ºÚ¿ÍʹÓÃGoogleÔÆ´¹ÂÚ¹¥»÷ÇÔÈ¡Office 365ƾ֤£»£»£»£»£»£»£»£»ºÚ¿ÍÈëÇÖTwilioÔÆ´æ´¢ÏµÍ³²¢ÐÞ¸ÄJavaScript SDK¸±±¾
Ðû²¼Ê±¼ä 2020-07-231.ºÚ¿ÍʹÓÃGoogleÔÆÌᳫ´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡Office 365ƾ֤
Check PointÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃGoogleÔÆÌᳫ´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡Office 365ƾ֤¡£¡£¡£¡£¡£¡£¡£ËûÃÇʹÓÃGoogleÔÆÓ²ÅÌÍйܶñÒâPDFÎĵµ£¬£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃGoogleµÄstorage.googleapis[.]comÍйÜÍøÂç´¹ÂÚÒ³Ãæ¡£¡£¡£¡£¡£¡£¡£Check Point·¢Ã÷¶ñÒâPDF¿´ÆðÀ´ÏñÒ»¸ö¿ÉÒÔͨ¹ý»ùÓÚwebµÄÐ×÷ƽ̨»á¼ûSharePointÌṩÄÚÈݵÄÃÅ»§£¬£¬£¬£¬£¬£¬£¬£¬Ò»µ©Óû§µã»÷Access DocumentÁ´½Ó£¬£¬£¬£¬£¬£¬£¬£¬ÍøÂç´¹ÂÚÒ³Ãæ¾Í»áÒªÇóÌá½»Office 365ƾ֤»ò×éÖ¯IDµÇ¼µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚÒ³ÃæÊÇ´ÓÕýµ±ÈªÔ´¼ÓÔØµÄ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÔÚÁ÷³Ì¿¢ÊÂʱ¸Ã´¹ÂÚÍøÕ¾Ò²»á½»¸¶Õý°æPDFÎĵµ£¬£¬£¬£¬£¬£¬£¬£¬Òò´ËÊܺ¦ÕߺÜÄÑ·¢Ã÷¸ÃȦÌס£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/phishing-campaign-uses-google-cloud-services-to-steal-office-365-logins/
2.ºÚ¿ÍÈëÇÖTwilioÔÆ´æ´¢ÏµÍ³²¢ÐÞ¸ÄJavaScript SDK¸±±¾
Twilio֤ʵ£¬£¬£¬£¬£¬£¬£¬£¬ÓкڿÍÈëÇÖÁËÆäÔÆ´æ´¢ÏµÍ³£¬£¬£¬£¬£¬£¬£¬£¬²¢ÐÞ¸ÄÁËÆä¿Í»§Ê¹ÓõÄJavaScript SDKµÄ¸±±¾¡£¡£¡£¡£¡£¡£¡£TwilioÚ¹ÊÍ£¬£¬£¬£¬£¬£¬£¬£¬ÓÐÈ˽øÈëÁËTwilioµÄAmazon Web Services S3´æ´¢Í°£¬£¬£¬£¬£¬£¬£¬£¬²¢¸Ä¶¯ÁËTaskRouter v1.20 SDK£¬£¬£¬£¬£¬£¬£¬£¬ÔÚÆäÖмÓÈëÁËÒ»¶Î·Ç¶ñÒâ´úÂ룬£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚ×·×ÙÊÇ·ñÐÞ¸ÄÀֳɡ£¡£¡£¡£¡£¡£¡£ÏêϸÀ´Ëµ£¬£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í½«´úÂëÌí¼Óµ½TaskRouter.js v1.20 SDKµÄĩ⣬£¬£¬£¬£¬£¬£¬£¬¸ÃSDKÏòhxxps://gold.platinumus.top/track/awswrite?q=dmn·¢³öHTTP GETÇëÇ󣬣¬£¬£¬£¬£¬£¬£¬²¢×ñÕÕ¸ÃÇëÇóÔÚHTMLÖзµ»ØµÄURL¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾½²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬ËûÃÇÔÚ·¢Ã÷¸ÃÊÂÎñºó¾ÍÁ¬Ã¦¹Ø±ÕÁËÉèÖùýʧµÄS3´æ´¢Í°£¬£¬£¬£¬£¬£¬£¬£¬²¢ÉóºËÁËËùÓÐS3´æ´¢Í°¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.theregister.com/2020/07/21/twilio_sdk_code_injection/
