CiscoÐû²¼Äþ¾²¸üУ¬ÐÞ¸´Æä¶à¿î²úÎïÖеÄ8¸ö©¶´

Ðû²¼Ê±¼ä 2022-08-05
1¡¢CiscoÐû²¼Äþ¾²¸üУ¬ÐÞ¸´Æä¶à¿î²úÎïÖеÄ8¸ö©¶´

      

8ÔÂ3ÈÕ£¬CiscoÐû²¼Äþ¾²¸üУ¬×ܼÆÐÞ¸´ÁË8¸ö©¶´¡£ÆäÖУ¬½ÏΪÑÏÖØµÄÊÇCisco Small Business RVϵÁзÓÉÆ÷ÖеÄ©¶´CVE-2022-20842£¬CVSSÆÀ·ÖΪ9.8£¬¿É±»Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÓÃÀ´Ö´ÐÐÈÎÒâ´úÂ룬»òʹÉ豸ÒâÍâÖØÆô´Ó¶øµ¼Ö¾ܾø·þÎñ(DoS)£»»¹ÓÐWeb¹ýÂËÆ÷Êý¾Ý¿â¸üй¦Ð§ÖеÄÃüÁî×¢Èë©¶´£¨CVE-2022-20827£©ºÍ¿ª·Å¼´²å¼´ÓÃ(PnP)Ä £¿éÃüÁî×¢Èë©¶´£¨CVE-2022-20841£©£¬ÒÔÉÏÈý¸ö©¶´¾ùΪÊäÈëÑéÖ¤²»×㵼ֵġ£´ËÍ⣬»¹ÐÞ¸´ÁËWebex MeetingsºÍÉí·Ý·þÎñÒýÇæµÈ²úÎïÖеĶà¸ö©¶´¡£


https://thehackernews.com/2022/08/cisco-business-routers-found-vulnerable.html


2¡¢µÂ¹ú¹¤ÉÌЭ»á³ÆÆäÔâµ½´ó¹æÄ£¹¥»÷±»ÆÈ¹Ø±ÕËùÓÐϵͳ

      

¾ÝýÌå8ÔÂ4ÈÕ±¨µÀ£¬µÂ¹ú¹¤ÉÌЭ»á(DIHK)³ÆÆäÔâµ½ÁË´ó¹æÄ£µÄ¹¥»÷¡£DIHKÊÇÓÉ79¸ö´ú±íµÂ¹ú¹«Ë¾µÄÉÌ»á×é³ÉµÄÁªÃË£¬ÓµÓÐÁè¼Ý300Íò»áÔ±¡£¹¥»÷·¢ÉúÔÚ8ÔÂ3ÈÕ£¬Ð­»á±»ÆÈ¹Ø±ÕÆäËùÓÐITϵͳ£¬ÒÔ¼°Êý×Ö·þÎñ¡¢µç»°ºÍµç×ÓÓʼþ·þÎñÆ÷À´Ó¦¶Ô´Ë´Î¹¥»÷¡£DIHKÉùÃ÷¹Ø±ÕϵͳÊÇÒ»ÖÖÔ¤·À´ëÊ©£¬Ò²ÊÇÈÃITÍŶÓÓÐʱ¼äÌá³ö½â¾ö·½°¸ºÍ½¨Á¢·ÀÓùµÄ·½Ê½¡£Ä¿Ç°£¬¸Ã»ú¹¹ÕýÔÚÖð²½»Ö¸´Ò»Ð©·þÎñ£¬µ«ÎÞ·¨Ô¤²âÐèÒª¶à³¤Ê±¼ä¡£


https://www.bleepingcomputer.com/news/security/german-chambers-of-industry-and-commerce-hit-by-massive-cyberattack/


3¡¢RobinhoodÒòÎ¥·´Å¦Ô¼ÍøÂçÄþ¾²¹æÔò±»· £¿î3000ÍòÃÀÔª

      

ýÌå8ÔÂ3Èճƣ¬RobinhoodµÄ¼ÓÃÜ»õ±Ò²¿ÃÅÒòÎ¥·´ÍøÂçÄþ¾²ºÍÏ´Ç®¹æÔò¶ø±»Å¦Ô¼½ðÈÚ·þÎñ²¿· £¿î3000ÍòÃÀÔª¡£Å¦Ô¼½ðÈÚ·þÎñ²¿µÄÉùÃ÷ÌåÏÖ£¬Robinhood CryptoÍøÂçÄþ¾²¼Æ»®´æÔÚÎÊÌ⣬ûÓÐÍêÈ«½â¾öRHCµÄÔËÓª·çÏÕ£¬¶øÇҸüƻ®ÖеľßÌåÕþ²ß²»ÍêÈ«ÇкÏÍøÂçÄþ¾²ºÍÐéÄâ»õ±Ò¹æÔòµÄ¼¸Ïî¹æ¶¨£¬ÇҸù«Ë¾µÄºÏ¹æ¼Æ»®ºÍ½»Ò×¼à¿ØÏµÍ³ÖеĴæÔÚȱÏÝ¡£³ýÁË3000ÍòÃÀÔªµÄ· £¿îÍ⣬¸Ã¹«Ë¾»¹ÐèҪƸÇëÒ»Ãû¶ÀÁ¢ÕÕÁÏÀ´È«ÃæÆÀ¹ÀRobinhood Crypto¹æÔòµÄ×ñÊØÇé¿ö£¬²¢ÐÞ¸´ÒÑ·¢ÏÖµÄȱÏݺÍÎ¥¹æÐÐΪ¡£


https://www.securityweek.com/robinhood-crypto-penalized-30m-violating-ny-cybersecurity-regulations


