²¿·ÖOutLookÕÊ»§ÐÅϢй¶ £»£»£»£»Ð¶ñÒâÈí¼þ¿É¸Ä¶¯CATºÍMRIɨÃèÒǵÄÒ½ÁÆÉ¨ÃèЧ¹û

Ðû²¼Ê±¼ä 2019-04-15
1.΢ÈíÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬ £¬²¿·ÖÓû§µÄOutLookÕÊ»§ÐÅϢй¶


ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


΢Èí֤ʵ1ÔÂ1ÈÕÖÁ3ÔÂ29ÈÕʱ´ú¹¥»÷ÕßÈëÇÖÁËÒ»¸ö¿Í»§Ö§³ÖÊðÀíÕË»§£¬£¬£¬£¬£¬ £¬²¢Ê¹ÓøÃÕË»§»á¼ûÁ˿ͻ§Ö§³ÖÃÅ»§ÍøÕ¾¼°²¿·ÖOutLookÓû§µÄÏà¹ØÐÅÏ¢¡£¡£ÕâЩÐÅÏ¢°üÀ¨µç×ÓÓʼþµØµã¡¢Îļþ¼ÐÃû³Æ¡¢ÓʼþÖ÷Ìâ¼°ÁªÏµÈ˵ç×ÓÓʼþµØµã£¬£¬£¬£¬£¬ £¬µ«²»°üÀ¨Óʼþ¼°¸½¼þµÄÄÚÈÝ¡£¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷µÄÏêϸϸ½Ú£¬£¬£¬£¬£¬ £¬µ«Î¢ÈíÌåÏÖÒѾ­½ûÓÃÁ˸ÃÊðÀíÕË»§µÄƾ֤£¬£¬£¬£¬£¬ £¬²¢Í¨ÖªËùÓÐÊÜÓ°ÏìµÄÓû§¡£¡£Î¢ÈíҲûÓÐ͸¶ÊÜÓ°ÏìµÄÓû§×ÜÊý¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/04/microsoft-outlook-email-hack.html


2.°®´ïºÉÖÝÀ¶Ê®×Ö»á¹ÙÍøÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬ £¬²¿·ÖÓû§µÄСÎÒ˽¼ÒÐÅϢй¶

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


°®´ïºÉÖÝÀ¶Ê®×Ö»áµÄµçÉÌÍøÕ¾ÓÚ3ÔÂ21ÈÕÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬ £¬¹¥»÷ÕßÊÔͼÌᳫڲƭÐÔµÄÉúÒ⣬£¬£¬£¬£¬ £¬µ«Ã»ÓÐÀֳɡ£¡£±ðµÄ£¬£¬£¬£¬£¬ £¬¹¥»÷Õß»¹»á¼ûÁ˰üÀ¨Óû§PHIÐÅÏ¢µÄ»ã¿îÎļþ£¬£¬£¬£¬£¬ £¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨Óû§µÄÐÕÃû¡¢¹ÒºÅ/¶©ÔĺÅÂ롢ЧÀÍÈÕÆÚ¡¢Ò½ÁÆÐ§ÀÍÌṩÕßµÄÃû×Ö¡¢»¼ÕßÕ˺𢏶¿îÐÅÏ¢µÈ£¬£¬£¬£¬£¬ £¬µ«²»°üÀ¨Éç»áÇå¾²ºÅÂë¡¢¼ÝÕÕID¼°ÐÅÓÿ¨ºÅÂë¡£¡£Æ¾Ö¤ÊÓ²ìЧ¹û£¬£¬£¬£¬£¬ £¬À¶Ê®×Ö»áÒÔΪ¹¥»÷Õß»á¼ûÁËÔ¼1%µÄÓû§ÐÅÏ¢¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/blue-cross-of-idaho-notice-of-privacy-breach/


3.ºÚ¿ÍÍÅ»ïÔÚÍøÉÏÐû²¼ÊýǧÃûÃÀ¹ú¾¯Ô±ºÍÁª°îÌØ¹¤µÄСÎÒ˽¼ÒÊý¾Ý

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø

¾ÝÍâýTechcrunch±¨µÀ£¬£¬£¬£¬£¬ £¬Ò»¸öºÚ¿ÍÍÅ»ïÉù³ÆÈëÇÖÁËÊýÊ®¸öFBIÁ¥ÊôÍøÕ¾£¬£¬£¬£¬£¬ £¬²¢ÇÔÈ¡ÁËÊôÓÚÃÀ¹úÁª°î»ú¹¹ºÍ¹«¹²Ð§ÀÍ×éÖ¯Ô±¹¤µÄÁè¼ÝÒ»°ÙÍòÌõÊý¾Ý¡£¡£¸ÃÍÅ»ïÔÚÍøÉÏÐû²¼ÁËÊýÊ®¸öÎļþ£¬£¬£¬£¬£¬ £¬ÆäÖаüÀ¨Ô¼4000ÃûÃÀ¹ú¾¯Ô±ºÍÁª°îÌØ¹¤µÄÏêϸСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬ £¬ÕâЩÐÅÏ¢°üÀ¨ÐÕÃû¡¢Ð¡ÎÒ˽¼ÒºÍÕþ¸®ÓÊÏ䵨µã¡¢Ö°Î»¡¢µç»°ºÅÂëºÍÓÊÕþµØµã¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/83763/data-breach/fbi-affiliated-websites-hack.html


