CISAÐû²¼2019²ÆÄêΣº¦Îó²îÆÀ¹ÀµÄÐÅϢͼ£»£»£»QNAPÐÞ¸´HelpdeskÖеÄÎó²î£¬£¬£¬¿Éµ¼ÖÂNAS×°±¸½ÓÊÜ
Ðû²¼Ê±¼ä 2020-10-09
ÍøÂçÇå¾²ºÍÐÅÏ¢Çå¾²»ú¹¹(CISA)Ðû²¼ÁË2019²ÆÄê¾ÙÐеÄ44ÏîΣº¦ºÍÎó²îÆÀ¹À£¨RVA£©£¬£¬£¬ÒÔ¼°MITER¶Ô¿¹Õ½ÂÔ¡¢ÊÖÒÕºÍ֪ʶ£¨ATT£¦CK£©¿ò¼ÜµÄÆÊÎöÐÅϢͼ¡£¡£¡£¡£¸ÃÐÅϢͼ±íÈ·¶¨ÁËCISAÔÚ¿ç¶à¸ö²¿·ÖµÄRVAsʱ´úÊӲ쵽µÄͨÀýÀֳɹ¥»÷·¾¶£¬£¬£¬ÍøÂç¹¥»÷Õß¿ÉÒÔʹÓÃÕâЩ¹¥»÷;¾¶À´¹¥»÷×éÖ¯¡£¡£¡£¡£CISAÃãÀøÍøÂçÖÎÀíÔ±ºÍITרҵְԱÉó²éÐÅϢͼ²¢Ó¦ÓÃÍÆ¼öµÄ·ÀÓùÕ½ÂÔ£¬£¬£¬ÒÔ±ÜÃâÊܵ½ÒÑÖªÕ½ÊõºÍÊÖÒյĹ¥»÷¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/10/07/cisa-releases-fy2019-risk-vulnerability-assessment-infographic
2.Çå¾²¹«Ë¾Arctic WolfÐû²¼Çå¾²ÔËÓªÄê¶È±¨¸æ

Çå¾²¹«Ë¾Arctic WolfÐû²¼ÁËÒ»·ÝÇå¾²ÔËÓªÄê¶È±¨¸æ¡£¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬×Ô3ÔÂÒÔÀ´£¬£¬£¬°µÍøÉϹûÕæµÄ¹«Ë¾Æ¾Ö¤ÊýÄ¿ÔöÌíÁË429£¥¡£¡£¡£¡£ÔÚÊӲ쵽µÄ¸ßΣº¦Çå¾²ÊÂÎñÖУ¬£¬£¬ÓÐ35£¥±¬·¢ÔÚ8:00 PMºÍ8:00 AMÖ®¼ä£¬£¬£¬¶ø14£¥±¬·¢ÔÚÖÜÄ©£¬£¬£¬ÕâÊÇÐí¶àÄÚ²¿Çå¾²ÍŶӲ»ÔÚÏßµÄʱ¼ä¡£¡£¡£¡£±ðµÄ£¬£¬£¬ÍøÂç´¹ÂÚºÍÀÕË÷Èí¼þ¹¥»÷´ÎÊýÔöÌíÁË64£¥£¬£¬£¬ºÚ¿Í¸ü¶àµÄÒÔCOVID-19Ö÷ÌâΪÓÕ¶ü£¬£¬£¬À´Õë¶ÔÔ¶³ÌÊÂÇéÕß¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://arcticwolf.com/resources/analyst-reports/security-operations-annual-report
3.GoogleÐû²¼µÄChromeÇå¾²¸üÐÂÐÞ¸´¶à¸öÎó²î

GoogleÐû²¼µÄChromeÇå¾²¸üÐÂÕë¶ÔWindows¡¢MacºÍLinux°æ±¾ÐÞ¸´ÁË35¸öÎó²î¡£¡£¡£¡£ÆäÖнÏΪÑÏÖØµÄÎó²îΪ֧¸¶ÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-15967£©£¬£¬£¬Æä´ÎΪBlink¡¢WebRTC¡¢NFC¡¢´òÓ¡¡¢ÒôƵ¡¢×Ô¶¯Ìî³äºÍÃÜÂëÖÎÀíÆ÷ÖеÄÊͷźóʹÓÃÎó²î£¨CVE-2020-15968¡¢CVE-2020-15969¡¢CVE-2020-15970¡¢CVE-2020-15971¡¢CVE-2020-15972¡¢CVE-2020-15990ºÍCVE-2020-15991£©¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/10/07/google-releases-security-updates-chrome
4.QNAPÐÞ¸´HelpdeskÖеÄÎó²î£¬£¬£¬¿Éµ¼ÖÂNAS×°±¸½ÓÊÜ

