Ñо¿Ö°Ô±·¢Ã÷HTTP/2 ÐÂÐͼÆÊ±²àÐŵÀ¹¥»÷·½·¨£»£»£»£»£»£»£»£»Googleͳ¼ÆÉϰëÄêÒÑÅû¶11¸öÔÚҰʹÓÃ0day
Ðû²¼Ê±¼ä 2020-08-031.Ñо¿Ö°Ô±·¢Ã÷HTTP/2 ÐÂÐͼÆÊ±²àÐŵÀ¹¥»÷·½·¨
DistriNetÑо¿Ð¡×éºÍŦԼ´óѧ°¢²¼Ôú±È·ÖУµÄÑо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖеÄHTTP/2 ¼ÆÊ±²àÐŵÀ¹¥»÷·½·¨£¬£¬£¬£¬£¬£¬£¬£¬²¢ÃüÃûΪÎÞʱÏÞÖÆÊ±¹¥»÷£¨Timeless Timing Attacks£¬£¬£¬£¬£¬£¬£¬£¬TTA£©¡£¡£¡£¡£¡£¡£¡£¡£ÕâÖÖ¹¥»÷·½·¨ÊÇʹÓÃÍøÂçÐÒéµÄ¶à·¸´ÓúÍÓ¦ÓóÌÐòµÄ²¢·¢Ö´ÐУ¬£¬£¬£¬£¬£¬£¬£¬´Ó¶ø²»ÊÜÍøÂçÌõ¼þµÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¡£Óë¹Å°åµÄ»ùÓÚʱ¼äµÄ¹¥»÷²î±ð£¬£¬£¬£¬£¬£¬£¬£¬TTAÖ´ÐÐʱ¼äÊǰ´Ë³Ðò×ÔÁ¦ÕÉÁ¿µÄ£¬£¬£¬£¬£¬£¬£¬£¬×ÅʵÑé´ÓÁ½¸ö²¢·¢Ö´ÐеÄÇëÇóµÄ˳ÐòºÍÏà¶Ôʱ¼ä²î±ðÖÐÌáÊØÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬¶ø²»ÒÀÀµÓÚÈκÎʱ¼äÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÑо¿Ð§¹û½«ÔÚ½ñÄêϰëÄêÔÚUSENIXÇå¾²×êÑлáÉϽÒÏþ£¬£¬£¬£¬£¬£¬£¬£¬Í¬Ê±»¹Ðû²¼»ùÓÚPythonµÄ¹¤¾ß£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ²âÊÔHTTP / 2ЧÀÍÆ÷µÄTTAÎó²î¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2020/07/http2-timing-side-channel-attacks.html
2.Google PlayÊÐËÁ±£´æ29¿î¶ñÒâÕÕÆ¬´¦Öóͷ£Ó¦ÓÃ
WhiteOps SatoriÍþвÇ鱨ÍŶӷ¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬Google PlayÊÐËÁ±£´æ29¿î¶ñÒâÕÕÆ¬´¦Öóͷ£Ó¦Óᣡ£¡£¡£¡£¡£¡£¡£ÕâЩӦÓÃÕë¶ÔAndroidÓû§·Ö·¢¹ã¸æÈí¼þ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÈƹýÇå¾²¼ì²é£¬£¬£¬£¬£¬£¬£¬£¬WhiteOps½«¸Ã¸ö»î¶¯ÃüÃûΪCHARTREUSEBLUR¡£¡£¡£¡£¡£¡£¡£¡£ÕâЩ¹ã¸æÈí¼þµÄÃû³ÆÖж¼´øÓÐBLURÒ»´Ê£¬£¬£¬£¬£¬£¬£¬£¬ÆäÄ£ÄâÁËÕÕÆ¬±à¼¹¤¾ßÀ´Ä£ºýͼÏñ£¬£¬£¬£¬£¬£¬£¬£¬µ«ÏÖʵÉÏÓÐÐí¶à¶ñÒâÊôÐÔ£¬£¬£¬£¬£¬£¬£¬£¬ÀýÈ磬£¬£¬£¬£¬£¬£¬£¬Ëü×°Öõ½Ä¿µÄ×°±¸ºóÒþ²ØÓ¦ÓÃͼ±ê¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±¶ÔÓ¦ÓóÌÐòµÄ»ìÏý´úÂë¾ÙÐнøÒ»²½ÆÊÎöºó£¬£¬£¬£¬£¬£¬£¬£¬·¢Ã÷¸ÃÓ¦ÓóÌÐòʹÓÃÁËÈý½×¶ÎÓÐÓøºÔØÑݱ䡣¡£¡£¡£¡£¡£¡£¡£ÕâЩӦÓõÄÏÂÔØÁ¿×ܼÆÔ¼Îª350Íò£¬£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚGoogleÒѽ«Æäɾ³ý¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://latesthackingnews.com/2020/08/01/numerous-malicious-photo-blur-apps-appeared-on-play-store/
3.Drizly¹«Ë¾ÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶250Íò¿Í»§PII
¾ÆÀàÅäË͹«Ë¾DrizlyÔâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶250Íò¿Í»§PII¡£¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬£¬£¬£¬£¬ÆäÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬ÓÐδ¾ÊÚȨµÄµÚÈý·½»á¼ûÁËÆä¿Í»§µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþµØµã¡¢ÉúÈÕ¡¢bcrypt¼ÓÃܵÄÃÜÂëÒÔ¼°ËÍ»õµØµã¡£¡£¡£¡£¡£¡£¡£¡£HaveIBeenPwnedÔò³Æ£¬£¬£¬£¬£¬£¬£¬£¬´Ë´Îй¶µÄÐÅÏ¢»¹°üÀ¨¿Í»§Ãû³ÆºÍIPµØµã£¬£¬£¬£¬£¬£¬£¬£¬²¢ÇÒ¿ÉÄÜÓ°ÏìÁËԼĪ250Íò¸öÓû§¡£¡£¡£¡£¡£¡£¡£¡£DrizlyÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬ÔÚ´Ë´ÎÊÂÎñÖв¢Ã»ÓвÆÎñÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬£¬¶øËûÃÇÒѶԴËÊÂÕö¿ªÊӲ졣¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/drizly-breach-hits-25-million/