4¡¢Ô¼Äª35000¸öGitHub´æ´¢¿â±»¿Ë¡²¢Ìí¼Ó¶ñÒâ´úÂë

      

8ÔÂ3ÈÕ£¬Èí¼þ¿ª·¢ÈËÔ±Stephen LacyÉù³ÆÔÚGitHubÉÏ·¢ÏÖÁËÔ¼35000¸ö´æ´¢¿â±»¿Ë¡²¢Ìí¼Ó¶ñÒâ´úÂë¡ £¿ª·¢ÈËÔ±James TuckerÖ¸³ö£¬°üÂÞ¶ñÒâURLµÄ¿Ë¡´æ´¢¿â²»½öй¶ÁËÓû§µÄ»·¾³±äÁ¿ £¬¶øÇÒ»¹°üÂÞÒ»¸öµ¥ÐкóÃÅ¡£ÆäÖоø´ó¶àÊý¿Ë¡µÄ´æ´¢¿âÔÚÉϸöÔ±»¶ñÒâ´úÂë¸Ä¶¯£¬µ«Ò²µ½Ò»Ð©¿É×·Ëݵ½2015ÄꡣĿǰ£¬GitHubÍŶÓÒÑ´ÓÆäÆ½Ì¨ÉÏɾ³ýÁ˶ñÒâ¿Ë¡´æ´¢¿â¡£


https://www.bleepingcomputer.com/news/security/35-000-code-repos-not-hacked-but-clones-flood-github-to-serve-malware/


5¡¢Zscaler·¢ÏÖÀûÓÃAiTM¼¼ÊõºÍ¶àÖÖÈÆ¹ý¼ÆÄ±µÄµöÓã¹¥»÷

      

ZscalerÔÚ8ÔÂ2ÈÕÅû¶ÁËÀûÓÃAiTM¼¼ÊõÒÔ¼°¶àÖÖÈÆ¹ý¼ÆÄ±µÄ´ó¹æÄ£ÍøÂçµöÓã»î¶¯¡£´Ë´Î»î¶¯¿ªÊ¼ÓÚ2022Äê6Ô£¬Ö÷ÒªÕë¶ÔÃÀ¹ú¡¢Ó¢¹ú¡¢ÐÂÎ÷À¼ºÍ°Ä´óÀûÑǵĽðÈڿƼ¼¡¢´û¿î¡¢»á¼Æ¡¢±£ÏÕºÍÁª°îÐÅÓúÏ×÷Éç×éÖ¯¡£¹¥»÷»î¶¯ÀûÓÃÁË»ùÓÚÊðÀíµÄ×Ô½çËµÍøÂçµöÓ㹤¾ß°üÈÆ¹ý¶àÒòËØÈÏÖ¤£¨MFA£©£¬ÀûÓÃÖÖÖÖαװºÍä¯ÀÀÆ÷Ö¸ÎÆ¼¼ÊõÀ´Èƹý×Ô¶¯URL·ÖÎöϵͳ£¬ÀûÓÃURLÖØ¶¨Ïò¼¼ÊõÈÆ¹ýÆóÒµµç×ÓÓʼþURL·ÖÎö½â¾ö·½°¸£¬»¹ÀûÓÃÁ˺Ϸ¨µÄÔÚÏß´úÂë±à¼­·þÎñ£¨ÈçCodeSandboxºÍGlitch£©¡£


https://www.zscaler.com/blogs/security-research/large-scale-aitm-attack-targeting-enterprise-users-microsoft-email-services


6¡¢KasperskyÐû²¼2022ÄêQ2 DDoS¹¥»÷Ì¬ÊÆµÄ·ÖÎö³ÂËß

      

8ÔÂ3ÈÕ£¬KasperskyÐû²¼ÁË2022ÄêµÚ¶þ¼¾¶ÈDDoS¹¥»÷Ì¬ÊÆµÄ·ÖÎö³ÂËß¡£³ÂËßÖ¸³ö£¬ÔÚµÚ¶þ¼¾¶È×ܹ²¼Ç¼ÁË78558´ÎDDoS¹¥»÷£¬±ÈÉÏÒ»¼¾¶ÈϽµÁË13.72%¡£³¤Ê±¼ä£¨20Сʱ»ò¸ü³¤£©DDoS¹¥»÷µÄÕ¼±ÈϽµ£¬´ÓµÚÒ»¼¾¶ÈµÄ½ü20%½µÖÁÔ¼7%£¬4СʱµÄ½Ï¶ÌDDoS¹¥»÷Õ¼×ܹ¥»÷ÊýÁ¿µÄ95.24%¡£46.17%µÄ½©Ê¬ÍøÂçC2·þÎñÆ÷λÓÚÃÀ¹ú£¬Æä´ÎÊǺÉÀ¼£¨14.49%£©ºÍµÂ¹ú£¨9.11%£©¡£Ö÷ÒªµÄDDoS¹¥»÷¼¼ÊõΪUDP flood£¬Õ¼±È62.53%£¬Æä´ÎÊÇSYN flood£¨20.25%£©¡£


https://securelist.com/ddos-attacks-in-q2-2022/107025/