QNAPÐÞ¸´ÁËHelpdeskÓ¦ÓÃÖеÄÁ½¸ö½ÏΪÑÏÖØµÄÎó²î£¬£¬£¬ÕâЩÎó²î¿É±»¹¥»÷ÕßʹÓýÓÊÜQNAPÍøÂçÅþÁ¬´æ´¢£¨NAS£©×°±¸¡£¡£¡£¡£´Ë´ÎÐÞ¸´Á½¸öÎó²î¾ùΪ²»Êʵ±µÄ»á¼û¿ØÖÆÎó²î£¬£¬£¬±»¸ú×ÙΪCVE-2020-2506ºÍCVE-2020-2507£¬£¬£¬¹¥»÷ÕßÀÖ³ÉʹÓúó¿É»ñµÃ¶ÔQNAP×°±¸µÄ¿ØÖÆ¡£¡£¡£¡£QNAPÌåÏÖ£¬£¬£¬ÆäÒÑÐÞ¸´ÁËHelpdesk 3.0.3¼°¸ü¸ß°æ±¾µÄÎó²î£¬£¬£¬Ë¼Á¿µ½Îó²îµÄÑÏÖØË®Æ½£¬£¬£¬Óû§Ó¦¸Ã¾¡¿ì½«¸ÃÓ¦ÓóÌÐòÉý¼¶µ½×îа汾¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/qnap-fixes-critical-flaws-that-could-lead-to-device-takeover/
5.ºÚ¿ÍÒÔÌØÀÊÆÕ¿µ½¡ÐÅϢΪÓÕ¶ü¾ÙÐд¹ÂÚ¹¥»÷

ÍøÂçÇå¾²¹«Ë¾ProofPointµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬ºÚ¿ÍÒÔÌØÀÊÆÕ¿µ½¡ÐÅϢΪÓÕ¶üÌᳫеÄÍøÂç´¹Âڻ¡£¡£¡£¡£ºÚ¿Í»Ñ³ÆËûÃÇÓÐÌØÀÊÆÕ¿µ½¡ÇéÐεÄ×îÐÂÄÚ²¿ÐÅÏ¢£¬£¬£¬µ«ÒªÇóÓû§Ê¹ÓÃǶÈëʽÁ´½ÓÏÂÔØÎĵµ¡£¡£¡£¡£Êܺ¦È˵ã»÷Á´½Óºó£¬£¬£¬»á±»Öض¨Ïòµ½Ò»¸öGoogleÎĵµ£¬£¬£¬²¢Åú×¢¸ÃÎĵµÒÑͨ¹ýGoogleɨÃè²¢ÇÒÊÇÇå¾²µÄ¡£¡£¡£¡£Óû§Æ¾Ö¤ÌáÐѵã»÷ÏÂÔØÁ´½Óºó£¬£¬£¬½«ÏÂÔØBazarLoader¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£×îÖÕ£¬£¬£¬¹¥»÷Õß»áÔÚÊÜѬȾϵͳÖÐ×°ÖÃRyukÀÕË÷Èí¼þ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/phishing-emails-lure-victims-with-inside-info-on-trumps-health/
6.ºÚ¿Í¿ÉʹÓÃComcastµçÊÓÒ£¿£¿£¿£¿ØÆ÷ÇÔÌýÓû§¶Ô»°

GuardicoreµÄÑо¿Ö°Ô±¶ÔComcastµÄXR11 Xfinity Voice Remote¾ÙÐÐÁËÆÊÎö£¬£¬£¬·¢Ã÷ÁËÒ»ÖÖÎÞÐèÎïÆÊÎö¼û»òÓû§½»»¥¼´¿É½«Æäת±äΪ¼àÌý×°±¸µÄÒªÁ죬£¬£¬±»³ÆÎªWarezThe Remote¹¥»÷¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬ÈÏÕæ¼ÓÃÜͨѶµÄRF4CE£¨ÏûºÄµç×ÓÉ䯵£©ÐÒéµÄʵÑé±£´æÎó²î¡£¡£¡£¡£Æäͨ¹ý¶ÔÒ£¿£¿£¿£¿ØÆ÷µÄ¹Ì¼þ¾ÙÐÐÄæÏò¹¤³ÌÕÒµ½ÁËÓïÒôÂ¼ÖÆ°´Å¥µÄ´úÂ룬£¬£¬ÔÚÐ޸ĴúÂëºó»áÿ·ÖÖÓÌᳫһ´Î¼ÒôÇëÇ󣬣¬£¬²¢»áÔÚÔ޳ɺóÂ¼ÖÆ10·ÖÖÓ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/comcast-cable-remotes-hacked-to-snoop-on-conversations/


¾©¹«Íø°²±¸11010802024551ºÅ