ÎÚ¿ËÀ¼µÄ¶à¸ö¹Ù·½×éÖ¯ÔÙÒ»´ÎÔâµ½´ó¹æÄ£DDoS¹¥»÷
Ðû²¼Ê±¼ä 2022-02-25ÎÚ¿ËÀ¼µÄ¶à¸ö¹Ù·½×éÖ¯ÔÙÒ»´ÎÔâµ½´ó¹æÄ£DDoS¹¥»÷
¾ÝýÌå2ÔÂ23Èճƣ¬£¬£¬£¬ÎÚ¿ËÀ¼µÄ¶à¸ö¹Ù·½×éÖ¯ÔÙ´ÎÔâµ½´ó¹æÄ£DDoS¹¥»÷¡£¡£¡£¡£¡£¡£´Ë´ÎÊܵ½¹¥»÷µÄ×éÖ¯°üÀ¨ÎÚ¿ËÀ¼Íâ½»²¿¡¢¹ú·À²¿¡¢ÄÚÕþ²¿¡¢Çå¾²¾ÖºÍÄڸ󣬣¬£¬£¬ÒÔ¼°ÎÚ¿ËÀ¼×î´óµÄÒøÐÐPrivatbankºÍ¹ú¼Ò´¢±¸ÒøÐÐOschadbank¡£¡£¡£¡£¡£¡£ÎÚ¿ËÀ¼SSSCIPÌåÏÖ£¬£¬£¬£¬¹¥»÷»î¶¯µ¼Ö²¿·Öϵͳ²»¿ÉÓûòÖ»Äܶ϶ÏÐøÐøµØÊÂÇ飬£¬£¬£¬ËûÃÇÕýÔÚÆð¾¢Ó¦¶Ô¹¥»÷²¢ÍøÂçÆÊÎöÐÅÏ¢¡£¡£¡£¡£¡£¡£ÉÏÖÜ£¬£¬£¬£¬ÎÚ¿ËÀ¼µÄ¶à¸öÕþ¸®»ú¹¹ºÍÒøÐÐÔøÔâµ½DDoS¹¥»÷¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/ukrainian-government-and-banks-once-again-hit-by-ddos-attacks/
DevOpsÔÚ¹Ù·½NPM¿âÖз¢Ã÷25¸ö¶ñÒâµÄJavaScript¿â
¾ÝýÌå2ÔÂ22ÈÕ±¨µÀ£¬£¬£¬£¬Çå¾²¹«Ë¾DevOpsÔÚ¹Ù·½NPM¿âÖз¢Ã÷ÁË25¸ö¶ñÒâµÄJavaScript¿â¡£¡£¡£¡£¡£¡£ÕâЩ¶ñÒâµÄ¿âαװ³ÉÕýµ±Èí¼þ°ü£¬£¬£¬£¬ÀýÈçcolors.js¡¢crypto-js¡¢discord.js¡¢marked ºÍnoblox.jsµÈ£¬£¬£¬£¬Ä¿µÄÊÇ´ÓÄ¿µÄϵͳÖÐÇÔÈ¡DiscordÁîÅÆºÍÇéÐαäÁ¿¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬ÕâЩJavaScript¿âÒѱ»É¾³ý¡£¡£¡£¡£¡£¡£ÔçÔÚ2021Äê12Ô·ݣ¬£¬£¬£¬Ñо¿Ö°Ô±¾ÍÔÚNPM¿âÖз¢Ã÷²¢É¾³ýÁË17¸öÀàËÆµÄ¶ñÒâ°ü¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2022/02/25-malicious-javascript-libraries.html
ÔÚÏßÉ̳ÇMelijoeµÄS3´æ´¢Í°ÉèÖùýʧй¶200GBÊý¾Ý
SafetyDetectivesÔÚ2ÔÂ21ÈÕ͸¶£¬£¬£¬£¬¶ùͯ´ò°çÔÚÏßÉ̳ÇMelijoeµÄS3´æ´¢Í°ÉèÖùýʧ¡£¡£¡£¡£¡£¡£´Ë´Îй¶Á˶à´ï200 GBµÄ½ü200Íò¸öÎļþ£¬£¬£¬£¬Éæ¼°Ô¼20Íò¸öÓû§¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±×ܹ²·¢Ã÷ÁË3¸öÊý¾Ý¼¯£¬£¬£¬£¬¹ØÓÚ¿Í»§µÄ¹ºÖÃÐÅÏ¢¡¢Æ«ºÃºÍÔ¸ÍûÇåµ¥£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢ÓʼþµØµã¡¢Ö§¸¶·½·¨ºÍËÍ»õÐÅÏ¢µÈ¡£¡£¡£¡£¡£¡£¸Ã´æ´¢¿âÓÚ2021Äê11ÔÂ12ÈÕ±»·¢Ã÷£¬£¬£¬£¬Ö±µ½2022Äê2ÔÂ18ÈղŻñµÃ±£»£»£»£»£»£»¤¡£¡£¡£¡£¡£¡£
https://www.hackread.com/kids-luxury-clothing-store-melijoe-data-exposed/
