ÎÚ¿ËÀ¼µÄ¶à¸ö¹Ù·½×éÖ¯ÔÙÒ»´ÎÔâµ½´ó¹æÄ£DDoS¹¥»÷
Ðû²¼Ê±¼ä 2022-02-25ÎÚ¿ËÀ¼µÄ¶à¸ö¹Ù·½×éÖ¯ÔÙÒ»´ÎÔâµ½´ó¹æÄ£DDoS¹¥»÷
¾ÝýÌå2ÔÂ23Èճƣ¬£¬£¬£¬£¬ÎÚ¿ËÀ¼µÄ¶à¸ö¹Ù·½×éÖ¯ÔÙ´ÎÔâµ½´ó¹æÄ£DDoS¹¥»÷¡£¡£¡£¡£´Ë´ÎÊܵ½¹¥»÷µÄ×éÖ¯°üÀ¨ÎÚ¿ËÀ¼Íâ½»²¿¡¢¹ú·À²¿¡¢ÄÚÕþ²¿¡¢Çå¾²¾ÖºÍÄڸ󣬣¬£¬£¬£¬ÒÔ¼°ÎÚ¿ËÀ¼×î´óµÄÒøÐÐPrivatbankºÍ¹ú¼Ò´¢±¸ÒøÐÐOschadbank¡£¡£¡£¡£ÎÚ¿ËÀ¼SSSCIPÌåÏÖ£¬£¬£¬£¬£¬¹¥»÷»î¶¯µ¼Ö²¿·Öϵͳ²»¿ÉÓûòÖ»Äܶ϶ÏÐøÐøµØÊÂÇ飬£¬£¬£¬£¬ËûÃÇÕýÔÚÆð¾¢Ó¦¶Ô¹¥»÷²¢ÍøÂçÆÊÎöÐÅÏ¢¡£¡£¡£¡£ÉÏÖÜ£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼µÄ¶à¸öÕþ¸®»ú¹¹ºÍÒøÐÐÔøÔâµ½DDoS¹¥»÷¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ukrainian-government-and-banks-once-again-hit-by-ddos-attacks/
DevOpsÔÚ¹Ù·½NPM¿âÖз¢Ã÷25¸ö¶ñÒâµÄJavaScript¿â
¾ÝýÌå2ÔÂ22ÈÕ±¨µÀ£¬£¬£¬£¬£¬Çå¾²¹«Ë¾DevOpsÔÚ¹Ù·½NPM¿âÖз¢Ã÷ÁË25¸ö¶ñÒâµÄJavaScript¿â¡£¡£¡£¡£ÕâЩ¶ñÒâµÄ¿âαװ³ÉÕýµ±Èí¼þ°ü£¬£¬£¬£¬£¬ÀýÈçcolors.js¡¢crypto-js¡¢discord.js¡¢marked ºÍnoblox.jsµÈ£¬£¬£¬£¬£¬Ä¿µÄÊÇ´ÓÄ¿µÄϵͳÖÐÇÔÈ¡DiscordÁîÅÆºÍÇéÐαäÁ¿¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ÕâЩJavaScript¿âÒѱ»É¾³ý¡£¡£¡£¡£ÔçÔÚ2021Äê12Ô·ݣ¬£¬£¬£¬£¬Ñо¿Ö°Ô±¾ÍÔÚNPM¿âÖз¢Ã÷²¢É¾³ýÁË17¸öÀàËÆµÄ¶ñÒâ°ü¡£¡£¡£¡£
https://thehackernews.com/2022/02/25-malicious-javascript-libraries.html
ÔÚÏßÉ̳ÇMelijoeµÄS3´æ´¢Í°ÉèÖùýʧй¶200GBÊý¾Ý
SafetyDetectivesÔÚ2ÔÂ21ÈÕ͸¶£¬£¬£¬£¬£¬¶ùͯ´ò°çÔÚÏßÉ̳ÇMelijoeµÄS3´æ´¢Í°ÉèÖùýʧ¡£¡£¡£¡£´Ë´Îй¶Á˶à´ï200 GBµÄ½ü200Íò¸öÎļþ£¬£¬£¬£¬£¬Éæ¼°Ô¼20Íò¸öÓû§¡£¡£¡£¡£Ñо¿Ö°Ô±×ܹ²·¢Ã÷ÁË3¸öÊý¾Ý¼¯£¬£¬£¬£¬£¬¹ØÓÚ¿Í»§µÄ¹ºÖÃÐÅÏ¢¡¢Æ«ºÃºÍÔ¸ÍûÇåµ¥£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢ÓʼþµØµã¡¢Ö§¸¶·½·¨ºÍËÍ»õÐÅÏ¢µÈ¡£¡£¡£¡£¸Ã´æ´¢¿âÓÚ2021Äê11ÔÂ12ÈÕ±»·¢Ã÷£¬£¬£¬£¬£¬Ö±µ½2022Äê2ÔÂ18ÈղŻñµÃ±£»£»£»£»£»£»£»£»¤¡£¡£¡£¡£
https://www.hackread.com/kids-luxury-clothing-store-melijoe-data-exposed/
