΢ÈíÐû²¼6Ô·ݵÄÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´78¸öÎó²î
Ðû²¼Ê±¼ä 2023-06-141¡¢Î¢ÈíÐû²¼6Ô·ݵÄÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´78¸öÎó²î
¾Ý6ÔÂ13ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÐû²¼ÁË2023Äê6ÔµÄÖܶþ²¹¶¡£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁË78¸öÎó²î£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨38¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²îΪWindows Pragmatic General Multicast(PGM)ÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2023-29363¡¢CVE-2023-32014ºÍCVE-2023-32015£©ÒÔ¼°Microsoft SharePoint ServerÖеÄȨÏÞÌáÉýÎó²î£¨CVE-2023-29357£©µÈ¡£¡£¡£¡£¡£¡£¡£´Ë´Î¸üв»°üÀ¨ÁãÈÕÎó²î»òÒѱ»Ê¹ÓõÄÎó²î¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-june-2023-patch-tuesday-fixes-78-flaws-38-rce-bugs/
2¡¢ÈðÊ¿Áª°îÖÎÀí¾ÖÔâµ½DDoS¹¥»÷¶à¸öÍøÕ¾ºÍÓ¦Óò»¿ÉÓÃ
ÈðÊ¿Áª°îÖÎÀí¾ÖÔÚ6ÔÂ12ÈÕ͸¶£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚϵͳÔâµ½DDoS¹¥»÷£¬£¬£¬£¬£¬£¬£¬Æä¶à¸öÍøÕ¾¼°ÔÚÏßЧÀͲ»¿É»á¼û¡£¡£¡£¡£¡£¡£¡£Óë¶íÂÞ˹Ïà¹ØµÄºÚ¿ÍÍÅ»ïNoNameÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬£¬Ëü×Ô2022ÄêÍ·ÒÔÀ´Ò»Ö±Õë¶ÔÅ·ÖÞ¡¢ÎÚ¿ËÀ¼ºÍ±±ÃÀµÄ¹ú¼ÒºÍ×éÖ¯£¬£¬£¬£¬£¬£¬£¬ÔÚÉÏÖÜ»¹¹¥»÷ÁËparlament.ch¡£¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹³Æ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ºÜ¿ì¾Í×¢ÖØµ½Á˴˴ι¥»÷£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ½ÓÄɲ½·¥¾¡¿ì»Ö¸´ÍøÕ¾ºÍÓ¦ÓõĿÉÓÃÐÔ¡£¡£¡£¡£¡£¡£¡£6ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬£¬ÀÕË÷ÍÅ»ïPlayÔø¹ûÕæÁË´ÓÈðÊ¿¾üÕþ×éÖ¯µÄÊÖÒÕÌṩÉÌXplainÇÔÈ¡µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£
https://www.admin.ch/gov/en/start/documentation/media-releases.msg-id-95641.html
3¡¢HIBPÅû¶ӰÏìÔ¼890ÍòÓû§µÄZacksÊý¾Ýй¶ÊÂÎñ
¾ÝýÌå6ÔÂ12ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬Êý¾Ýй¶֪ͨЧÀÍHave I Been Pwned(HIBP)Åû¶ÁËÒ»Æð½ÏÔçµÄZacksÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£HIBPÊÕµ½ÁËÒ»¸ö°üÀ¨8929503ÌõÓû§¼Í¼µÄÊý¾Ý¿â£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÐÕÃû¡¢ÓʼþµØµã¡¢Óû§ÃûºÍSHA256ÃÜÂëµÈÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬Êý¾Ý¿âÖÐ×îмͼµÄÈÕÆÚΪ2020Äê5Ô¡£¡£¡£¡£¡£¡£¡£¸ÃЧÀÍ֪ͨÁËZecks£¬£¬£¬£¬£¬£¬£¬ºóÕ߳ƹ¥»÷ÕßÖ»ÄÜ»á¼û¼ÓÃܵÄÃÜÂëÀ´µ»¯´Ë´ÎÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£ÔÚHIBPÅû¶¸ÃÊÂÎñºó²»¾Ã£¬£¬£¬£¬£¬£¬£¬ZacksÊý¾Ý¿âÓÚ6ÔÂ10ÈÕ±»Ðû²¼ÔÚºÚ¿ÍÂÛ̳ExposedÉÏ¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/have-i-been-pwned-warns-of-new-zacks-data-breach-impacting-8-million/