SonarSource·¢Ã÷Horde WebmailÖб£´æ9ÄêµÄXSSÎó²î
SonarSourceÔÚ2ÔÂ22ÈÕÅû¶ÁËHorde WebmailÖÐ×Ô2012Äêµ×Ò»Ö±±£´æµÄXSSÎó²îµÄϸ½Ú¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý¶ñÒâOpenOfficeÎĵµÊ¹ÓøÃÎó²î£¬£¬£¬£¬µ±Horde½«Æäת»»ÎªXHTMLÔ¤ÀÀʱ£¬£¬£¬£¬¾Í»áÖ´ÐиÃÎĵµÖеĶñÒâJavaScript£¬£¬£¬£¬´Ó¶øµ¼Ö´洢ÐÍXSS¹¥»÷¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬¸ÃÎó²î¿ÉÓÃÀ´Ð®ÖÆÓû§µÄÓʼþÕÊ»§£¬£¬£¬£¬ÉõÖÁÊÇ¿ØÖÆÕû¸öÓʼþЧÀÍÆ÷¡£¡£¡£¡£¡£¡£×îºó£¬£¬£¬£¬Ñо¿Ö°Ô±»¹ÌṩÁËÓйØÔõÑù»º½â´ËÎó²îµÄ½¨Òé¡£¡£¡£¡£¡£¡£
https://therecord.media/unpatched-bug-allows-takeover-of-horde-webmail-accounts-servers/
ÎÚ¿ËÀ¼¾¯·½µ·»ÙÒ»¸öÍøÂç´¹ÂÚÍŻﲢ¾Ð²¶5Ãû³ÉÔ±
¾Ý2ÔÂ22ÈÕ±¨µÀ£¬£¬£¬£¬ÎÚ¿ËÀ¼¾¯·½ÆÆ»ñÁËÒ»¸öÍøÂç´¹ÂÚÍŻﲢ¾Ð²¶ÁËÆä5Ãû³ÉÔ±¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÓµÓÐ40¶à¸ö´¹ÂÚÍøÕ¾£¬£¬£¬£¬¹¥»÷ÁËÖÁÉÙ70000¶à¸öÄ¿µÄ²¢ÀÖ³ÉÇÔÈ¡ÁËËûÃǵÄÖ§¸¶¿¨ÐÅÏ¢¡£¡£¡£¡£¡£¡£¾¯·½Ô¤¼Æ¸ÃÍÅ»ï×ܹ²Ôì³É500Íò¸ñÀï·òÄÉ£¨175000ÃÀÔª£©µÄ¾¼ÃËðʧ£¬£¬£¬£¬ÏÖÔÚûÊÕÁËÆä200Íò¸ñÀï·òÄÉ¡£¡£¡£¡£¡£¡£±»¾Ð²¶µÄÏÓÒÉÈËÃæÁÙÎÚ¿ËÀ¼¡¶ÐÌ·¨¡·µÚ361ÌõµÚ2²¿·ÖºÍµÚ190ÌõµÚ3²¿·ÖµÄÐÌÊÂÖ¸¿Ø£¬£¬£¬£¬×î¸ß¿ÉÅд¦8Äêî¿Ïµ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/police-bust-phishing-group-that-used-40-sites-to-steal-credit-cards/
ProofpointÐû²¼2021ÄêÍøÂç´¹ÂÚÌ¬ÊÆµÄÆÊÎö±¨¸æ
2ÔÂ22ÈÕ£¬£¬£¬£¬ProofpointÐû²¼ÁË2021ÄêÍøÂç´¹ÂÚÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬È¥ÄêÁè¼Ý91%µÄÓ¢¹ú×éÖ¯±»´¹ÂÚ¹¥»÷ÈëÇÖ£¬£¬£¬£¬78%µÄ×éÖ¯³ÉΪ»ùÓÚÓʼþµÄÀÕË÷¹¥»÷µÄÄ¿µÄ£¬£¬£¬£¬77%µÄ×éÖ¯Ôâµ½BEC¹¥»÷£¨Í¬±ÈÔöÌí18%£©¡£¡£¡£¡£¡£¡£Ñ¬È¾ÀÕË÷Èí¼þµÄ×éÖ¯ÖУ¬£¬£¬£¬60%Ö§¸¶ÁËÊê½ð£¬£¬£¬£¬32%»¹ÌØÊâÖ§¸¶ÁË×ʽðÒÔÖØ»ñ¶ÔÊý¾ÝºÍϵͳµÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ£¬£¬£¬£¬¹¥»÷µÄÊýÄ¿ºÍÀÖ³ÉÂʵÄÔöÌíÓëתÏò»ìÏýÊÂÇéģʽÓйأ¬£¬£¬£¬È¥ÄêÓдó×ÚÔ±¹¤¾ÙÐÐÔ¶³Ì°ì¹«£¬£¬£¬£¬µ«Ö»ÓÐÉÙÊý×éÖ¯¶ÔÔ±¹¤¾ÙÐÐÔ¶³ÌÊÂÇéµÄÇå¾²½ÌÓý¡£¡£¡£¡£¡£¡£