SonarSource·¢Ã÷Horde WebmailÖб£´æ9ÄêµÄXSSÎó²î
SonarSourceÔÚ2ÔÂ22ÈÕÅû¶ÁËHorde WebmailÖÐ×Ô2012Äêµ×Ò»Ö±±£´æµÄXSSÎó²îµÄϸ½Ú¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý¶ñÒâOpenOfficeÎĵµÊ¹ÓøÃÎó²î£¬£¬£¬£¬£¬µ±Horde½«Æäת»»ÎªXHTMLÔ¤ÀÀʱ£¬£¬£¬£¬£¬¾Í»áÖ´ÐиÃÎĵµÖеĶñÒâJavaScript£¬£¬£¬£¬£¬´Ó¶øµ¼Ö´洢ÐÍXSS¹¥»÷¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÓÃÀ´Ð®ÖÆÓû§µÄÓʼþÕÊ»§£¬£¬£¬£¬£¬ÉõÖÁÊÇ¿ØÖÆÕû¸öÓʼþЧÀÍÆ÷¡£¡£¡£¡£×îºó£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹ÌṩÁËÓйØÔõÑù»º½â´ËÎó²îµÄ½¨Òé¡£¡£¡£¡£
https://therecord.media/unpatched-bug-allows-takeover-of-horde-webmail-accounts-servers/
ÎÚ¿ËÀ¼¾¯·½µ·»ÙÒ»¸öÍøÂç´¹ÂÚÍŻﲢ¾Ð²¶5Ãû³ÉÔ±
¾Ý2ÔÂ22ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÎÚ¿ËÀ¼¾¯·½ÆÆ»ñÁËÒ»¸öÍøÂç´¹ÂÚÍŻﲢ¾Ð²¶ÁËÆä5Ãû³ÉÔ±¡£¡£¡£¡£¸ÃÍÅ»ïÓµÓÐ40¶à¸ö´¹ÂÚÍøÕ¾£¬£¬£¬£¬£¬¹¥»÷ÁËÖÁÉÙ70000¶à¸öÄ¿µÄ²¢ÀÖ³ÉÇÔÈ¡ÁËËûÃǵÄÖ§¸¶¿¨ÐÅÏ¢¡£¡£¡£¡£¾¯·½Ô¤¼Æ¸ÃÍÅ»ï×ܹ²Ôì³É500Íò¸ñÀï·òÄÉ£¨175000ÃÀÔª£©µÄ¾¼ÃËðʧ£¬£¬£¬£¬£¬ÏÖÔÚûÊÕÁËÆä200Íò¸ñÀï·òÄÉ¡£¡£¡£¡£±»¾Ð²¶µÄÏÓÒÉÈËÃæÁÙÎÚ¿ËÀ¼¡¶ÐÌ·¨¡·µÚ361ÌõµÚ2²¿·ÖºÍµÚ190ÌõµÚ3²¿·ÖµÄÐÌÊÂÖ¸¿Ø£¬£¬£¬£¬£¬×î¸ß¿ÉÅд¦8Äêî¿Ïµ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/police-bust-phishing-group-that-used-40-sites-to-steal-credit-cards/
ProofpointÐû²¼2021ÄêÍøÂç´¹ÂÚÌ¬ÊÆµÄÆÊÎö±¨¸æ
2ÔÂ22ÈÕ£¬£¬£¬£¬£¬ProofpointÐû²¼ÁË2021ÄêÍøÂç´¹ÂÚÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬È¥ÄêÁè¼Ý91%µÄÓ¢¹ú×éÖ¯±»´¹ÂÚ¹¥»÷ÈëÇÖ£¬£¬£¬£¬£¬78%µÄ×éÖ¯³ÉΪ»ùÓÚÓʼþµÄÀÕË÷¹¥»÷µÄÄ¿µÄ£¬£¬£¬£¬£¬77%µÄ×éÖ¯Ôâµ½BEC¹¥»÷£¨Í¬±ÈÔöÌí18%£©¡£¡£¡£¡£Ñ¬È¾ÀÕË÷Èí¼þµÄ×éÖ¯ÖУ¬£¬£¬£¬£¬60%Ö§¸¶ÁËÊê½ð£¬£¬£¬£¬£¬32%»¹ÌØÊâÖ§¸¶ÁË×ʽðÒÔÖØ»ñ¶ÔÊý¾ÝºÍϵͳµÄ»á¼ûȨÏÞ¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬£¬¹¥»÷µÄÊýÄ¿ºÍÀÖ³ÉÂʵÄÔöÌíÓëתÏò»ìÏýÊÂÇéģʽÓйأ¬£¬£¬£¬£¬È¥ÄêÓдó×ÚÔ±¹¤¾ÙÐÐÔ¶³Ì°ì¹«£¬£¬£¬£¬£¬µ«Ö»ÓÐÉÙÊý×éÖ¯¶ÔÔ±¹¤¾ÙÐÐÔ¶³ÌÊÂÇéµÄÇå¾²½ÌÓý¡£¡£¡£¡£
