ÔÚGoogle DocsÖÐÊäÈëÌØ¶¨µÄµ¥´Êºó»áµ¼ÖÂÆäÍß½â

Ðû²¼Ê±¼ä 2022-05-07
1¡¢ÔÚGoogle DocsÖÐÊäÈëÌØ¶¨µÄµ¥´Êºó»áµ¼ÖÂÆäÍß½â


¾ÝýÌå5ÔÂ6ÈÕ±¨µÀ£¬£¬£¬£¬Google DocsÖб£´æÒ»¸öÎÊÌ⣬£¬£¬£¬ÔÚÆäÖÐÊäÈëÌØ¶¨µÄµ¥´Êºó»áµ¼ÖÂÍ߽⡣¡£¡£¡£¡£¸ÃÎÊÌâÊ×ÏÈÓÉÓû§Eliza Callahan·¢Ã÷£¬£¬£¬£¬µ±ÆäÔÚÎĵµÖÐÊäÈë¡°And.And.And.And.And.And.¡±Ê±£¬£¬£¬£¬ÊÕµ½¹ýʧÐÂÎÅ¡°Unable to load file¡±£¬£¬£¬£¬²¢ÇÒÎÞ·¨ÔÙÉó²é»ò±à¼­Îĵµ¡£¡£¡£¡£¡£¾­ÓɲâÊÔ£¬£¬£¬£¬Ð¡Ð´µÄ¡°and.and.and.and.and.and.¡±²»»á´¥·¢¸ÃÎÊÌ⣬£¬£¬£¬µ«ÏàͬÃûÌõÄ×Ö·û´®±£´æÍ¬ÑùµÄÎÊÌ⣬£¬£¬£¬ÖîÈç"But.But.But.But.But."µÈ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÍƲâÓë¡°ÏÔʾÓï·¨½¨Ò顱ѡÏîÓйØ£¬£¬£¬£¬ÏÖÔÚGoogleÍŶÓÕýÔÚ½â¾ö¸ÃÎÊÌâ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/technology/google-docs-crashes-on-seeing-and-and-and-and-and/


2¡¢ÊÕծЧÀÍENCollectÉèÖùýʧй¶Áè¼Ý160ÍòÌõ¼Í¼


Çå¾²¹«Ë¾UpGuardÔÚ5ÔÂ5ÈÕ³ÆÆä·¢Ã÷ÁËÒ»¸öÉèÖùýʧµÄElasticSearchЧÀÍÆ÷£¬£¬£¬£¬Éæ¼°Ó¡¶ÈºÍ·ÇÖÞ½ðÈÚЧÀÍ»ú¹¹´û¿îµÄ²ÆÎñÐÅÏ¢¡£¡£¡£¡£¡£¸ÃElasticSearchÊôÓÚÕ®Îñ´ßÊÕЧÀÍÆ½Ì¨ENCollect£¬£¬£¬£¬×ܹ²ÓÐ5.8GBÊý¾Ý£¬£¬£¬£¬1686363Ìõ¼Í¼¡£¡£¡£¡£¡£ÆäÖаüÀ¨°üÀ¨ÐÕÃû¡¢´û¿î½ð¶î¡¢³öÉúÈÕÆÚ¡¢ÕʺŵÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬ÒÔ¼°ÊôÓÚ²úÆ·ÖÎÀíÔ±¡¢¹«Ë¾¿Í»§ºÍÊÕ¿îÊðÀíµÄ48043¸öÓʼþµØµã¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ2ÔÂ16ÈÕ¼ì²âµ½¸ÃÊý¾Ý¿â£¬£¬£¬£¬2ÔÂ28ÈÕÆäÒѱ»±£»£»£»£»£»¤ÆðÀ´¡£¡£¡£¡£¡£


https://thehackernews.com/2022/05/thousands-of-borrowers-data-exposed.html


3¡¢Ò˼ҼÓÄôó·Ö¹«Ë¾ÒÑй¶½ü10ÍòÃû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢


