬Ôò¸ÃÎó²î²»±£´æ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/solarwinds-patches-critical-serv-u-vulnerability-exploited-in-the-wild/


3.ʱÉÐÆ·ÅÆGuessÔâµ½DarkSideÀÕË÷¹¥»÷й¶200GBÎļþ


3.jpg


ÃÀ¹úʱÉÐÆ·ÅƺÍÁãÊÛÉÌGuessÔâµ½DarkSideÀÕË÷¹¥»÷й¶200GBÎļþ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬¹¥»÷±¬·¢ÔÚ2021Äê2ÔÂ2ÈÕÖÁ2021Äê2ÔÂ23ÈÕ£¬£¬£¬£¬¸Ã¹«Ë¾ÔÚ6ÔÂ3ÈÕÍê³ÉÊÓ²ìºóÈ·¶¨ÁËÊÜÓ°ÏìµÄ¿Í»§²¢ÓÚ6ÔÂ9ÈÕ½«´ËÊÂÎñ֪ͨ¸øÆä¿Í»§¡£¡£¡£¡£¡£¡£¾­ÊÓ²ìÈ·¶¨£¬£¬£¬£¬Ð¹Â¶ÐÅÏ¢°üÀ¨Éç»áÇå¾²ºÅÂë¡¢¼ÝÕÕºÅÂë¡¢»¤ÕÕºÅÂëºÍ/»ò²ÆÎñÕʺÅ£¬£¬£¬£¬Ö»Éæ¼°1300¶àÈË¡£¡£¡£¡£¡£¡£Guess²¢Î´Í¸Â©Óйع¥»÷ÕßµÄÈκÎÐÅÏ¢£¬£¬£¬£¬¿ÉÊÇDarkSideÔøÔÚ4Ô·ÝÉù³ÆÆä¹¥»÷ÁËGuess²¢ÇÔÈ¡ÁËÁè¼Ý200GBµÄÎļþ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/fashion-retailer-guess-notifies-users-data-breach


4.ºÚ¿Í³öÊÛ6ÒÚLinkedInÓû§ÐÅÏ¢²¢³ÆÐÂÊý¾Ý±È֮ǰµÄ¸üºÃ


4.jpg


ºÚ¿ÍÔÚ°µÍø³öÊÛÁË6ÒÚ¸öLinkedInÓû§µÄÐÅÏ¢£¬£¬£¬£¬²¢³ÆÕâЩÊý¾ÝÊÇеÄ£¬£¬£¬£¬±ÈÖ®Ç°ÍøÂçµÄÊý¾Ý¸üºÃ¡£¡£¡£¡£¡£¡£ºÚ¿ÍÐû²¼ÁË632699¸öÓû§ÐÅÏ¢×÷ΪÑù±¾£¬£¬£¬£¬ÆäÖаüÀ¨ÁËÐÕÃû¡¢ÁìÓ¢ID¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢LinkedInСÎÒ˽¼Ò×ÊÁÏURL¡¢ÆäËûÉ罻ýÌå×ÊÁϵÄÁ´½Ó¡¢ÐԱ𡢳öÉúÈÕÆÚ¡¢ËùÔÚ¡¢Ö°³ÆºÍÆäËûÊÂÇéÏà¹ØÊý¾ÝµÈ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬ËäÈ»ÕâЩÊý¾Ý²»ÊǺÜÃô¸Ð£¬£¬£¬£¬µ«¹¥»÷ÕßÈÔÈ»¿ÉÒÔʹÓÃÕâЩÐÅϢͨ¹ýÉç»á¹¤³ÌµÄÒªÁì¿ìËÙµØÕÒµ½Ð¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://cybernews.com/news/threat-actors-scrape-600-million-linkedin-profiles-and-are-selling-the-data-online-again/


5.Ñо¿Ö°Ô±·¢Ã÷TrickBot»ØºÏ²¢ÐÂÔöÓÃÓÚ¼à¿ØµÄVNCÄ£¿£¿£¿ £¿£¿é


5.jpg


Ñо¿Ö°Ô±·¢Ã÷TrickBot»ØºÏ²¢ÐÂÔöÁËÓÃÓÚ¼à¿ØºÍÇé±¨ÍøÂçµÄVNCÄ£¿£¿£¿ £¿£¿é¡£¡£¡£¡£¡£¡£Trickbot×Ô2016Äêµ×ÒÔÀ´Ò»Ö±»îÔ¾£¬£¬£¬£¬²¢ÓÚ2020Äê10Ô·ݱ»Î¢ÈíºÍ¶à¸öÇå¾²³§ÉÌÁªºÏµ·»Ù¡£¡£¡£¡£¡£¡£¿ÉÊÇ£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÏÖÔÚµÄTrickbot±ÈÒÔÍùÈκÎʱ¼ä¶¼Ô½·¢»îÔ¾£¬£¬£¬£¬²¢ÓÚ2021Äê5Ô¼ì²âµ½ÁËvncDllÄ£¿£¿£¿ £¿£¿éµÄ¸üа汾tvncDll£¬£¬£¬£¬ÓÃÓÚ¼à¿ØºÍÇé±¨ÍøÂç¡£¡£¡£¡£¡£¡£¸ÃÄ£¿£¿£¿ £¿£¿éËÆºõ»¹ÔÚ¿ª·¢ÖУ¬£¬£¬£¬ÓÉÓÚÓÐÒ»¸öƵÈԵĸüÐÂʱ¼ä±í£¬£¬£¬£¬À´°´ÆÚÌí¼Óй¦Ð§ºÍÐÞ¸´¹ýʧ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bitdefender.com/blog/labs/trickbot-activity-increases-new-vnc-module-on-the-radar


6.AberdeenºÍcode42ÁªºÏÐû²¼ÓйØÄÚ²¿Î£º¦µÄÆÊÎö±¨¸æ


6.jpg


AberdeenºÍcode42ÁªºÏÐû²¼ÁËÓйØÄÚ²¿Î£º¦µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬Èý·ÖÖ®Ò»µÄÊý¾Ýй¶ÊÂÎñÉæ¼°ÄÚ²¿Ö°Ô±£¬£¬£¬£¬¶øÆäÖÐÔ¼80%ÈËÊÇÎÞÒâµÄ£»£»£»£»£»£»75%µÄ×éÖ¯¶ÔÆäÇéÐÎûÓÐÒ»Ö¡¢¼¯ÖеĿɼûÐÔ£»£»£»£»£»£»2020Ä꣬£¬£¬£¬ÔÚÖÕ¶ËÉϱ¬·¢Îó²îµÄ¿ÉÄÜÐÔÊÇЧÀÍÆ÷ÉϵÄ4.5±¶£»£»£»£»£»£»Êý¾Ý̻¶й¶µÄƽ¾ùÊýÄ¿ÊÇÿ¸öÓû§ÌìÌì»á±¬·¢13¸öÊý¾Ýй¶ÊÂÎñ£»£»£»£»£»£»ÄÚ²¿Ö°Ô±Êý¾Ýй¶µÄ±¾Ç®¿ÉÄܸߴ﹫˾ÄêÊÕÈëµÄ20%¡£¡£¡£¡£¡£¡£ 


Ô­ÎÄÁ´½Ó£º

https://www.code42.com/blog/aberdeen-report-key-takeaways/