https://www.proofpoint.com/us/resources/threat-reports/state-of-phish
Çå¾²¹¤¾ß
Jatayu
ÒþÉí×ÔÁ¦PHP Web Shell£¬£¬£¬£¬£¬»ùÓÚHttp±êÍ·µÄÉí·ÝÑéÖ¤¡£¡£¡£¡£
https://github.com/SpiderMate/Jatayu
Chain Reactor
ÊÇÒ»¸ö¿ªÔ´¹¤¾ß£¬£¬£¬£¬£¬ÓÃÓÚÔÚLinux»úеÉϲâÊÔ¼ì²âºÍÏìÓ¦ÁýÕÖÂÊ¡£¡£¡£¡£
https://github.com/redcanaryco/chain-reactor
Boko
ÊÊÓÃÓÚmacOSµÄÓ¦ÓóÌÐòɨÃè³ÌÐò£¬£¬£¬£¬£¬ÓÃÓÚËÑË÷ºÍʶ±ðDZÔÚdylibÐ®ÖÆºÍÈõdylibÎó²î£¬£¬£¬£¬£¬ÒÔ¼°Ó¦ÓÿÉÄܱ»ºóÃÅ»á¼ûµÄ¾ç±¾¡£¡£¡£¡£
https://github.com/bashexplode/boko
Android Disassembler
ÊÇÒ»¿îÄܹ»ÆÊÎö¶àÖÖÀàÐÍÎļþµÄÓ¦ÓóÌÐò£¬£¬£¬£¬£¬ÆÊÎöÊÖ»úÉϵĶñÒâÓ¦Óᣡ£¡£¡£
https://github.com/KYHSGeekCode/Android-Disassembler
fastfinder
ÇáÁ¿¼¶¹¤¾ß£¬£¬£¬£¬£¬ÓÃÓÚÔÚ Windows ºÍ Linux ƽ̨ÉϾÙÐÐÍþв׷×Ù¡¢ÊµÊ±È¡Ö¤ºÍ·ÖÀà¡£¡£¡£¡£
https://github.com/codeyourweb/fastfinder/
Çå¾²ÆÊÎö
GitHubÏòÉçÇø¿ª·ÅÇå¾²Êý¾Ý¿â
https://www.darkreading.com/application-security/github-opens-security-database-to-community-contributions
¹È¸èä¯ÀÀÆ÷ÔÊÐíÓû§ÔÚÉúÑĵÄÃÜÂëÖÐÌí¼Ó×¢ÊÍ
https://www.bleepingcomputer.com/news/google/google-chrome-to-allow-users-to-add-notes-to-saved-passwords/
д¹ÂÚÒªÁìʹÓÃÔ¶³Ì»á¼ûÈí¼þÈÆ¹ýMFA
https://www.bleepingcomputer.com/news/security/devious-phishing-method-bypasses-mfa-using-remote-access-software/
Áª°îÁãÐÅÈÎÕ½ÂÔºÍMicrosoftµÄ°²ÅÅÖ¸ÄÏ
https://www.microsoft.com/security/blog/2022/02/22/the-federal-zero-trust-strategy-and-microsofts-deployment-guidance-for-all/
ÌÀ¼Óº£µ×µçÀÂÐÞ¸´£¬£¬£¬£¬£¬Åç·¢ºó»¥ÁªÍøÖÕÓÚ»Ö¸´
https://therecord.media/tonga-submarine-cable-repaired-restoring-internet-after-eruption/
ASEC×î½ü·¢Ã÷αװ³É Microsoft µÄ´¹ÂÚÓʼþÔöÌí
https://asec.ahnlab.com/en/31994/


¾©¹«Íø°²±¸11010802024551ºÅ