RedgateÐû²¼2020Äê¶ÈÊý¾Ý¿â״̬¼à²â±¨¸æ£»£»£»£»£»ºÚ¿Í¹¥»÷½ü2000¼ÒMagentoÔÚÏßÊÐËÁ£¬£¬£¬£¬£¬£¬ÒÔÇÔÊØÐÅÓÿ¨

Ðû²¼Ê±¼ä 2020-09-15

1.RedgateÐû²¼2020Äê¶ÈÊý¾Ý¿â״̬¼à²â±¨¸æ


1.png


Redgate×îÐÂÐû²¼ÁË2020Äê¶ÈÊý¾Ý¿â״̬¼à²â±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬ÎÞÂÛÊÇÔÚ½ÓÄÉÊý¾Ý¿âDevOps·½Ã棬£¬£¬£¬£¬£¬ÕÕ¾ÉÔÚʹÓÃ¼à¿ØÀ´¸ú×ÙÊý¾Ý¿âÐÔÄܺͰ²ÅÅ·½Ã棬£¬£¬£¬£¬£¬½ðÈÚЧÀÍÐÐÒµµÄÌåÏÖ¶¼ÓÅÓÚÆäËûÐÐÒµ¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬£¬£¬61%µÄ½ðÈÚЧÀÍÐÐÒµÔ±¹¤Ã¿ÖܸüÐÂÖÁÉÙÒ»´ÎÊý¾Ý¿â£¬£¬£¬£¬£¬£¬¶øÆäËûÐÐÒµÖ»ÓÐ43%µÄÔ±¹¤»áÕâÑù×ö¡£¡£¡£¡£¡£¡£½ðÈÚЧÀ͵ÄЧÀÍÆ÷ÊýĿҲ¸ü¶à£¬£¬£¬£¬£¬£¬36%µÄЧÀÍÆ÷ÓµÓÐ50µ½500¸öʵÀý£¬£¬£¬£¬£¬£¬¶øÆäËû²¿·ÖÖ»ÓÐ26%¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/09/14/database-monitoring-improves-devops-success/


2.Êý¾ÝÖÐÐÄEquinixѬȾNetwalker£¬£¬£¬£¬£¬£¬Ãô¸ÐÐÅÏ¢»òÒÑй¶


2.png


Êý¾ÝÍйÜÖÐÐÄEquinixÐû²¼ÉùÃ÷£¬£¬£¬£¬£¬£¬ÌåÏÖÆäÐí¶àÄÚ²¿ÏµÍ³Ôâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬µ«ÆäΪ¿Í»§ÌṩЧÀ͵ÄÖ÷Òª½¹µã²¢Î´Êܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯NetwalkerÌåÏÖÆäÀÖ³ÉÈëÇÖÁËEquinix²¢Ðû²¼Á˱»µÁÊý¾ÝµÄ½ØÍ¼£¬£¬£¬£¬£¬£¬ÒÔ´ËҪЮ֧¸¶450ÍòÃÀÔªµÄÊê½ð¡£¡£¡£¡£¡£¡£´Ë´Î×ß©µÄÊý¾Ý°üÀ¨¹«Ë¾²ÆÎñÐÅÏ¢ºÍÊý¾ÝÖÐÐı¨¸æ¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú´Ë´Î¹¥»÷µÄǰÒòºó¹û£¬£¬£¬£¬£¬£¬EquinixÌåÏÖÕýÔÚ¾ÙÐÐÊӲ졣¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/data-center-giant-equinix-discloses-ransomware-incident/


3.·ÇÖÞÈûÉà¶û¿ª·¢ÒøÐÐÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬¿Í»§ÐÅÏ¢¿ÉÄܱ»µÁ


3.png


·ÇÖÞÈûÉà¶ûÖÐÑëÒøÐУ¨CBS£©½ÒÏþÒ»·ÝÐÂÎÅÉùÃ÷£¬£¬£¬£¬£¬£¬ÈûÉà¶û¿ª·¢ÒøÐУ¨DBS£©Ôâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬¿Í»§ÐÅÏ¢»òÒѱ»µÁ¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±¬·¢ÓÚ2020Äê9ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬ÏêϸÐÅÏ¢»¹ÔÚÊÓ²ìÖ®ÖС£¡£¡£¡£¡£¡£ËäÈ»ÏÖÔÚÉв»ÇåÎú¹¥»÷ÕßÊÇ·ñÔÚ¼ÓÃÜÒøÐÐϵͳ֮ǰÇÔÈ¡ÁËÊý¾Ý£¬£¬£¬£¬£¬£¬µ«Æ¾Ö¤¹¥»÷ÖÐʹÓõÄÀÕË÷Èí¼þÀàÐÍ£¬£¬£¬£¬£¬£¬ºÜÓпÉÄܱ¬·¢ÕâÖÖÇéÐΡ£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/development-bank-of-seychelles-hit-by-ransomware-attack/


4.ÃÀ¹úÓÊÕþ²¿·ÖITϵͳ±£´æ¶à¸öÎó²î£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÊý¾Ýй¶