3.Èí¼þ¹«Ë¾MacKievÔÆÐ§ÀÍÆ÷ÉèÖùýʧй¶25GBÓû§Êý¾Ý
ÍøÂçÇå¾²¹«Ë¾WizCaseµÄÑо¿Ö°Ô±·¢Ã÷Èí¼þ¹«Ë¾MacKievÔÆÐ§ÀÍÆ÷ÉèÖùýʧ£¬£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶25GBÓû§Êý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÖÎÀí×ÅÖøÃûµÄÈí¼þFamily Tree Maker£¨Ò²³ÆÎªFTM£©¡£¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý¿â°üÀ¨Ô¼Äª25GBµÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿â»¹»áÓëAncestry.comµÄÓû§Êý¾Ý¾ÙÐÐͬ²½¡£¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý°üÀ¨IPµØµã¡¢Ê±¼ä´Á¼Ç¡¢µç×ÓÓʼþµØµã¡¢Í˿Óû§Ö§³ÖÐÅÏ¢¡¢ÄÚ²¿ÏµÍ³Óû§±êʶ¡¢¶©ÔÄÀàÐͺÍ״̬¡¢ÊÖÒÕÊý¾Ý£¨ÀýÈç¹ýʧÈÕÖ¾£©¡¢Óû§Î»ÖÃÊý¾Ý£¨°üÀ¨µØÀíλÖÃ×ø±êºÍ¶¼»á£©¡£¡£¡£¡£¡£¡£¡£¾ÝÑо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã×ß©ÊÂÎñ¿ÉÄÜ»áÓ°ÏìԼĪ60000ÃûMacKievÓû§¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/software-firm-leaks-ancestry-com-user-data/
4.ºÚ¿Í¹¥»÷Dunzo²¢ÔÚShinyHunter¹ûÕæ11.2GB͵ȡµÄÊý¾Ý
¹È¸èÔÞÖúµÄÍâÂôЧÀ͹«Ë¾DunzoÌåÏÖÆäÔâµ½Á˹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬²¢Ð¹Â¶ÁËÒ»¸ö°üÀ¨¿Í»§¼Í¼µÄÊý¾Ý¿â¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚDunzoûÓÐ͸¶ÊÜÓ°ÏìÓû§µÄÊýÄ¿£¬£¬£¬£¬£¬£¬£¬£¬Òò´ËÉÐδȷ¶¨Ãü¾Ýй¶µÄ¹æÄ££¬£¬£¬£¬£¬£¬£¬£¬¿ÉÊÇ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÌåÏÖ²ÆÎñÊý¾ÝºÍÐÅÓÿ¨ÐÅÏ¢²¢Î´Ð¹Â¶¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬±»µÁµÄ11.2GBÊý¾Ý±»ºÚ¿Í·ÅÔÚShinyHunter£¬£¬£¬£¬£¬£¬£¬£¬×ܹ²ÓÐÁè¼Ý800ÍòÐеÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨Óû§Ãû¡¢¹ú¼Ò¡¢×°±¸¡¢È«Ãû¡¢ÉñÒþÃØÔ¿¡¢µç×ÓÓʼþµØµã¡¢ÃÜÂëÉ¢ÁС¢µç»°ºÅÂë¡¢ÁîÅÆºÅÂë¡¢¼ÓÈëÈÕÆÚºÍµÚÒ»¸ö/×îºóÒ»¸öλÖõȡ£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖËûÃǵÄÊÖÒÕÍŶÓÒѾѸËÙ½â¾öÁ˸ÃÎÊÌ⣬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËÎó²î²¢Ìí¼ÓÁËеÄÇå¾²ÐÒé²ã¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.hackread.com/google-delivery-service-dunzo-hacked-data-leaked/