4¡¢Ó¢¹úͨѶî¿Ïµ»ú¹¹OfcomÔâµ½¹¥»÷²¿·ÖÉñÃØÐÅϢй¶
ýÌå6ÔÂ12Èճƣ¬£¬£¬£¬£¬£¬£¬Ó¢¹úͨѶî¿Ïµ»ú¹¹OfcomÔâµ½ÁËÁËÀÕË÷ÍÅ»ïClopµÄ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÁËMOVEitÎļþ´«ÊäÖеÄÎó²î(CVE-2023-34362)À´»á¼û¸Ã»ú¹¹µÄ»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£¡£½²»°ÈË͸¶£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õ߿ɻá¼ûî¿Ïµ»ú¹¹³ÖÓÐµÄÆäî¿ÏµµÄ¹«Ë¾µÄÉñÃØÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°²¿·ÖOfcomÔ±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ClopÓÚÉÏÖÜÈýÐû²¼ÁËÒ»·ÝÀÕË÷˵Ã÷£¬£¬£¬£¬£¬£¬£¬Éù³ÆÕÆÎÕÁËÊý°Ù¼ÒÆóÒµµÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¢ÒªÇóÕâЩ×éÖ¯×Ô¶¯ÁªÏµÆäÀ´ÐÉÌÊê½ð£¬£¬£¬£¬£¬£¬£¬²»È»ÕâЩ×éÖ¯½«ÓÚ6ÔÂ14ÈÕ±»Áгö¡£¡£¡£¡£¡£¡£¡£
https://therecord.media/ofcom-cyberattack-uk-regulator-moveit-vulnerability
5¡¢KasperskyÐû²¼¶à½×¶Î¼ÓÔØ³ÌÐòDoubleFingerµÄ±¨¸æ
6ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬£¬KasperskyÐû²¼Á˹ØÓÚʹÓÃÐÂÐͶà½×¶Î¼ÓÔØ³ÌÐòDoubleFinger¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚespexe.exeµÄÐ޸İ汾£¬£¬£¬£¬£¬£¬£¬¿É´ÓͼÏñÍйÜЧÀÍImgur¼ìË÷αװ³ÉPNGµÄ¼ÓÃܵÄpayload¡£¡£¡£¡£¡£¡£¡£¸Ãpayload»á´¥·¢Ò»¸ö°üÀ¨Ëĸö½×¶ÎµÄ¹¥»÷Á´£¬£¬£¬£¬£¬£¬£¬×îÖÕ»áÔÚÄ¿µÄÖ÷»úÉÏÖ´ÐÐGreetingGhoul¡£¡£¡£¡£¡£¡£¡£GreetingGhoulÊÇÒ»¸öÇÔÈ¡³ÌÐò£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡Óë¼ÓÃÜÇ®±ÒÏà¹ØµÄƾ֤¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯Ö÷ÒªÕë¶ÔÅ·ÖÞ¡¢ÃÀ¹úºÍÀ¶¡ÃÀÖÞ¡£¡£¡£¡£¡£¡£¡£
https://securelist.com/doublefinger-loader-delivering-greetingghoul-cryptocurrency-stealer/109982/
6¡¢Åµ»ùÑÇÐû²¼¹ØÓÚ2023ÄêÈ«ÇòÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ
6ÔÂ9ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬Åµ»ùÑÇÐû²¼Á˹ØÓÚ2023ÄêÈ«ÇòÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¸Ã±¨¸æÉîÈëÆÊÎöÁË4GºÍ5GÇå¾²¹¥»÷¡¢¶ñÒâÈí¼þ¹¥»÷¡¢DDoS¹¥»÷ÒÔ¼°Õë¶ÔÈ«ÇòÀο¿ºÍÒÆ¶¯ÍøÂçµÄÆäËüÐÎʽµçÐÅÍøÂç¹¥»÷µÄÇ÷ÊÆ¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬»ùÓÚ½©Ê¬ÍøÂçµÄDDoS¹¥»÷Éý¼¶£¬£¬£¬£¬£¬£¬£¬Ê¹Óõı»Ñ¬È¾ÎïÁªÍø×°±¸ÊýÄ¿´Ó200000¼¤ÔöÖÁÔ¼100Íò£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÕ¼ËùÓÐDDoSÁ÷Á¿µÄ40%ÒÔÉÏ¡£¡£¡£¡£¡£¡£¡£ÒÔÒÆ¶¯Éè±¹ØÁ¬ÄÒøÐÐÐÅϢΪĿµÄµÄľÂíÊýÄ¿·ÁËÒ»·¬£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÕ¼ËùÓÐѬȾµÄ9%¡£¡£¡£¡£¡£¡£¡£¼ÒÍ¥ÍøÂçÖеĶñÒâÈí¼þѬȾÓÐËùϽµ£¬£¬£¬£¬£¬£¬£¬´ÓCovid-19ʱ´úµÄ3%Ͻµµ½1.5%¡£¡£¡£¡£¡£¡£¡£
https://www.nokia.com/networks/security-portfolio/threat-intelligence-report/


¾©¹«Íø°²±¸11010802024551ºÅ