4.ÃÀ¹ú¸ñÁÖά¶ûÊÐÔâÐÂÀÕË÷Èí¼þRobbinHood¹¥»÷£¬£¬£¬£¬£¬ £¬ÊÂÎñÈÔÔÚÊÓ²ì

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


ÐÂÀÕË÷Èí¼þRobbinHoodÕýÔÚÆð¾¢¾ÙÐй¥»÷»î¶¯£¬£¬£¬£¬£¬ £¬Ñо¿Ö°Ô±ÉÐÎ´ÍøÂçµ½RobbinHoodµÄÑù±¾£¬£¬£¬£¬£¬ £¬µ«ÒÑÓжàÃûÊܺ¦ÕßÖÐÕС£¡£RobbinHoodµÄÊê½ðÊÇÿ̨ÅÌËã»ú3±ÈÌØ±Ò»òÕû¸öÍøÂç7±ÈÌØ±Ò£¬£¬£¬£¬£¬ £¬²¢ÔÚµÚËÄÌìÖ®ºóÊê½ðÖðÈÕÔöÌí1ÍòÃÀÔª¡£¡£ÔÚRobbinHoodµÄTorÖ§¸¶Ò³ÃæÉÏ£¬£¬£¬£¬£¬ £¬¹¥»÷ÕßÇ¿µ÷ËûÃÇÊ®·ÖÌåÌùÊܺ¦ÕßµÄÒþ˽£¬£¬£¬£¬£¬ £¬²¢½«ÔÚÊܺ¦Õ߸¶¿îºóɾ³ýÏà¹Ø¼Í¼£¬£¬£¬£¬£¬ £¬°üÀ¨¼ÓÃÜÃÜÔ¿ºÍIPµØµã¡£¡£Ã½Ì屨µÀ³Æ±±¿¨ÂÞÀ´ÄÉÖݵĸñÁÖά¶ûÊÐÔâµ½RobbinHood¹¥»÷£¬£¬£¬£¬£¬ £¬Ïà¹ØÖ´·¨»ú¹¹ÕýÔÚ¾ÙÐÐÊӲ졣¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/robbinhood-ransomware-claims-its-protecting-your-privacy/


5.д¹ÂڻThe Nasty List£¬£¬£¬£¬£¬ £¬Ö÷ÒªÇÔÈ¡InstagramÓû§Æ¾Ö¤

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


еĴ¹ÂÚȦÌס°The Nasty List¡±£¨ÁîÈËÑá¶ñµÄÃûµ¥£©ÕýÔÚInstagramÉÏÈö²¥£¬£¬£¬£¬£¬ £¬Ö÷ÒªÇÔÈ¡Óû§µÄµÇ¼ƾ֤¡£¡£¸Ã´¹ÂÚÐÅÏ¢Éù³ÆÄ¿µÄÓû§»òÓû§µÄÅóÙ­´¦ÓÚÒ»¸öÁîÈËÑá¶ñµÄÃûµ¥ÉÏ£¬£¬£¬£¬£¬ £¬²¢°üÀ¨Ãûµ¥ÏêϸÐÅÏ¢µÄÁ´½Ó£¬£¬£¬£¬£¬ £¬µ«¸ÃÁ´½ÓÖ¸ÏòÒ»¸öαÔìµÄInstagramµÇÂ¼Ò³Ãæ£¬£¬£¬£¬£¬ £¬×Åʵ¼ÊÓòÃûΪnastylist-instatop50[.]me¡£¡£Ò»µ©Óû§ÊäÈëÆ¾Ö¤£¬£¬£¬£¬£¬ £¬¹¥»÷Õß½«Ê¹ÓÃËûÃǵÄÕË»§½øÒ»²½Èö²¥¸ÃȦÌס£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/the-nasty-list-phishing-scam-is-sweeping-through-instagram/


6.жñÒâÈí¼þ¿É¸Ä¶¯CATºÍMRIɨÃèÒǵÄÒ½ÁÆÉ¨ÃèЧ¹û

ÈËÉú¾ÍÊDz©-×ðÁú¿­Ê±Öйú¹ÙÍø


Ben-Gurion´óѧµÄÒ»¸öÑо¿ÍŶÓÑÝʾÁËÒ»ÖÖÄܹ»¸Ä¶¯Ò½ÁÆÉ¨ÃèЧ¹ûµÄжñÒâÈí¼þ£¬£¬£¬£¬£¬ £¬ÕâÖÖ¶ñÒâÈí¼þ¿É¸Ä¶¯É¨Ãè³öµÄÒ½ÁÆÍ¼Ïñ£¬£¬£¬£¬£¬ £¬½«Ö×ÁöÌí¼Óµ½Í¼ÏñÖлòÊÇ´ÓͼÏñÖÐÒÆ³ýÖ×Áö£¬£¬£¬£¬£¬ £¬ÒÔÎóµ¼Ò½ÉúµÄÕïÖÎЧ¹û¡£¡£Ñо¿Ö°Ô±²âÊÔÁË70ÕÅͼÏñ£¬£¬£¬£¬£¬ £¬ÀÖ³ÉÓÕÆ­ÁËÈýÃû·ÅÉä¿ÆÒ½ÉúºÍÒ½ÔºµÄ×Ô¶¯É¸Ñ¡ÏµÍ³¡£¡£Ñо¿Ö°Ô±³ÆÕâÖÖ¹¥»÷µÄÔµ¹ÊÔ­ÓÉÊÇÒ½ÁÆ×°±¸µÄÇå¾²²½·¥È±·¦£¬£¬£¬£¬£¬ £¬ÀýÈçȱÉÙ¶ÔͼÏñµÄÊðÃûºÍ¼ÓÃÜ¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.pandasecurity.com/mediacenter/news/new-malware-healthcare-sector/