Cloudflare³ÆÆä¿Í»§½üÆÚÔâµ½´ó¹æÄ£µÄDDoS¹¥»÷
Ðû²¼Ê±¼ä 2022-06-161¡¢Cloudflare³ÆÆä¿Í»§½üÆÚÔâµ½´ó¹æÄ£µÄDDoS¹¥»÷»î¶¯
CloudflareÔÚ6ÔÂ14ÈÕ͸¶£¬£¬£¬£¬£¬£¬Æä¿Í»§Ôâµ½ÁË´ó¹æÄ£µÄDDoS¹¥»÷¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬£¬£¬ËüÒѽÓÄÉÐж¯µÖÓùÁËÿÃë2600Íò´ÎÇëÇó(RPS)µÄDDoS¹¥»÷£¬£¬£¬£¬£¬£¬ÕâÊÇÆù½ñΪֹ¼ì²âµ½µÄ×î´óµÄHTTPS DDoS¹¥»÷¡£¡£¡£¡£¡£¹¥»÷À´×ÔÓÉ5067̨װ±¸×é³ÉµÄ½©Ê¬ÍøÂ磬£¬£¬£¬£¬£¬Ã¿¸ö½ÚµãÔÚ·åֵʱ±¬·¢Ô¼5200 RPS¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬¸Ã½©Ê¬ÍøÂçÔÚ²»µ½30ÃëµÄʱ¼äÄÚ´ÓÓ¡¶ÈÄáÎ÷ÑÇ¡¢ÃÀ¹ú¡¢°ÍÎ÷¡¢¶íÂÞ˹ºÍÓ¡¶ÈµÈ121¸ö¹ú¼ÒµÄ1500¶à¸öÍøÂçÖн¨ÉèÁËÁè¼Ý2.12ÒÚ¸öHTTPSÇëÇ󣬣¬£¬£¬£¬£¬Ô¼3%µÄ¹¥»÷À´×ÔTor½Úµã¡£¡£¡£¡£¡£
https://thehackernews.com/2022/06/cloudflare-saw-record-breaking-ddos.html
2¡¢¹ú¼ÊÐ̾¯First Light 2022Ö´·¨Ðж¯¾Ð²¶Ô¼2000¸öÏÓÒÉÈË
ýÌå6ÔÂ15ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯ÔÚ76¸ö¹ú¼ÒºÍµØÇøµÄ¾¯·½ÐÖúÏÂÌᳫÁË´úºÅΪFirst Light 2022µÄ¹ú¼ÊÖ´·¨Ðж¯¡£¡£¡£¡£¡£ÔÚ2022Äê3ÔÂÖÁ5ÔÂʱ´ú£¬£¬£¬£¬£¬£¬Ö´·¨Ö°Ô±Í»Ï®ÁËÈ«ÇòµÄ1770¸öËùÔÚ£¬£¬£¬£¬£¬£¬ÊÓ²ìÁËÔ¼3000ÃûÏÓÒÉÈË£¬£¬£¬£¬£¬£¬¾Ð²¶ÁËÔ¼2000Ãû¼ÓÈëÉç»á¹¤³Ì¹¥»÷µÄÏÓÒÉÈË£¬£¬£¬£¬£¬£¬¶³½áÁË4000¸öÒøÐÐÕË»§²¢²é·âÁ˼ÛÖµÔ¼5000ÍòÃÀÔªµÄ²»·¨×ʽ𡣡£¡£¡£¡£´Ë´ÎÐж¯Öص㹥»÷Éæ¼°µç»°Õ©Æ¡¢ÀËÂþÕ©Æ¡¢BEC¹¥»÷ºÍ¹ØÓÚÏ´Ç®µÄÉç»á¹¤³Ì¹¥»÷¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/interpol-seizes-50-million-arrests-2000-social-engineers/
3¡¢Ñо¿ÍŶӷ¢Ã÷Õë¶ÔIntelºÍAMD CPUµÄ²àÐŵÀ¹¥»÷Hertzbleed
¾Ý6ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖ³ÆÎªHertzbleedµÄвàÐŵÀ¹¥»÷£¬£¬£¬£¬£¬£¬¿É±»Ô¶³Ì¹¥»÷ÕßÓÃÀ´Í¨¹ýÊӲ춯̬µçѹºÍƵÂÊËõ·Å(DVFS)ÆôÓõÄCPUƵÂÊת±äÇÔÈ¡¼ÓÃÜÃÜÔ¿¡£¡£¡£¡£¡£DVFSÊÇÏÖ´úCPUʹÓõÄÒ»ÖÖµçÔ´ÖÎÀí½ÚÔ¼¹¦Ð§£¬£¬£¬£¬£¬£¬¿ÉÈ·±£ÏµÍ³Ôڸ߸ºÔØÊ±´ú²»»áÁè¼ÝÈȺ͹¦ÂÊÏÞÖÆ£¬£¬£¬£¬£¬£¬²¢ÔÚµÍCPU¸ºÔØÊ±´ú½µµÍÕûÌ幦ºÄ¡£¡£¡£¡£¡£¹¥»÷ÊÇ¿ÉÐе쬣¬£¬£¬£¬£¬ÓÉÓÚÔÚIntel(CVE-2022-24436)ºÍAMD(CVE-2022-23823)x86´¦Öóͷ£Æ÷ÉÏ£¬£¬£¬£¬£¬£¬¶¯Ì¬ÆµÂÊËõ·ÅÈ¡¾öÓÚ¹¦ºÄºÍÕýÔÚ´¦Öóͷ£µÄÊý¾Ý¡£¡£¡£¡£¡£IntelºÍAMD͸¶£¬£¬£¬£¬£¬£¬²»ÍýÏëÐû²¼²¹¶¡£¡£¡£¡£¡£¬£¬£¬£¬£¬£¬µ«Ðû²¼ÁËÔõÑù»º½â´ËÀ๥»÷µÄÖ¸ÄÏ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-hertzbleed-side-channel-attack-affects-intel-amd-cpus/
4¡¢ZimbraÐÞ¸´¿ÉÇÔÈ¡Óû§µÇ¼ƾ֤µÄÎó²îCVE-2022-27924
