¹þÈø¿Ë˹̹µÚÈý´ÎÇ¿ÖÆÔÚÆä¹«Ãñ×°±¸ÉÏ×°ÖøùÖ¤Ê飻£»£»NSAÖÒÑÔ¶íÂÞ˹ºÚ¿ÍʹÓÃеÄVMwareÎó²îÇÔÈ¡Êý¾Ý
Ðû²¼Ê±¼ä 2020-12-081.¹þÈø¿Ë˹̹µÚÈý´ÎÇ¿ÖÆÔÚÆä¹«Ãñ×°±¸ÉÏ×°ÖøùÖ¤Êé

¹þÈø¿Ë˹̹Õþ¸®ÒÔÍøÂçÇå¾²ÑÝϰΪ»Ï×Ó£¬£¬£¬£¬£¬Ç¿ÆÈÊ×¶¼Å¬¶ûËÕµ¤µÄ¹«ÃñÔÚÆä×°±¸ÉÏ×°ÖÃÊý×ÖÖ¤Êé¡£¡£¡£¡£¡£¡£ÈôÊDz»×°ÖÃÕþ¸®µÄ¸ùÖ¤Ê飬£¬£¬£¬£¬¹«Ãñ½«ÎÞ·¨»á¼ûGoogle¡¢Twitter¡¢YouTube¡¢Facebook¡¢InstagramºÍNetflixµÈÍøÕ¾¡£¡£¡£¡£¡£¡£Ò»µ©×°Ö㬣¬£¬£¬£¬¸ÃÖ¤Ê齫ÔÊÐíÕþ¸®Í¨¹ýÒ»ÖÖ³ÆÎªMitM£¨ÖÐÐÄÈË£©µÄÊÖÒÕÀ´×èµ²Óû§×°±¸·¢³öµÄËùÓÐHTTPSÁ÷Á¿¡£¡£¡£¡£¡£¡£ÕâÊǹþÈø¿Ë˹̹Õþ¸®×Ô2015ÄêÒÔÀ´µÚÈý´ÎÇ¿ÖÆÔÚÆä¹«Ãñ×°±¸ÉÏ×°ÖøùÖ¤Êé¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/kazakhstan-government-is-intercepting-https-traffic-in-its-capital/
2.Ñо¿Ö°Ô±·¢Ã÷¿ÉÓÃÌî³äÊÖÒÕÈÆ¹ýCloudflare WAF

Çå¾²¹«Ë¾SwascanµÄÑо¿Ö°Ô±·¢Ã÷¿ÉÓÃÌî³äÊÖÒÕÈÆ¹ýCloudflare WAF¡£¡£¡£¡£¡£¡£Ä¬ÈÏÉèÖÃϵÄCloudflare£¬£¬£¬£¬£¬ ÔÚ±íµ¥Êý¾ÝPOSTÇëÇó֮ǰÌí¼ÓÔ¼128KBµÄÌî³ä½«µ¼ÖÂWAF½«Æä½Ø¶ÏΪ×î´ó£¬£¬£¬£¬£¬Ìø¹ý¶àÓàµÄ²¿·Ö²¢½«Æä·¢Ë͸øÄ¿µÄÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¡£Õ⽫ÔÊÐíºÚ¿ÍÈÆ¹ýWAF²¢Ê¹ÓÃÆäËûÓ¦ÓóÌÐòÎó²î£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚÉøÍ¸²âÊÔÖз¢Ã÷¿ÉʹÓøÃÎó²îÔÚÄ¿µÄϵͳÉÏʵÏÖÔ¶³Ì´úÂëÖ´Ðлá¼û¡£¡£¡£¡£¡£¡£Cloudflare²úƷ˾ÀíMichael Tremante½¨ÒéÆôÓÃrule 100048À´±ÜÃâÌî³ä¹¥»÷¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://latesthackingnews.com/2020/12/06/cloudflare-waf-bypass-via-padding-technique-discovered/
3.NSAÖÒÑÔ¶íÂÞ˹ºÚ¿ÍʹÓÃеÄVMwareÎó²îÇÔÈ¡Êý¾Ý

