IntelÇý¶¯³ÌÐòBugµ¼ÖÂʹÓÃDirectXµÄWindowsÓ¦ÓÃÍß½â
Ðû²¼Ê±¼ä 2023-02-13
¾ÝýÌå2ÔÂ10ÈÕ±¨µÀ£¬£¬Î¢ÈíÌåÏÖÔÚ×°ÖÃ2022Äê11ÔÂÀÛ»ý¸üк󣬣¬WindowsϵͳÉÏʹÓÃDirectXµÄÓ¦ÓóÌÐò»á±¬·¢Í߽⡣¡£¡£ÊÜÓ°ÏìÓû§»á´ÓʹÓÃDirectXµÄÓ¦ÓóÌÐòÖп´µ½apphelp.dll¹ýʧ£¨Ó¦ÓóÌÐò¼æÈÝÐÔ¿Í»§¶Ë¿â£©£¬£¬Ôµ¹ÊÔÓÉÊÇÓ¢ÌØ¶ûGPUÇý¶¯³ÌÐòÒѾÓÉʱ¡£¡£¡£Î¢ÈíÕýÔÚÆð¾¢ÐÞ¸´Õâ¸öÐÂÎÊÌ⣬£¬²¢»áÔÚ¼´½«Ðû²¼µÄ°æ±¾ÖÐÌṩ¸üС£¡£¡£ÔÚ´Ë֮ǰ£¬£¬ÊÜÓ°ÏìµÄÓû§¿ÉÒÔͨ¹ý½«Intel GPUÇý¶¯³ÌÐò¸üе½×îаæÔÀ´ÔÝʱ½â¾öÕâ¸öÎÊÌâ¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-says-intel-driver-bug-crashes-apps-on-windows-pcs/
2¡¢Ó²¼þÖÆÔìÉÌA10 NetworksÔâµ½ÀÕË÷ÍÅ»ïPlayµÄ¹¥»÷
ýÌåÓÚ2ÔÂ10ÈÕ±¨µÀ£¬£¬¼ÓÀû¸£ÄáÑǵÄÍøÂçÓ²¼þÖÆÔìÉÌA10 NetworksÔâµ½ÁËÀÕË÷ÍÅ»ïPlayµÄ¹¥»÷¡£¡£¡£ÊÂÎñ±¬·¢ÔÚ2023Äê1ÔÂ23ÈÕ£¬£¬ÊÓ²ìÈ·¶¨¹¥»÷ÕßÏë·¨»ñµÃÁ˶Թ²ÏíÇý¶¯Æ÷µÄ»á¼ûȨÏÞ£¬£¬×°ÖÃÁ˶ñÒâÈí¼þ£¬£¬²¢ÇÔÈ¡ÁËÓëÈËÁ¦×ÊÔ´¡¢²ÆÎñºÍÖ´·¨Ö°ÄÜÏà¹ØµÄÊý¾Ý¡£¡£¡£ÏÖÔÚ£¬£¬¸Ã¹«Ë¾Ô¤¼Æ´ËÊÂÎñ²»»á¶ÔÆäÔËÓª±¬·¢ÖØ´óÓ°Ïì¡£¡£¡£PlayÓÚ2ÔÂ9ÈÕ½«A10 NetworksÌí¼Óµ½ÆäÍøÕ¾£¬£¬²¢ÍþвҪÔÚ2ÔÂ12ÈÕ¹ûÕæÇÔÈ¡µÄÎļþ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/a10-networks-confirms-data-breach-after-play-ransomware-attack/
3¡¢ÓòÃû×¢²áÉÌNamecheapµÄÓʼþÕÊ»§±»ºÚ·¢ËÍ´ó×Ú´¹ÂÚÓʼþ
ýÌå2ÔÂ12Èճƣ¬£¬ÓòÃû×¢²áÉÌNamecheapµÄÓʼþÕÊ»§ÔÚÖÜÈÕÍíÉÏÔâµ½¹¥»÷£¬£¬·¢ËÍ´ó×ÚÖ¼ÔÚÇÔÈ¡ÊÕ¼þÈ˵ÄÐÅÏ¢ºÍ¼ÓÃÜÇ®±ÒÇ®°üµÄ´¹ÂÚÓʼþ¡£¡£¡£´¹Âڻ×îÏÈÓÚ4:30 PM ET×óÓÒ£¬£¬Ô´ÓÚNamecheapÓÃÀ´·¢ËÍÐø¶©Í¨ÖªºÍÓªÏúÓʼþµÄµç×ÓÓʼþƽ̨SendGrid¡£¡£¡£ÕâЩ´¹ÂÚÓʼþð³äDHL»òMetaMask£¬£¬ÆäÖÐDHLµÄÓʼþαװ³ÉÍê³É°ü¹üµÝËÍËùÐèµÄµÝËÍ·ÑÕ˵¥£¬£¬MetaMaskµÄÓʼþÔòð³äÊDZØÐèµÄKYCÑéÖ¤¡£¡£¡£
https://www.bleepingcomputer.com/news/security/namecheaps-email-hacked-to-send-metamask-dhl-phishing-emails/