4.Googleͳ¼Æ£¬£¬£¬£¬£¬£¬£¬£¬½ñÄêÉϰëÄêÒÑÅû¶11¸öÔÚҰʹÓÃ0day
GoogleµÄProject ZeroÇå¾²ÍŶÓͳ¼Æ·¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬½ñÄêÉϰëÄêÒÑÅû¶11¸öÔÚҰʹÓÃ0day¡£¡£¡£¡£¡£¡£¡£¡£ÆäÖÐFirefox£¨CVE-2019-17026£©ºÍInternet Explorer£¨CVE-2020-0674£©¾ùÒѱ»Ãñ×å¹ú¼ÒºÚ¿Í×éÖ¯DarkHotelʹÓ㬣¬£¬£¬£¬£¬£¬£¬±ðµÄÉÐÓÐChrome£¨CVE-2020-6418£©£¬£¬£¬£¬£¬£¬£¬£¬Ç÷ÊÆ¿Æ¼¼·À¶¾Ç½ÍøÂç°æ£¨CVE-2020-8467ºÍCVE-2020-8468£©ÊÇÇ÷ÊÆ¿Æ¼¼ÊÓ²ìÈýÁâµç»úÊÂÎñʱ·¢Ã÷µÄ£¬£¬£¬£¬£¬£¬£¬£¬ Firefox£¨CVE-2020-6819ºÍCVE-2020-6820£©»òÒѱ»Ê¹Ó㬣¬£¬£¬£¬£¬£¬£¬CVE-2020-0938¡¢CVE-2020-1020ºÍCVE-2020-1027µÄÏêϸÐÅÏ¢ÉÐδÐû²¼£¬£¬£¬£¬£¬£¬£¬£¬Sophos XG·À»ðǽ£¨CVE 2020-12271£©Òѱ»Ê¹Óð²ÅÅÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/google-eleven-zero-days-detected-in-the-wild-in-the-first-half-of-2020/#ftag=RSSbaffb68
5.Ñо¿ÍŶÓÐû²¼ÍøÂç´¹ÂÚÇéÐμ°½»»¥·½·¨µÄ±¨¸æ
À´×ÔGoogle¡¢PayPal¡¢ÈýÐǺÍÑÇÀûÉ£ÄÇÖÝÁ¢´óѧµÄÇå¾²Ñо¿Ö°Ô±×é³ÉµÄÍŶӺÄʱÕûÕûÒ»Ä꣬£¬£¬£¬£¬£¬£¬£¬ÆÊÎöÁËÍøÂç´¹ÂÚµÄÇéÐÎÒÔ¼°Óû§ÓëÍøÂç´¹ÂÚÒ³ÃæµÄ½»»¥·½·¨£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÏîÄ¿ÆÊÎöÁË22553707¸öÓû§¶Ô404628¸öÍøÂç´¹ÂÚÒ³ÃæµÄ»á¼û¡£¡£¡£¡£¡£¡£¡£¡£±¨¸æÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬Æ½¾ùÍøÂç´¹ÂÚ¹¥»÷ʱ¼äΪ21Сʱ£¬£¬£¬£¬£¬£¬£¬£¬ÓÐ7.42£¥µÄÊܺ¦Õß×îÖÕÊäÁËÈëÆ¾Ö¤²¢µ¼ÖÂÕË»§Ð¹Â¶»òڲơ£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬Ò»Ð©¹¥»÷»î¶¯»áÒ»Á¬»îÔ¾³¤´ï9¸öÔ£¬£¬£¬£¬£¬£¬£¬£¬ÆäʹÓÃÏֳɵĴ¹ÂÚ¹¤¾ß£¬£¬£¬£¬£¬£¬£¬£¬¿É¹¥»÷³ÉǧÉÏÍòµÄÊܺ¦Õß¡£¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/phishing-campaigns-from-first-to-last-victim-take-21h-on-average/#ftag=RSSbaffb68
6.FireEyeÐû²¼Õë¶ÔOffice 365µÄ¹¥»÷µÄÆÊÎö±¨¸æ
FireEyeÐû²¼ÁËoffice365¹¥»÷͸ÊÓ¼°MandiantÖÎÀí·ÀÎñÊÓ²ìµÄ±¨¸æ¡£¡£¡£¡£¡£¡£¡£¡£ÆäÕë¶ÔOffice 365 BEC¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬ÌṩÁËÓйØMicrosoftÔÆÉú²úÁ¦Ì×¼þ¼°¶ÔÑо¿Ö°Ô±ÖÁ¹ØÖ÷ÒªµÄÖÖÖÖÈÕÖ¾ºÍÊý¾ÝÔ´¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬»¹ÏÈÈÝÁËÔÚÏìÓ¦BECʱ³£¼ûµÄ¹¥»÷ÕßÕ½ÂÔ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÉîÈëÚ¹ÊÍÁËMandiantÍйܷÀÓùÆÊÎöʦÔõÑùʹÓÃPowerShellºÍFireEye Helixƽ̨ÔÚ¿Í»§ÄÇÀï¾ÙÐÐÕâЩÊӲ졣¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.fireeye.com/blog/threat-research/2020/07/insights-into-office-365-attacks-and-how-managed-defense-investigates.html


¾©¹«Íø°²±¸11010802024551ºÅ