¹ú¼ÒÇå¾²¾Ö£¨NSA£©ÖÒÑÔ£¬£¬£¬£¬£¬¶íÂÞ˹ºÚ¿ÍÕýÔÚʹÓÃеÄVMwareÎó²î£¨CVE-2020-4006£©ÔÚÒ×Êܹ¥»÷µÄЧÀÍÆ÷Éϰ²ÅÅWeb Shell£¬£¬£¬£¬£¬ÒÔÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¸ÃÎó²îΪÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬£¬ÒÑÓÚ12ÔÂ3ÈÕ±»ÐÞ¸´¡£¡£¡£¡£¡£¡£NSA·¢Ã÷Ôڴ˴ι¥»÷»î¶¯ÖУ¬£¬£¬£¬£¬ºÚ¿ÍÊ×ÏÈÅþÁ¬µ½VMware²úƷ̻¶µÄwebÖÎÀí½çÃæ£¬£¬£¬£¬£¬Í¨¹ýÏÂÁî×¢ÈëÀ´ÈëÇÖ×éÖ¯ÍøÂç²¢×°ÖÃweb shell¡£¡£¡£¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃSAMLƾ֤ÇÔÈ¡Ãô¸ÐÊý¾Ý£¬£¬£¬£¬£¬ÒÔ»ñµÃ¶ÔADFSЧÀÍÆ÷µÄ»á¼ûȨ£¬£¬£¬£¬£¬²¢ÔÚ±»¹¥»÷µÄ×°±¸ÉÏÖ´ÐÐLinuxÏÂÁ£¬£¬£¬£¬ÒÔ»ñµÃ³¤ÆÚÐÔ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/nsa-russian-state-hackers-exploit-new-vmware-vulnerability-to-steal-data/
4.McAfeeÐû²¼ÍøÂç·¸·¨µÄÒþÐÔ±¾Ç®µÄÆÊÎö±¨¸æ

McAfeeÐû²¼ÁËÓйØÍøÂç·¸·¨µÄÒþÐÔ±¾Ç®µÄÆÊÎö±¨¸æ£¬£¬£¬£¬£¬ÖصãÑо¿ÍøÂç·¸·¨ÔÚÈ«Çò¹æÄ£ÄÚÔì³ÉµÄÖØ´ó²ÆÎñÓ°ÏìºÍδչÏÖµÄÓ°Ïì¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬ÍøÂç·¸·¨¸øÌìϾ¼ÃÔì³ÉµÄËðʧÁè¼Ý1ÍòÒÚÃÀÔª£¬£¬£¬£¬£¬Õ¼È«ÇòGDPµÄ1£¥ÒÔÉÏ£¬£¬£¬£¬£¬±È2018Äê½ü6000ÒÚÃÀÔªµÄËðʧÔöÌíÁË50£¥¡£¡£¡£¡£¡£¡£¸ÃÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬ÓÐ92£¥µÄÆóÒµÒÔΪ£¬£¬£¬£¬£¬³ýÁ˲ÆÎñ±¾Ç®ºÍÍøÂçÊÂÎñºóµÄÊÂÇéʱ¼äËðʧ֮Í⣬£¬£¬£¬£¬ÉÐÓÐÆäËû¸ºÃæÓ°Ï죬£¬£¬£¬£¬Èçϵͳͣ»£»£»ú¡¢Ð§ÂʽµµÍ¡¢Í»·¢ÊÂÎñÏìÓ¦±¾Ç®ÒÔ¼°Æ·ÅƺÍÉùÓþÊÜË𡣡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.mcafee.com/enterprise/en-us/assets/reports/rp-hidden-costs-of-cybercrime.pdf
5.Ç÷ÊÆ¿Æ¼¼Ðû²¼2020ÄêÍøÂçΣº¦Ö¸ÊýµÄÆÊÎö±¨¸æ

