ÃÀ¹úVoIPÌṩÉÌÔâµ½DDoS¹¥»÷£ºvpnMentorÐû²¼ºÚ¿Í·ÖÎö³ÂËß

Ðû²¼Ê±¼ä 2021-09-29

ÃÀ¹úVoIPÌṩÉÌBandwidth.comÔâµ½DDoS¹¥»÷


ÃÀ¹úVoIPÌṩÉÌBandwidth.comÔâµ½DDoS¹¥»÷.png


ÃÀ¹úVoIPÌṩÉÌBandwidth.comÔÚ½üÆÚÔâµ½ÁËDDoS¹¥»÷£¬µ¼Ö¹ýÈ¥¼¸ÌìÄÚÆäÔÚÈ«ÃÀµÄÓïÒô·þÎñÖжÏ¡£Bandwidth´ÓÃÀ¹ú¶«²¿Ê±¼ä9ÔÂ25ÈÕÏÂÎç3:31¿ªÊ¼³ÂËßÆäϵͳ·ºÆð¹ÊÕÏ£¬Ó°ÏìÁËÓïÒô¡¢ÔöÇ¿ÐÍ911(E911)·þÎñ¡¢ÏûÏ¢·¢Ëͺ͹ÙÍø·ÃÎÊ¡£Bandwidthδ¹ûÈ»·þÎñÖжϵÄÔ­Òò£¬µ«ÆäÔ±¹¤³ÆÊÇDDoS¹¥»÷µ¼ÖµÄ¡£±¾ÔÂVoIP.msÔøÔ⵽ΪÆÚÒ»ÖܵÄDDoS¹¥»÷²¢±»ÀÕË÷450ÍòÃÀÔª£¬Éв»Çå³þBandwidthÊÇ·ñÒ²Ôâµ½ÁËÀàËƵÄÀÕË÷¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/bandwidthcom-is-latest-victim-of-ddos-attacks-against-voip-providers/


ÃÀ¹úÐÝ˹¶Ù¿Ú°¶³ÆÆäÔâµ½ÒÉËƹú¼ÒÖ§³ÖµÄºÚ¿Í¹¥»÷


ÃÀ¹úÐÝ˹¶Ù¿Ú°¶³ÆÆäÔâµ½ÒÉËƹú¼ÒÖ§³ÖµÄºÚ¿Í¹¥»÷.png


ÃÀ¹úÐÝ˹¶Ù¿Ú°¶µÄ¹ÙÔ±ÔÚÉÏÖÜËijÂË߳ƣ¬ÐÝ˹¶Ù¸ÛÎñ¾ÖÓÚ8Ô·ÝÔøÔâµ½ÍøÂç¹¥»÷¡£CISA¹ÙÔ±Jen Easterly͸¶£¬´Ë´Î¹¥»÷»î¶¯·Ç³£ÅÓ´ó£¬Ó¦¸Ã¹é¾ÌÓÚ¹ú¼ÒÖ§³ÖµÄºÚ¿Í£¬²¢ÈÏΪ¹¥»÷ÕßÀûÓÃÁËManageEngine ADSelfService PlusÖеÄÉí·ÝÑéÖ¤Èƹý©¶´CVE-2021-40539¡£¸Ã©¶´ÒÑÓÚ9Ô³õÐÞ¸´£¬FBI¡¢CGCYBERºÍCISA»¹ÔÚ9ÔÂÖÐÑ®ÁªºÏÐû²¼ÁËÓйظ鶴µÄÄþ¾²×Éѯ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/122599/hacking/port-of-houston-cyberattack.html


OpenSUpdaterеĴúÂëÇ©Ãû¼¼Êõ¿ÉÈƹýÄþ¾²¼ì²â


OpenSUpdaterеĴúÂëÇ©Ãû¼¼Êõ¿ÉÈƹýÄþ¾²¼ì²â.png


Google TAGÍŶӷ¢ÏÖÁËOpenSUpdaterеĴúÂëÇ©Ãû¼¼Êõ¿ÉÈƹýÄþ¾²¼ì²â¡£OpenSUpdaterͨ³£Ê¹ÓôӺϷ¨Ö¤Êé·¢±í»ú¹¹»ñµÃµÄ´úÂëÇ©ÃûÖ¤Êé½øÐÐÇ©Ãû£¬×Ô8ÔÂÒÔÀ´£¬Ëü¿ªÊ¼Ê¹ÓÃÎÞЧǩÃû¡£ÕâЩÐÂÑù±¾ÒÔEnd of Content(EOC)±êÖ¾Ìæ»»ÁËleaf X.509Ö¤ÊéµÄSignatureAlgorithmµÄ¡°²ÎÊý¡±ÔªËصÄNULL±êÖ¾¡£Ê¹ÓÃOpenSSLÌáÈ¡Ç©ÃûÐÅÏ¢µÄÄþ¾²²úÎï»áÈÏΪÕâÖÖ±àÂëÎÞЧ£¬È»¶øһЩ½âÎöÆ÷ÈÏΪÕâЩ±àÂëÓÐЧ²¢ÔÊÐíÑéÖ¤¡£ÀûÓÃÕâÖÖ·½Ê½£¬¿ÉÒÔµ½´ïÈƹý¼ì²âµÄÄ¿µÄ¡£


 Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/122576/hacking/code-signing-avoid-detection.html


Cisco·¢ÏÖÀûÓÃNetwireºÍWarzone¹¥»÷Ó¡¶ÈµÄ»î¶¯


Cisco·¢ÏÖÀûÓÃNetwireºÍWarzone¹¥»÷Ó¡¶ÈµÄ»î¶¯.png


Cisco TalosÔÚ9ÔÂ23ÈÕÅû¶ÁËÕë¶ÔÓ¡¶ÈÕþ¸®ºÍ¾üÊ»ú¹¹µÄ¹¥»÷»î¶¯¡°Operation Armor Piercer¡±¡£´Ë´Î»î¶¯ÖÐʹÓõÄһЩ¼ÆıÓë°Í»ù˹̹Ïà¹Ø×éÖ¯APT36ºÍSideCopyÏàËÆ£¬²¢Ê¹ÓÃÁËÉÌÒµRAT NetwireºÍWarzone(AveMaria)¡£¹¥»÷Õß»¹Ê¹ÓÃÁËÖÖÖÖÓÕ¶ü£¬ËüÃÇÖ÷Ҫαװ³ÉÓëÓ¡¶ÈÕþ¸®»ù´¡ÉèÊ©ºÍ²Ù×÷Ïà¹ØµÄÖ¸ÄÏ£¬ÀýÈçKavachºÍITÏà¹ØÖ¸ÄÏ¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/threat-actor-targets-indian-government-commercial-rats


vpnMentorÐû²¼ºÚ¿ÍÔÚTelegramÉϻµÄ·ÖÎö³ÂËß


vpnMentorÐû²¼ºÚ¿ÍÔÚTelegramÉϻµÄ·ÖÎö³ÂËß.png


vpnMentor½üÆÚÐû²¼ÁËÓйغڿÍÔÚTelegramÉϻµÄ·ÖÎö³ÂËß¡£³ÂËßÖ¸³ö£¬¹¥»÷ÕßËƺõ¿ªÊ¼´óÁ¿Ó¿ÏòTelegramÀ´·ÖÏíºÍÌÖÂÛ´ó¹æÄ£µÄÊý¾Ýй¶¡£Ñо¿ÈËÔ±¼ÓÈëÁ˼¸¸öÒÔ¶ñÒâÍøÂç»î¶¯ÎªÖ÷µÄTelegramС×飬·¢ÏÖ¹¥»÷Õß»áÔÚƵµÀÖÐÐû²¼×ª´¢µÄÊý¾Ý£¬²¢¶ÔÊý¾Ý½øÐмòҪ˵Ã÷ÒÔ¹©ÆäËûÓû§Ê¹Óã»»òÕßÊÇÊý°ÙÃû³ÉÔ±Ò»ÆðÌÖÂÛÓйØÍøÂç¹¥»÷µÄ¸÷¸ö·½ÃæÒÔ¼°ÈçºÎÀûÓÃת´¢µÄÊý¾Ý¡£


Ô­ÎÄÁ´½Ó£º

https://www.vpnmentor.com/blog/cybercrime-on-telegram/


RiskReconÐû²¼2020ÄêÊý¾Ýй¶Ê¼þµÄÁ¿»¯·ÖÎö³ÂËß


RiskReconÐû²¼2020ÄêÊý¾Ýй¶Ê¼þµÄÁ¿»¯·ÖÎö³ÂËß.png


RiskReconºÍCyentia InstituteÁªºÏÐû²¼ÁË2020ÄêÊý¾Ýй¶Ê¼þµÄÁ¿»¯·ÖÎö³ÂËß¡£³ÂËßÖ¸³ö£¬×Ô2008ÄêÒÔÀ´ÒÑ·¢ÏÖ897ÆðÊý¾Ý鶵ÄÁ¬Ëøʼþ£¨ripple event£©£¬ÆäÖеÄ108Æð·¢ÉúÔÚ¹ýÈ¥ÈýÄêÖУ»´ËÀàʼþÔì³ÉµÄ¾­¼ÃËðʧÊÇ´«Í³µÄÊý¾Ýй¶Ê¼þµÄ10±¶£¬ÆäÖÐ×îÑÏÖصĿɴï26±¶£»µäÐ͵ÄÁ¬ËøʼþÐèÒª379Ììºó²ÅÆøÓ°Ïì75%µÄÏÂÓÎÊܺ¦Õߣ¬¶øÉæ¼°µ½×éÖ¯µÄÊýÁ¿Æ½¾ùΪ4¸ö¡£


Ô­ÎÄÁ´½Ó£º

https://www.riskrecon.com/report-measuring-the-impact-of-multi-party-breaches