Jenkins³ÆÆúÓÃConfluenceЧÀÍÆ÷Ôâµ½¹¥»÷£ºVictureÓ¤¶ùÇå¾²±£´æÎó²î

Ðû²¼Ê±¼ä 2021-09-09

΢ÈíÐû²¼MSHTMLÖÐRCEÎó²î£¨CVE-2021-40444£©µÄͨ¸æ


΢ÈíÐû²¼MSHTMLÖÐRCEÎó²î£¨CVE-2021-40444£©µÄͨ¸æ.jpg


΢ÈíÍŶÓÔÚ9ÔÂ7ÈÕÐû²¼ÁËÕë¶ÔWindowsÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2021-40444£©µÄ»º½â²½·¥¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚMicrosoft OfficeÎĵµÊ¹ÓõÄä¯ÀÀÆ÷äÖȾÒýÇæMSHTMLÖУ¬£¬£¬£¬£¬£¬ÒÑÔÚÕë¶ÔWindows 10ÉϵÄOffice 365ºÍOffice 2019µÄ¹¥»÷»î¶¯Öб»Ê¹Óᣡ£¡£¡£¡£¡£ÏÖÔÚÉÐÎÞ¿ÉÓõÄÇå¾²¸üУ¬£¬£¬£¬£¬£¬Microsoft½¨Òé½ûÓÃInternet ExplorerÖÐËùÓеÄActiveX¿Ø¼þ×÷Ϊ»º½â²½·¥¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-shares-temp-fix-for-ongoing-office-365-zero-day-attacks/


Jenkins³ÆÆäÒÑÆúÓõÄConfluenceЧÀÍÆ÷Ôâµ½¹¥»÷


Jenkins³ÆÆäÒÑÆúÓõÄConfluenceЧÀÍÆ÷Ôâµ½¹¥»÷.jpg


JenkinsÍŶÓÔÚÉÏÖÜÁùÐû²¼ÁËÒ»·ÝÉùÃ÷£¬£¬£¬£¬£¬£¬³ÆÆäConfluenceЧÀÍÆ÷Ôâµ½¹¥»÷¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯Ê¹ÓÃÁËConfluenceÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýºÍÏÂÁî×¢ÈëÎó²îCVE-2021-26084£¬£¬£¬£¬£¬£¬²¢ÔÚ±»ºÚЧÀÍÆ÷ÖÐ×°ÖÃÁ˶ñÒâÍÚ¿óÈí¼þ¡£¡£¡£¡£¡£¡£JenkinsÖÎÀíÔ±ÌåÏÖ£¬£¬£¬£¬£¬£¬¸ÃЧÀÍÆ÷×Ô2019Äê10ÔÂÒѱ»ÆúÓ㬣¬£¬£¬£¬£¬ÆäʱÒѽ«¸ÃAtlassian ConfluenceЧÀÍÆ÷ÉÏÍйܵÄwikiÍøÕ¾ºÍÍŶÓЭ×÷ϵͳǨáãÖÁGitHubƽ̨£¬£¬£¬£¬£¬£¬Òò´ËûÓÐÈκÎJenkins°æ±¾¡¢²å¼þ»òÔ´´úÂëÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://therecord.media/jenkins-project-discloses-security-breach-following-confluence-server-hack/


¶ñÒâÈí¼þTrickBotµÄ¿ª·¢Ö°Ô±ÔÚº«¹úÊ×¶û»ú³¡±»²¶


¶ñÒâÈí¼þTrickBotµÄ¿ª·¢Ö°Ô±ÔÚº«¹úÊ×¶û»ú³¡±»²¶.jpg


ÉÏÖÜ£¬£¬£¬£¬£¬£¬Ò»Ãû¶íÂÞ˹ÄÐ×ÓÔÚÊ×¶û¹ú¼Ê»ú³¡±»²¶£¬£¬£¬£¬£¬£¬×ïÃûÊÇΪTrickBot¿ª·¢´úÂë¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÍâµØÃ½Ì屨µÀ£¬£¬£¬£¬£¬£¬ÏÓÒÉÈËÓÚ2020Äê2Ôµִﺫ¹ú£¬£¬£¬£¬£¬£¬ÒòCOVID-19×÷·Ï¹ú¼ÊÂÃÐкó±»À§ÔڸùúÒ»Äê¶à£¬£¬£¬£¬£¬£¬ÔÚ·â±Õɨ³ýºó×¼±¸·µ»Ø¶íÂÞ˹ʱ±»²¶¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬ÆäÔÚ2016ÄêÔøµ£µ±TrickBotµÄÍøÂçä¯ÀÀÆ÷¿ª·¢Ö°Ô±¡£¡£¡£¡£¡£¡£º«¹úKBS³Æ£¬£¬£¬£¬£¬£¬¸ÃÄÐ×ÓÓÚ9ÔÂ2ÈÕÔÚÊ×¶û·¨Ôº±»´«Ñ¶£¬£¬£¬£¬£¬£¬²¢ÒªÇóÒý¶Éµ½ÃÀ¹ú£¬£¬£¬£¬£¬£¬µ«Æä±ç»¤×´Ê¦×èµ²ÁËÕâÒ»¾öÒé¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/121909/cyber-crime/trickbot-gang-developer-arrested.html