¾Ý5ÔÂ6ÈÕ±¨µÀ£¬£¬£¬£¬Ò˼ҼÓÄôó·Ö¹«Ë¾ÒÑй¶Լ95000Ãû¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÉùÃ÷ÖÐÌåÏÖ£¬£¬£¬£¬²¿·ÖÖ÷¹ËµÄСÎÒ˽¼ÒÐÅÏ¢·ºÆðÔÚÒ˼ҼÓÄÃÖÁ¹«Ë¾Ò»ÃûÔ±¹¤ÔÚ3ÔÂ1ÈÕÖÁ3ÈÕʱ´úʹÓÃÒ˼ҵÄÖ÷¹ËÊý¾Ý¿â¾ÙÐÐµÄ "Ò»Ñùƽ³£ËÑË÷ "µÄЧ¹ûÖС£¡£¡£¡£¡£´Ë´Îй¶Á˿ͻ§µÄÐÕÃû¡¢ÓʼþµØµã¡¢µç»°ºÅÂëºÍÓÊÕþ±àÂëµÈÐÅÏ¢¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖËûÃÇÏÖÔÚÎÞ·¨ÍƲ⵼Ö´˴ÎÊÂÎñµÄÔµ¹ÊÔ­ÓÉ£¬£¬£¬£¬µ«ÒѾ­½ÓÄÉÐж¯½â¾ö¸ÃÎÊÌ⣬£¬£¬£¬²¢ÒѾ­×Ô¶¯Ïò¼ÓÄôóÒþ˽î¿Ïµ»ú¹¹×ª´ïÁËÕâÒ»ÊÂÎñ¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/data-breach-ikea-canada/


4¡¢¶íÂÞ˹¾ÆÀà·ÖÏúµÄÏà¹ØÍøÕ¾EGAISÔâµ½DDoS¹¥»÷


¾ÝýÌå5ÔÂ5Èճƣ¬£¬£¬£¬¶íÂÞ˹µÄһЩ¾ÆÀ๫˾Éù³ÆÎÞ·¨Æ¾Ö¤Õþ¸®¹æÔòµÄÒªÇó»á¼ûEGAISÍøÕ¾¡£¡£¡£¡£¡£EGAISÊǶíÂÞ˹¾Æ¾«ÒûÁÏͳһ×Ô¶¯»¯ÐÅϢϵͳ£¬£¬£¬£¬ÆäЧÀÍÖÐÖ¹µ¼Ö¶íÂÞ˹¾ÆÀàµÄÔËÊäºÍÅäËÍÔÚÒÑÍù¼¸ÌìÊܵ½ÁËÖØ´óµÄÓ°Ïì¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯¿ÉÄÜÓëÎÚ¿ËÀ¼µÄIT ArmyÓйØ£¬£¬£¬£¬ÓÉÓÚÏà¹ØÍøÕ¾½üÆÚÒѱ»¸ÃÍÅ»ïÁÐΪĿµÄ¡£¡£¡£¡£¡£Õâ²»ÊǵÚÒ»´ÎÕë¶Ô¶íÂÞ˹ÄÚ²¿²úÆ·¹©Ó¦Á´µÄ¹¥»÷£¬£¬£¬£¬3ÔÂ·ÝÆäÈâÀàÉú²úÉÌMiratorgÔâµ½Á˹¥»÷£¬£¬£¬£¬Í×ЭµãλÓÚ¸ÃÁìÓò¹«Ë¾Ê¹ÓõĹú¼ÒÐÅϢϵͳVetIS¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ukraine-s-it-army-is-disrupting-russias-alcohol-distribution/