4¡¢¼ÓÀû¸£ÄáÑÇÖݶà¸öÒ½ÁÆ×éÖ¯Êý¾Ýй¶ӰÏìÔ¼330Íò»¼Õß
¾Ý2ÔÂ11ÈÕ±¨µÀ£¬£¬¼ÓÀû¸£ÄáÑÇHeritage Provider NetworkÖеĶà¸öÒ½ÁÆ×éÖ¯Ôâµ½ÀÕË÷¹¥»÷£¬£¬Ð¹Â¶3300638Ãû»¼ÕßµÄÐÅÏ¢¡£¡£¡£ÊÜÓ°Ïì×éÖ¯°üÀ¨Regal Medical GroupºÍLakeside Medical OrganizationµÈ¡£¡£¡£¹¥»÷±¬·¢ÔÚ2022Äê12ÔÂ1ÈÕ£¬£¬RegalÔÚ12ÔÂ2ÈÕ·¢Ã÷²¿·ÖЧÀÍÆ÷ÎÞ·¨»á¼û£¬£¬¾ÊÓ²ìÈ·¶¨ÕâЩЧÀÍÆ÷ѬȾÁ˶ñÒâÈí¼þ¡£¡£¡£RegalÕýÔÚ֪ͨÊÜÓ°ÏìÓû§£¬£¬²¢½«ÎªÆäÌṩΪÆÚÒ»ÄêµÄNorton LifeLockÃâ·ÑÐÅÓÃ¼à¿Ø¡£¡£¡£
https://www.theregister.com/2023/02/11/ransomware_regal_medical_group/
5¡¢OtorioÅû¶ÎÞÏßIIoT×°±¸ÖÐÓ°ÏìÒªº¦»ù´¡ÉèÊ©µÄÎó²î
2ÔÂ9ÈÕ±¨µÀ³Æ£¬£¬¹¤ÒµÍøÂçÇå¾²¹«Ë¾OtorioÔÚ4¼Ò²î±ð¹©Ó¦É̵ÄÎÞÏß¹¤ÒµÎïÁªÍø(IIoT)×°±¸Öз¢Ã÷ÁË38¸öÎó²î¡£¡£¡£¹¥»÷Õß¿ÉÒÔʹÓÃÕâЩÎó²î»ñµÃ¶ÔÄÚ²¿OTϵͳµÄ³õʼ»á¼ûȨÏÞ£¬£¬²¢ÈƹýÇå¾²²ã²¢ÈëÇÖÄ¿µÄÍøÂ磬£¬Ó°ÏìÒªº¦»ù´¡ÉèÊ©¡£¡£¡£ÆäÖУ¬£¬ÓÐÈý¸öÓ°ÏìETIC Telecom µÄÔ¶³Ì»á¼ûЧÀÍÆ÷(RAS)µÄÎó²î£¨CVE-2022-3703¡¢CVE-2022-41607ºÍCVE-2022-40981£©£¬£¬¿ÉÄܱ»Ê¹ÓÃÀ´ÍêÈ«¿ØÖÆÒ×ÊÜÓ°ÏìµÄ×°±¸¡£¡£¡£
https://thehackernews.com/2023/02/critical-infrastructure-at-risk-from.html
6¡¢TrendMicro·¢Ã÷ʹÓÃÐéαÊÂÇéÕë¶Ô¶«Å·µØÇøµÄ¹¥»÷»î¶¯
2ÔÂ9ÈÕ£¬£¬Trend MicroÅû¶ÁËʹÓÃÐéαÊÂÇéʱ»úÕë¶Ô¶«Å·µØÇøµÄ¹¥»÷»î¶¯¡£¡£¡£¸Ã»î¶¯ÖУ¬£¬¹¥»÷ÕßʹÓÃÁ˼¸¸ö¸ß¶È»ìÏýÇÒ¿ª·¢È±·¦µÄ×Ô½ç˵¼ÓÔØ³ÌÐò£¬£¬ÒÔ±ãʹÓÃÇÔÈ¡³ÌÐòEnigmaѬȾÓë¼ÓÃÜÇ®±ÒÐÐÒµÏà¹ØµÄÈË¡£¡£¡£¾ÝϤ£¬£¬EnigmaÊÇ¿ªÔ´µÄC#¶ñÒâÈí¼þStealeriumµÄÐ޸İ汾¡£¡£¡£³ýÁËÕâЩ¼ÓÔØ³ÌÐòÖ®Í⣬£¬¹¥»÷Õß»¹Ê¹ÓÃIntelÇý¶¯³ÌÐòÎó²î£¨CVE-2015-2291£©À´¼ÓÔØÖ¼ÔÚ½µµÍMicrosoft DefenderÁîÅÆÍêÕûÐԵĶñÒâÇý¶¯³ÌÐò¡£¡£¡£
https://www.trendmicro.com/en_us/research/23/b/enigma-stealer-targets-cryptocurrency-industry-with-fake-jobs.html