VictureÓ¤¶ùÇå¾²¼à¿ØÖб£´æÔ¶³Ì´úÂëÖ´ÐеÈ5¸öÎó²î


Ó¤¶ùÇå¾²¼à¿Ø.png


BitdefenderÑо¿Ö°Ô±·¢Ã÷VictureÓ¤¶ùÇå¾²¼à¿ØÖб£´æ5Çå¾²¸öÎó²î¡£¡£¡£¡£¡£¡£Ê¹ÓÃÕâЩÎó²î¿É»á¼û¼à¿ØÊÓÆµ£¬£¬£¬£¬£¬£¬ÉõÖÁÍêÈ«½ÓÊÜ×°±¸¡£¡£¡£¡£¡£¡£ÆäÖнÏΪÑÏÖØµÄÊǵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐеĻùÓÚÍâµØ¿ÍÕ»µÄ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬£¬¿ÉÒÔͨ¹ýÆôÓÃONVIFЧÀÍ£¨Ä¬ÈϽûÓã©À´Ê¹Ó㻣» £» £»ÒÔ¼°Ó²±àÂëµÄRTSPƾ֤Îó²î£¬£¬£¬£¬£¬£¬·Ã¿ÍÕÊ»§ÎÞ·¨¸ü¸ÄĬÈÏÆ¾Ö¤admin:123456¡£¡£¡£¡£¡£¡£



Ô­ÎÄÁ´½Ó£º

https://latesthackingnews.com/2021/09/06/vulnerabilities-in-victure-baby-monitor-allow-access-to-camera-feeds/


ÃÀ¹ú´ïÀ­Ë¹Ñ§ÇøÈ·ÈÏÒÑй¶ÊýÊ®ÍòѧÉúºÍÔ±¹¤ÐÅÏ¢


ÃÀ¹ú´ïÀ­Ë¹Ñ§ÇøÈ·ÈÏÒÑй¶ÊýÊ®ÍòѧÉúºÍÔ±¹¤ÐÅÏ¢.jpg


ÃÀ¹ú×î´óµÄÑ§ÇøÖ®Ò»´ïÀ­Ë¹×ÔÁ¦Ñ§Çø£¨ISD£©ÔÚ9ÔÂ3ÈÕÈ·ÈÏÒÑй¶ѧÉúºÍÔ±¹¤ÐÅÏ¢¡£¡£¡£¡£¡£¡£¸ÃÑ§ÇøÉù³ÆÔڸõØÇøµÄ230ËùѧУÖÐÓÐ145000ÃûѧÉúºÍ22000ÃûÔ±¹¤¡£¡£¡£¡£¡£¡£ISD͸¶£¬£¬£¬£¬£¬£¬ ËüÔÚ8ÔÂ8ÈÕÊÕµ½ÁËÓйØÊý¾Ýй¶ÊÂÎñµÄ֪ͨ£¬£¬£¬£¬£¬£¬Î´¾­ÊÚȨµÄµÚÈý·½»á¼ûÆäÍøÂç²¢ÏÂÔØÁËÊý¾Ý£¬£¬£¬£¬£¬£¬½«Êý¾ÝÔÝʱ´æ´¢ÔÚÁËÔÆÉÏ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÕâЩÊý¾ÝÒѱ»É¾³ý£¬£¬£¬£¬£¬£¬µ«´Ó2010ÄêÖÁ½ñµÄѧÉú¡¢Ô±¹¤ºÍ³Ð°üÉ̵ÄÐÅÏ¢¿ÉÄܶ¼»áÊܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/dallas-school-district-data-breach/


KELAÐû²¼ÓйØÀÕË÷ÔËÓªÉÌÔõÑùѰÕÒÄ¿µÄµÄÆÊÎö±¨¸æ


KELAÐû²¼ÓйØÀÕË÷ÔËÓªÉÌÔõÑùѰÕÒÄ¿µÄµÄÆÊÎö±¨¸æ.jpg


KELAÓÚ9ÔÂ6ÈÕÐû²¼ÁËÓйØÀÕË÷ÔËÓªÉÌÔõÑùѰÕÒÄ¿µÄµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÆÊÎöÁË7Ô·ݽ¨ÉèµÄ48¸öºÚ¿ÍÂÛ̳µÄÌû×Ó£¬£¬£¬£¬£¬£¬ÒÔ̽Ë÷ÀÕË÷ÔËÓªÉÌÔõÑùѰÕÒÄ¿µÄ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬¹¥»÷ÕßµÄÒªÇóͨ³£°üÀ¨£ºÖ÷ҪλÓÚÃÀ¹ú¡¢¼ÓÄô󡢰ĴóÀûÑǺÍÅ·Ö޵ȹú£»£» £» £»Æ½¾ùÊÕÈëÁè¼Ý1ÒÚÃÀÔª£»£» £» £»±Ü¿ªÒ½ÁÆ¡¢½ÌÓý¡¢Õþ¸®ºÍ·ÇÓ¯Àû»ú¹¹£»£» £» £»×èֹλÓÚ×ÔÁ¦¹ú¼ÒÁªºÏÌå (CIS) µÄ¹«Ë¾£¬£¬£¬£¬£¬£¬Èç¶íÂÞ˹¡¢ÎÚ¿ËÀ¼¡¢Ä¦¶û¶àÍß¡¢°×¶íÂÞ˹µÈ¹ú¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔ¸ÒâÖ§¸¶¸ß´ï10ÍòÃÀÔª¹ºÖûá¼ûȨÏÞ£¬£¬£¬£¬£¬£¬ÆäÖÐRDPºÍVPNÊÇ×î»ù±¾µÄÐèÇ󡣡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://ke-la.com/the-ideal-ransomware-victim-what-attackers-are-looking-for/