https://www.proofpoint.com/us/resources/threat-reports/state-of-phish
Çå¾²¹¤¾ß
Jatayu
ÒþÉí×ÔÁ¦PHP Web Shell£¬£¬£¬£¬»ùÓÚHttp±êÍ·µÄÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£¡£
https://github.com/SpiderMate/Jatayu
Chain Reactor
ÊÇÒ»¸ö¿ªÔ´¹¤¾ß£¬£¬£¬£¬ÓÃÓÚÔÚLinux»úеÉϲâÊÔ¼ì²âºÍÏìÓ¦ÁýÕÖÂÊ¡£¡£¡£¡£¡£¡£
https://github.com/redcanaryco/chain-reactor
Boko
ÊÊÓÃÓÚmacOSµÄÓ¦ÓóÌÐòɨÃè³ÌÐò£¬£¬£¬£¬ÓÃÓÚËÑË÷ºÍʶ±ðDZÔÚdylibÐ®ÖÆºÍÈõdylibÎó²î£¬£¬£¬£¬ÒÔ¼°Ó¦ÓÿÉÄܱ»ºóÃÅ»á¼ûµÄ¾ç±¾¡£¡£¡£¡£¡£¡£
https://github.com/bashexplode/boko
Android Disassembler
ÊÇÒ»¿îÄܹ»ÆÊÎö¶àÖÖÀàÐÍÎļþµÄÓ¦ÓóÌÐò£¬£¬£¬£¬ÆÊÎöÊÖ»úÉϵĶñÒâÓ¦Óᣡ£¡£¡£¡£¡£
https://github.com/KYHSGeekCode/Android-Disassembler
fastfinder
ÇáÁ¿¼¶¹¤¾ß£¬£¬£¬£¬ÓÃÓÚÔÚ Windows ºÍ Linux ƽ̨ÉϾÙÐÐÍþв׷×Ù¡¢ÊµÊ±È¡Ö¤ºÍ·ÖÀà¡£¡£¡£¡£¡£¡£
https://github.com/codeyourweb/fastfinder/
Çå¾²ÆÊÎö
GitHubÏòÉçÇø¿ª·ÅÇå¾²Êý¾Ý¿â
https://www.darkreading.com/application-security/github-opens-security-database-to-community-contributions
¹È¸èä¯ÀÀÆ÷ÔÊÐíÓû§ÔÚÉúÑĵÄÃÜÂëÖÐÌí¼Ó×¢ÊÍ
https://www.bleepingcomputer.com/news/google/google-chrome-to-allow-users-to-add-notes-to-saved-passwords/
д¹ÂÚÒªÁìʹÓÃÔ¶³Ì»á¼ûÈí¼þÈÆ¹ýMFA
https://www.bleepingcomputer.com/news/security/devious-phishing-method-bypasses-mfa-using-remote-access-software/
Áª°îÁãÐÅÈÎÕ½ÂÔºÍMicrosoftµÄ°²ÅÅÖ¸ÄÏ
https://www.microsoft.com/security/blog/2022/02/22/the-federal-zero-trust-strategy-and-microsofts-deployment-guidance-for-all/
ÌÀ¼Óº£µ×µçÀÂÐÞ¸´£¬£¬£¬£¬Åç·¢ºó»¥ÁªÍøÖÕÓÚ»Ö¸´
https://therecord.media/tonga-submarine-cable-repaired-restoring-internet-after-eruption/
ASEC×î½ü·¢Ã÷αװ³É Microsoft µÄ´¹ÂÚÓʼþÔöÌí
https://asec.ahnlab.com/en/31994/