Ñо¿ÍŶӷ¢Ã÷½ü3200¸öÒÆ¶¯Ó¦ÓÿÉй¶Twitter APIÃÜÔ¿

Ðû²¼Ê±¼ä 2022-08-03
1¡¢Ñо¿ÍŶӷ¢Ã÷½ü3200¸öÒÆ¶¯Ó¦ÓÿÉй¶Twitter APIÃÜÔ¿

      

¾ÝýÌå8ÔÂ1ÈÕ±¨µÀ£¬£¬£¬£¬£¬Çå¾²¹«Ë¾CloudSEK·¢Ã÷ÁË3207¸öÒÆ¶¯Ó¦ÓóÌÐò¿Éй¶Twitter APIÃÜÔ¿¡£¡£»á¼ûTwitterµÄAPIÐèÒªÌìÉúÃÜÔ¿ºÍ»á¼ûÁîÅÆ£¬£¬£¬£¬£¬ËüÃdz䵱ӦÓóÌÐòµÄÓû§ÃûºÍÃÜÂ룬£¬£¬£¬£¬ÒÔ¼°½«´ú±íÆä·¢³ö API ÇëÇóµÄÓû§¡£¡£Òò´Ë£¬£¬£¬£¬£¬ÕÆÎÕÕâЩÐÅÏ¢¹¥»÷Õß¿ÉÒÔ½¨ÉèÒ»¸öTwitter botÐÛʦ£¬£¬£¬£¬£¬²¢ÓпÉÄÜʹÓÃËüÔÚÉ罻ýÌåÆ½Ì¨ÉÏÈö²¥ÐéαÐÅÏ¢¡£¡£APIÃÜԿй¶ͨ³£ÊÇÓÉÓÚÓ¦ÓóÌÐò¿ª·¢Ö°Ô±µÄ¹ýʧµ¼Ö£¬£¬£¬£¬£¬ËûÃǽ«Éí·ÝÑéÖ¤ÃÜԿǶÈëTwitter API£¬£¬£¬£¬£¬µ«ÔÚÐû²¼Ê±ÒÅÍüɾ³ý£¬£¬£¬£¬£¬CloudSEK½¨Ò鿪·¢Ö°Ô±Ê¹ÓÃAPIÃÜÔ¿ÂÖ»»À´±£»£»£»£»£»£»¤Éí·ÝÑéÖ¤ÃÜÔ¿¡£¡£


https://thehackernews.com/2022/08/researchers-discover-nearly-3200-mobile.html


2¡¢Outlook»áÔÚÉó²éÓÐUberÊÕÌõµÈ±í¸ñµÄÓʼþʱ×èÖ¹ÏìÓ¦

      

¾Ý8ÔÂ1ÈÕ±¨µÀ£¬£¬£¬£¬£¬Outlookµç×ÓÓʼþ¿Í»§¶ËÔÚÉó²é´øÓÐUberÊÕÌõµÈ±í¸ñµÄµç×ÓÓʼþʱ»á·ºÆðÍß½âÎÊÌâ¡£¡£Î¢ÈíÚ¹Êͳƣ¬£¬£¬£¬£¬µ±·­¿ª¡¢»Ø¸´»òת·¢Ò»Ð©°üÀ¨ÖØ´ó±í¸ñµÄµç×ÓÓʼþʱ£¬£¬£¬£¬£¬Outlook »á×èÖ¹ÏìÓ¦¡£¡£¸üÔã¸âµÄÊÇ£¬£¬£¬£¬£¬¾ßÓÐÏàͬ±í¸ñÄÚÈݵĵç×ÓÓʼþÒ²»áµ¼ÖÂMicrosoft Word×èÖ¹ÏìÓ¦¡£¡£Microsoft WordÍŶÓÒѾ­¿ª·¢ÁËÒ»¸ö²¹¶¡£¡£¬£¬£¬£¬£¬ÔÚ¾­ÓÉÑéÖ¤ºó½«ºÜ¿ìÐû²¼¸øBetaͨµÀ¿Í»§¡£¡£¸Ã¹«Ë¾Ôö²¹Ëµ£¬£¬£¬£¬£¬Ê¹ÓÃCurrent ChannelµÄOutlook°æ±¾µÄÓû§½«ÔÚ2022Äê8ÔÂ9ÈÕÐÇÆÚ¶þÊÕµ½²¹¶¡¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-outlook-is-crashing-when-reading-uber-receipt-emails/


3¡¢VMwareÐÞ¸´¶à¸ö²úÆ·ÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î(CVE-2022-31656)

      

8ÔÂ2ÈÕ£¬£¬£¬£¬£¬VMwareÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´ÁËÑÏÖØµÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î(CVE-2022-31656)¡£¡£¸ÃÎó²î»áÓ°ÏìVMware Workspace ONE Access¡¢Identity ManagerºÍvRealize Automation£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬£¬£¬£¬¿É±»Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÓÃÀ´»ñµÃÖÎÀíԱȨÏÞ¡£¡£±ðµÄ£¬£¬£¬£¬£¬¸Ã¹«Ë¾»¹ÐÞ¸´ÁËÆäËü¶à¸öÎó²î£¬£¬£¬£¬£¬°üÀ¨Ô¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2022-31658¡¢CVE-2022-31659ºÍCVE-2022-31665£©ºÍÍâµØÌáȨÎó²î£¨CVE-2022-31660¡¢CVE- 2022-31661ºÍCVE-2022-31664£©µÈ¡£¡£


https://www.bleepingcomputer.com/news/security/vmware-urges-admins-to-patch-critical-auth-bypass-bug-immediately/