ýÌå6ÔÂ14Èճƣ¬£¬£¬£¬£¬£¬µç×ÓÓʼþÌ×¼þZimbraÖб£´æÒ»¸öÑÏÖØµÄÎó²î£¨CVE-2022-27924£©£¬£¬£¬£¬£¬£¬Ó°ÏìÁË¿ªÔ´ºÍÉÌÒµ°æ±¾8.8.xºÍ9.x¡£¡£¡£¡£¡£SonarSource½«¸ÃÎó²î×ܽáΪδ¾Éí·ÝÑéÖ¤ÇëÇóµÄMemcachedÖж¾£¬£¬£¬£¬£¬£¬Í¨¹ý½«CRLF×¢Èëµ½Memcached²éÕÒµÄÓû§ÃûÖпÉÒÔʹÓôËÎó²î¡£¡£¡£¡£¡£ÀÖ³ÉʹÓú󣬣¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÔÚ²»ÓëÓû§¾ÙÐÐÈκν»»¥µÄÇéÐÎÏÂÇÔÈ¡Ã÷ÎĵÄÃÜÂë¡£¡£¡£¡£¡£SonarSourceÓÚ½ñÄê3ÔÂ11ÈÕÅû¶Îó²î£»£»£»£»ZimbraÔÚ3ÔÂ31ÈÕÐû²¼Á˵ÚÒ»¸ö²¹¶¡£¡£¡£¡£¡£¬£¬£¬£¬£¬£¬µ«²»¿ÉÍêÈ«½â¾öÎÊÌ⣻£»£»£»Ö®ºó£¬£¬£¬£¬£¬£¬¹©Ó¦ÉÌÓÖÔÚ5ÔÂ10ÈÕÐû²¼²¹¶¡£¡£¡£¡£¡£¬£¬£¬£¬£¬£¬ÍêÈ«ÐÞ¸´ÁËÎó²î¡£¡£¡£¡£¡£
https://thehackernews.com/2022/06/new-zimbra-email-vulnerability-could.html
5¡¢ÄÏ·ÇÁ¬Ëø³¬ÊÐShopriteÔâµ½RansomHouseµÄÀÕË÷¹¥»÷
¾ÝýÌå6ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬Shoprite Group³ÆÆäÔÚÉÏÖÜÔâµ½ÁËÍøÂç¹¥»÷¡£¡£¡£¡£¡£ÕâÊÇ·ÇÖÞ×î´óµÄÁ¬Ëø³¬ÊУ¬£¬£¬£¬£¬£¬ÊÕÈë58ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬ÔÚ·ÇÖÞµÄ12¸ö¹ú¼Òı»®×Žü3000¼ÒÃŵ꣬£¬£¬£¬£¬£¬ÓµÓÐ149000¸öÔ±¹¤¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ¿ÉÄÜй¶ÁËÆäλÓÚ˹ÍþÊ¿À¼¡¢ÄÉÃ×±ÈÑǺÍÔÞ±ÈÑǵĿͻ§µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬Éæ¼°ÐÕÃûºÍÉí·ÝÖ¤ºÅÂëµÈ¡£¡£¡£¡£¡£6ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬RansomHouseÍÅ»ïÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬²¢¹ûÕæÁËÒ»·ÝÉù³Æ´ÓShopriteÇÔÈ¡µÄ600GBÊý¾ÝµÄÑù±¾¡£¡£¡£¡£¡£
https://therecord.media/large-supermarket-chain-in-southern-africa-hit-with-ransomware/
6¡¢Check Point·¢Ã÷Õë¶ÔÒÔÉ«ÁкÍÃÀ¹úµÄÓã²æÊ½´¹ÂÚ¹¥»÷
6ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬Check PointÐû²¼ÁËÒÁÀÊPhosphorusÕë¶ÔÒÔÉ«ÁкÍÃÀ¹úµÄÓã²æÊ½´¹ÂÚ¹¥»÷µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£´Ë´Î»î¶¯¿ÉÒÔ×·Ëݵ½2021Äê12Ô£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÐ®ÖÆÁËÒÔÉ«Áи߼¶¹ÙÔ±µÄµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬È»ºóÓÃËüÀ´¹¥»÷ÆäËûÄ¿µÄ¡£¡£¡£¡£¡£´Ë´Î»î¶¯µÄÄ¿µÄ°üÀ¨£¬£¬£¬£¬£¬£¬ÒÔÉ«ÁÐǰÍâ½»²¿³¤Tzipi Livni¡¢ÃÀ¹úǰפÒÔÉ«ÁдóʹºÍÒÔÉ«Áйú·À¾üǰÉÙ½«µÈÈË¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ¸Ã»î¶¯µÄ×îÖÕÄ¿µÄÊÇÇÔȡĿµÄµÄСÎÒ˽¼ÒÐÅÏ¢¡¢»¤ÕÕɨÃè¼þºÍ»á¼ûµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬²¢½«Æä¹éÒòÓÚÒÁÀʵÄAPTÍÅ»ïPhosphorus¡£¡£¡£¡£¡£
https://blog.checkpoint.com/2022/06/14/iranian-spear-phishing-operation-targets-former-israeli-foreign-minister-former-us-ambassador-to-israel-former-israeli-army-general-and-three-other-high-profile-executives/


¾©¹«Íø°²±¸11010802024551ºÅ