5.SkyboxÐû²¼±¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬Õ¹Íû2020Ä꽫ÓÐ2Íò¶à¸öÐÂÎó²î
Skybox SecurityÐû²¼±¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬×èÖ¹2020ÄêÉϰëÄêÒѾ±¨¸æÁË9000¶à¸öÐÂÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¶øÆäÔ¤¼ÆÕûÄ꽫ÓÐ20000¶à¸öÐÂÎó²î¡£¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬£¬COVID-19¸Ä±äÁË×éÖ¯¼°ÆäÔ±¹¤µÄÊÂÇé·½·¨£¬£¬£¬£¬£¬£¬£¬£¬¼¯ÖÐÌåÏÖÎªÒÆ¶¯Îó²îÔöÌíÁË50£¥£¬£¬£¬£¬£¬£¬£¬£¬ÕâÍ»ÏÔÁ˹«Ë¾ÍøÂçÓëСÎÒ˽¼ÒÍøÂçÖ®¼ä½çÏßÄ£ºýµÄΣÏÕ£»£»£»£»£»£»£»£»ÀÕË÷Èí¼þÔÚCOVID-19´óÊ¢ÐÐʱ´ú±¬·¢£¬£¬£¬£¬£¬£¬£¬£¬ÐÂÑù±¾ÊýÄ¿ÔöÌíÁË72£¥£»£»£»£»£»£»£»£»¶ÔÒªº¦»ù´¡ÉèÊ©£¨°üÀ¨Ò½ÁƱ£½¡¹«Ë¾ºÍÑо¿ÊµÑéÊÒ£©µÄ¹¥»÷¼Ó¾ç¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.helpnetsecurity.com/2020/07/22/vulnerability-reports-2020/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+HelpNetSecurity+%28Help+Net+Security%29
6.A10 NetworksÐû²¼2020ÄêQ2 DDoS¹¥»÷Ç÷ÊÆÆÊÎö±¨¸æ
A10 NetworksÐû²¼2020ÄêQ2 DDoS¹¥»÷Ç÷ÊÆÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ÑÇÖÞÊÇDDoS½©Ê¬ÍøÂç»î¶¯µÄÖ÷ҪȪԴ£¬£¬£¬£¬£¬£¬£¬£¬Ö÷ҪʹÓÃÖÖÖÖ·Å´ó¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÔÚ2020ÄêµÚ¶þ¼¾¶È£¬£¬£¬£¬£¬£¬£¬£¬470Íò¶à¸öÀ´×ÔÃÀ¹ú¡¢Öйú¡¢º«¹ú¡¢¶íÂÞ˹ºÍÓ¡¶ÈÕâÎå¸ö¹ú¼Ò/µØÇøµÄIP±»ÓÃÓÚÌᳫÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬ÆäÖдó´ó¶¼Ê¹ÓÃÁËportmapÐÒé¾ÙÐзŴ󹥻÷¡£¡£¡£¡£¡£¡£¡£¸Ã±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬£¬ÔÚ´ó´ó¶¼ÇéÐÎÏ£¬£¬£¬£¬£¬£¬£¬£¬DDoS½©Ê¬ÍøÂç¿Í»§¶Ë£¨»òÎÞÈË»ú£©ÊÇÔÚÊÜËðµÄIoT×°±¸ÉϽ¨ÉèµÄ£¬£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚ½¨Éè´ËÀàIoT½©Ê¬ÍøÂçµÄ×î³£¼ûÎó²îÊÇÕë¶Ô̻¶telnetÅþÁ¬µÄ×°±¸ÖеÄÎó²î£¬£¬£¬£¬£¬£¬£¬£¬Netgear·ÓÉÆ÷ÖÐδÐÞ²¹µÄÎó²îÒÔ¼°Êý×ÖÊÓÆµÂ¼Ïñ»úÖеÄÇå¾²ÐÔÎÊÌâ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.darkreading.com/threat-intelligence/ddos-botnets-are-entrenched-in-asia-and-amplification-attacks-set-records/d/d-id/1338415?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple


¾©¹«Íø°²±¸11010802024551ºÅ