4¡¢OneTouchPointÔâµ½ÀÕË÷¹¥»÷Ó°ÏìÖÁÉÙ34¼ÒÒ½ÁÆ»ú¹¹

      

ýÌå8ÔÂ1Èճƣ¬£¬£¬£¬£¬´òÓ¡ºÍÓʼþЧÀÍÌṩÉÌOneTouchPointÔâµ½ÀÕË÷¹¥»÷ºó£¬£¬£¬£¬£¬Æä34¼Ò¿Í»§ÒÑÐû²¼Êý¾Ýй¶֪ͨ¡£¡£¸Ã¹«Ë¾Îª¶à¼Ò¿µ½¡°ü¹Ü¹«Ë¾ºÍÒ½ÁÆ»ú¹¹ÌṩЧÀÍ£¬£¬£¬£¬£¬Æä7ÔÂ27ÈÕµÄÐû²¼µÄͨ¸æÖÐÏÔʾ£¬£¬£¬£¬£¬ËüÓÚ4ÔÂ28ÈÕÔÚϵͳÖз¢Ã÷Á˼ÓÃÜÎļþ¡£¡£OneTouchPointûÓÐ͸¶Óм¸¶àÈËÊܵ½ÁË´Ë´ÎÊÂÎñµÄÓ°Ï죬£¬£¬£¬£¬Ò²Ã»ÓÐÀÕË÷ÍÅ»ïÉùÃ÷¶Ô´ËÊÂÈÏÕæ¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬Õû¸ö2021ÄêºÍ2022Ä꣬£¬£¬£¬£¬Õë¶ÔÒ½ÁÆ×éÖ¯µÄÀÕË÷¹¥»÷´Óδ×èÖ¹¡£¡£

  

https://therecord.media/at-least-34-healthcare-orgs-affected-by-alleged-ransomware-attack-on-onetouchpoint/


5¡¢¹ú¾Û»áԱ͸¶ÃÀ¹úÁª°î·¨Í¥¼Í¼ϵͳÔâµ½²»·¨»á¼û

      

ýÌå7ÔÂ29ÈÕ±¨µÀ£¬£¬£¬£¬£¬ÃÀ¹úÖÚÒéԺ˾·¨Î¯Ô±»áÖ÷ϯ½ÜÂ޵¡¤ÄɵÂÀÕ£¨D-NY£©Í¸Â¶£¬£¬£¬£¬£¬Õë¶ÔÃÀ¹ú˾·¨ÏµÍ³µÄÍøÂç¹¥»÷ÈëÇÖÁ˹«¹²ÎļþÖÎÀíϵͳ¡£¡£Nadler³Æ£¬£¬£¬£¬£¬Èý¸ö¹¥»÷ÕßÈëÇÖÁ˹«ÖÚ»á¼û·¨Ôºµç×ӼͼºÍ°¸¼þÖÎÀí/µç×Ó°¸¼þµµ°¸(PACER)ϵͳ£¬£¬£¬£¬£¬¸ÃϵͳÌṩÁ˶ÔÕû¸öÃÀÍõ·¨ÔºÏµÍ³ÎļþµÄ»á¼ûȨÏÞ¡£¡£ÊÂÎñ±¬·¢ÔÚ2020ÄêÍ·£¬£¬£¬£¬£¬ÓÚ3ÔÂÊ״η¢Ã÷£¬£¬£¬£¬£¬Ëü¿ÉÄÜ»áÓ°Ïìδ¾öµÄÃñʺÍÐÌÊÂËßËÏ¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ÃÀ¹ú˾·¨²¿ÕýÔÚÊÓ²ìÕâÒ»ÆðÍøÂçÈëÇÖÊÂÎñ¡£¡£


https://www.infosecurity-magazine.com/news/congress-us-court-records-breach/


6¡¢ZscalerÐû²¼¹ØÓÚRaccoon StealerбäÌåµÄÆÊÎö±¨¸æ

      

ZscalerÔÚ7ÔÂ29ÈÕÐû²¼Á˹ØÓÚRaccoon StealerбäÌåµÄÆÊÎö±¨¸æ¡£¡£ÓëÒÔǰÖ÷ÒªÓÃC++±àдµÄ°æ±¾²î±ð£¬£¬£¬£¬£¬Raccoon Stealer v2ÊÇÓÃCÓïÑÔ±àдµÄ£¬£¬£¬£¬£¬ÓÚ7ÔÂ3ÈÕÊ״ηºÆð¡£¡£Ð°汾»¹¾ßÓÐеĺó¶ËºÍǰ¶Ë£¬£¬£¬£¬£¬ºÍ¿ÉÒÔ¸üÓÐÓõØÇÔȡƾ֤ºÍÆäËüÊý¾ÝµÄ´úÂë¡£¡£Ëü¿ÉÒÔÔÚ32λºÍ64λϵͳÉÏÔËÐУ¬£¬£¬£¬£¬ÎÞÐèÌØÁíÍâÒÀÀµÏ£¬£¬£¬£¬¶øÊÇÖ±½Ó´ÓÆäC2ЧÀÍÆ÷»ñÈ¡8¸öÕýµ±DLL¡£¡£±ðµÄ£¬£¬£¬£¬£¬Raccoon v2ͨ¹ýʹÓö¯Ì¬ÆÊÎöAPIÃû³Æ¶ø²»ÊǾ²Ì¬¼ÓÔØµÄ»úÖÆÀ´Òþ²ØÆäÒâͼµÄת±ä¡£¡£


https://www.zscaler.com/blogs/security-research/raccoon-stealer-v2-latest-generation-raccoon-family