4.jpg


ÃÀ¹úÓÊÕþ²¿·ÖµÄÒ»·ÝÉ󼯱¨¸æ·¢Ã÷£¬£¬£¬£¬£¬£¬¸Ã²¿·ÖµÄITϵͳ±£´æ¶à¸öÎó²î£¬£¬£¬£¬£¬£¬ÕâЩÎó²î¿ÉÄܱ»ºÚ¿ÍʹÓÃÀ´ÇÔÈ¡Ãô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£î¿Ïµ»ú¹¹ÌåÏÖ£¬£¬£¬£¬£¬£¬ÕâЩÎó²îÖÐÓÐ12¸öÔÖÄÑÐԵ쬣¬£¬£¬£¬£¬ËüÃÇ¿ÉÄÜ»á¸ø¸Ã»ú¹¹´øÀ´ÖØ´óµÄ¾­¼ÃËðʧ£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨³£¼ûµÄ¡¢Òѱ»¹ûÕæÈýÄêµÄÎó²î¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬»¹Ã»ÓÐÈκÎÖ¤¾ÝÅú×¢ÕâЩÎó²îÒѱ»ºÚ¿ÍʹÓᣡ£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.cyberscoop.com/postal-service-inspector-general-cyber-vulnerabilities/


5.Ñо¿ÍŶӷ¢Ã÷ʹÓÃOffice 365 API´¹ÂÚ¹¥»÷»î¶¯


5.jpg


Ñо¿ÍŶӷ¢Ã÷Ò»ÖÖеÄÍøÂç´¹ÂÚ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÉí·ÝÑéÖ¤APIʵʱÑéÖ¤Êܺ¦ÕßµÄOffice 365ƾ֤¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÖеĴ¹ÂÚÓʼþÖ¸ÏòÓëOffice 365µÇ¼ҳÏàͬµÄ´¹ÂÚÍøÕ¾£¬£¬£¬£¬£¬£¬²¢ÇÒÓû§ÃûÒÑÔ¤ÏÈÊäÈë¡£¡£¡£¡£¡£¡£Ò»µ©Êܺ¦Õß½«Æäƾ֤ÊäÈëµ½ÍøÂç´¹ÂÚµÇÂ¼Ò³Ãæ£¬£¬£¬£¬£¬£¬Azure Active DirectoryµÇ¼ÈÕÖ¾¾Í»áÏÔʾÓëÔÚ¸½¼þÍøÒ³ÉÏÖ´ÐеÄXHRÇëÇóÏà¶ÔÓ¦µÄÁ¬Ã¦µÇ¼ʵÑé¡£¡£¡£¡£¡£¡£ÈôÊÇÉí·ÝÑéÖ¤Àֳɣ¬£¬£¬£¬£¬£¬Ôò½«Óû§Öض¨Ïòµ½zoom.com¡£¡£¡£¡£¡£¡£ÈôÊÇÉí·ÝÑé֤ʧ°Ü£¬£¬£¬£¬£¬£¬Ôò»á½«Óû§Öض¨Ïòµ½login.microsoftonline.com¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/office-365-phishing-attack-leverages-real-time-active-directory-validation/159188/


6.ºÚ¿Í¹¥»÷½ü2000¼ÒMagentoÔÚÏßÊÐËÁ£¬£¬£¬£¬£¬£¬ÒÔÇÔÊØÐÅÓÿ¨


6.jpg


ÉÏÖÜÄ©£¬£¬£¬£¬£¬£¬ÐÅÓÿ¨ÇÔȡԤ·À¹«Ë¾Sanguine Security·¢Ã÷ÔÚÒÑÍùËÄÌìÖкڿÍÈëÇÖÁË1904¼ÒMagentoÔÚÏßÊÐËÁ£¬£¬£¬£¬£¬£¬ÒÔÇÔÊØÐÅÓÿ¨¡£¡£¡£¡£¡£¡£¹¥»÷ʼÓÚÉÏÖÜÎ壬£¬£¬£¬£¬£¬ÆäʱÓÐ10¼ÒÊÐËÁѬȾÁË´Óδ¼û¹ýµÄÐÅÓÿ¨ÇÔÈ¡¾ç±¾¡£¡£¡£¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬£¬¹¥»÷ÔÚÖÜÁù¼¤Ôö£¬£¬£¬£¬£¬£¬ÓÐ1058¸öÕ¾µã±»ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬ÔÚÖÜÈÕÓÐ603¸öÕ¾µã±»ÈëÇÖ£¬£¬£¬£¬£¬£¬ÖÜÒ»ÓÐ233¸ö±»ÈëÇÖ¡£¡£¡£¡£¡£¡£Sanguine SecurityÌåÏÖ£¬£¬£¬£¬£¬£¬ÕâÊÇ×Ô2015Äê×îÏÈ¼à¿Øµç×ÓÉÌÎñÊÐËÁÒÔÀ´£¬£¬£¬£¬£¬£¬ËûÃÇËù¿´µ½µÄ×î´óµÄMagento¹¥»÷¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/magento-stores-hit-by-largest-automated-hacking-attack-since-2015/