5¡¢ÃÀ¹úNISTÐû²¼¹ØÓÚÖÎÀí¹©Ó¦Á´Î£º¦µÄÍøÂçÇå¾²Ö¸ÄÏ


5ÔÂ5ÈÕ£¬£¬£¬£¬ÃÀ¹ú¹ú¼Ò±ê×¼ÓëÊÖÒÕÑо¿Ôº(NIST)Ðû²¼Á˹ØÓÚÖÎÀí¹©Ó¦Á´Î£º¦µÄÍøÂçÇå¾²Ö¸ÄÏ¡£¡£¡£¡£¡£¸ÃÖ¸ÄÏ×ܹ²326Ò³£¬£¬£¬£¬ÄÚÈÝ´ÓÆÀ¹ÀÍâ¹ú¶ÔÈí¼þºÍ²úÆ·¿ª·¢µÄ¿ØÖÆ£¬£¬£¬£¬µ½Ê¹ÓÃÍⲿITЧÀÍÌṩÉÌÏà¹ØµÄΣº¦£¬£¬£¬£¬ÎªÊ¶±ðºÍÓ¦¶Ô¹©Ó¦Á´µÄÍþвÌṩָµ¼¡£¡£¡£¡£¡£NISTÑо¿Ö°Ô±³Æ£¬£¬£¬£¬×éÖ¯ÐèÒª°ü¹ÜËûÃǹºÖúÍʹÓõŤ¾ßÊÇÖµµÃÐÅÈεÄ£¬£¬£¬£¬ÕâÒ»Ö¸ÄÏ¿ÉÒÔ×ÊÖúÆäÏàÊ¶Òª×¢ÖØÄÄЩΣº¦ÒÔ¼°½ÓÄÉÄÄЩÐж¯À´Ó¦¶Ô¡£¡£¡£¡£¡£ÓÉÓÚÖ¸Äϵij¤¶ÈºÍÖØ´óÐÔ£¬£¬£¬£¬NISTÍýÏëÐû²¼¿ìËÙÈëÃÅÖ¸ÄÏ£¬£¬£¬£¬ÒÔ×ÊÖú¸Õ×îÏȾÙÐй©Ó¦Á´Î£º¦ÖÎÀíµÄ×éÖ¯¡£¡£¡£¡£¡£


https://thehackernews.com/2022/05/nist-releases-updated-guidance-for.html


6¡¢TrendMicroÐû²¼¶ñÒâÈí¼þ¿ò¼ÜNetDookaµÄÆÊÎö±¨¸æ


TrendMicroÔÚ5ÔÂ5ÈÕÐû²¼Á˹ØÓÚжñÒâÈí¼þ¿ò¼ÜNetDookaµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£NetDookaͨ¹ýPrivateLoaderµÄPPI£¨°´×°Öø¶·Ñ£©Ð§ÀÍ·Ö·¢£¬£¬£¬£¬¾ßÓмÓÔØ³ÌÐò¡¢ÊͷųÌÐò¡¢±£»£»£»£»£»¤Çý¶¯³ÌÐò²¢ÒÀÀµÓÚ×Ô½çËµÍøÂçͨѶЭÒé¡£¡£¡£¡£¡£¸ÃRATͨ¹ýTCPÎüÊÕÏÂÁ£¬£¬£¬²¢¾ßÓжàÖÖ¹¦Ð§£¬£¬£¬£¬ÀýÈçÖ´ÐÐÎļþ²Ù×÷¡¢¼Í¼¼üÅÌ»÷¼ü¡¢Ö´ÐÐshellÏÂÁʹÓÃÖ÷»ú×ÊÔ´¾ÙÐÐDDoS¹¥»÷»òÖ´ÐÐÔ¶³Ì×ÀÃæ²Ù×÷µÈ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬ËäÈ»¸Ã¹¤¾ßÈÔ´¦ÓÚÔçÆÚ¿ª·¢½×¶Î£¬£¬£¬£¬µ«ËüÒѾ­ºÜÊÇǿʢ¡£¡£¡£¡£¡£


https://www.trendmicro.com/en_us/research/22/e/netdooka-framework-distributed-via-privateloader-ppi.html