Ç÷ÊÆ¿Æ¼¼Ðû²¼ÁË2020ÄêÓйØÍøÂçΣº¦Ö¸ÊýµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬ÔÚÒÑÍùÒ»Ä꣬£¬£¬£¬£¬È«Çò23£¥µÄ×éÖ¯Ôâµ½Æß´Î»ò¸ü¶àµÄ¹¥»÷¡£¡£¡£¡£¡£¡£Êý¾ÝÏÔʾ£¬£¬£¬£¬£¬È«Çò×î´óµÄÍøÂçÍþвΣº¦ÊÇÍøÂç´¹ÂÚºÍÉç»á¹¤³Ì¡¢µã»÷Ð®ÖÆ£¨Clickjacking£©¡¢ÀÕË÷Èí¼þ¡¢ÎÞÎļþ¹¥»÷¡¢½©Ê¬ÍøÂçºÍÖÐÐÄÈ˹¥»÷£¬£¬£¬£¬£¬×éÖ¯µÄÖ÷Òª¹Ø×¢µãÊǿͻ§Êý¾Ýɥʧ¡¢»ñȡ֪ʶ²úȨºÍ²ÆÎñÐÅÏ¢¡¢¿Í»§Á÷ʧºÍ×°±¸Ê§Ôô»òË𻵣¬£¬£¬£¬£¬IT»ù´¡¼Ü¹¹ÖеÄÖ÷ҪΣº¦Îª×é֯ʧе÷ÖØ´óÐÔ¡¢ÄÚ²¿ÈËÊèºö´óÒâ¡¢ÔÆÅÌËã»ù´¡¼Ü¹¹ºÍÌṩÉÌ¡¢È˲ÅǷȱºÍ¶ñÒâÄÚ²¿Ö°Ô±¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://newsroom.trendmicro.com/2020-12-02-A-Quarter-of-Global-Organizations-Were-Hit-by-Seven-or-More-Cyber-Attacks-in-The-Last-Year
6.°ÍÎ÷EmbraerѬȾRansomExx£¬£¬£¬£¬£¬ÉñÃØÊý¾Ýй¶

°ÍÎ÷EmbraerѬȾÀÕË÷Èí¼þRansomExx£¬£¬£¬£¬£¬ÉñÃØÊý¾Ýй¶¡£¡£¡£¡£¡£¡£EmbraerÊǽö´ÎÓÚ²¨ÒôºÍ¿ÕÖпͳµ¹«Ë¾µÄµÚÈý´ó·É»úÖÆÔìÉÌ£¬£¬£¬£¬£¬ÓÉÓھܾøÖ§¸¶Êê½ð£¬£¬£¬£¬£¬ºÚ¿ÍÒÑй¶Æä²¿·ÖÉñÃØÊý¾Ý¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý°üÀ¨Ô±¹¤ÏêϸÐÅÏ¢µÄÑù±¾¡¢ÉÌÒµÌõÔ¼¡¢º½ÐÐÄ£ÄâÕÕÆ¬ºÍÔ´´úÂëµÈ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚ֮ǰÌåÏÖ£¬£¬£¬£¬£¬¹¥»÷ÕßÖ»ÄܽøÈëÆä²¿·Öϵͳ£¬£¬£¬£¬£¬²¢½ö¶ÔÆäijЩÐж¯Ôì³ÉÔÝʱµÄÓ°Ïì¡£¡£¡£¡£¡£¡£µ«ÔÚ´ËÊý¾Ýй¶ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬¸Ã¹«Ë¾²¢Î´»Ø¸´ÖÃÆÀÇëÇ󡣡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/hackers-leak-data-from-embraer-worlds-third-largest-airplane-maker


¾©¹«Íø°²±¸11010802024551ºÅ