·¨ÀÀûÔâµ½ÀÕË÷¹¥»÷µ¼Ö²¿·Ö¿Í»§µÄÏêϸÐÅϢй¶
Ðû²¼Ê±¼ä 2023-03-221¡¢·¨ÀÀûÔâµ½ÀÕË÷¹¥»÷µ¼Ö²¿·Ö¿Í»§µÄÏêϸÐÅϢй¶
¾ÝýÌå3ÔÂ20ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬£¬Òâ´óÀûÅܳµÖÆÔìÉÌ·¨ÀÀûÔâµ½ÀÕË÷¹¥»÷¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ¹¥»÷Õß»ñµÃÁËÆä²¿·ÖITϵͳµÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬£¬¿Í»§ÐÕÃû¡¢µØµãºÍµç»°ºÅÂëµÈÐÅϢй¶¡£¡£¡£¡£¡£¡£·¨ÀÀûÌåÏÖÒѽÓÄɲ½·¥±£»£»£»£»£»£»¤ÊÜÓ°Ïìϵͳ£¬£¬£¬£¬£¬£¬£¬£¬ÇҴ˴ι¥»÷¶Ô¹«Ë¾µÄÔËӪûÓÐÓ°Ïì¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ã»ÓÐ˵Ã÷¹¥»÷±¬·¢µÄʱ¼ä£¬£¬£¬£¬£¬£¬£¬£¬µ«Õâ¿ÉÄÜÓë2022Äê10Ô±¨µÀµÄÀÕË÷¹¥»÷Óйأ¬£¬£¬£¬£¬£¬£¬£¬ÆäʱRansomEXXÉù³ÆÇÔÈ¡ÁË·¨ÀÀûµÄ7 GBÊý¾Ý¡£¡£¡£¡£¡£¡£¾ÝÐÂÎÅÈËÊ¿³Æ£¬£¬£¬£¬£¬£¬£¬£¬×î³õµÄÊê½ðÒªÇóÊÇ100ÍòÃÀÔª¡£¡£¡£¡£¡£¡£·¨ÀÀûÔÚ3ÔÂ20ÈÕµÄÉùÃ÷ÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬²»»á¸¶Êê½ð¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/ferrari-says-ransomware-attack-exposed-customer-data/
2¡¢Ñо¿Ö°Ô±·¢Ã÷Win 11½ØÍ¼¹¤¾ßÒ²ÊÜAcropalypseÎó²îÓ°Ïì
3ÔÂ21ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷Windows 11½ØÍ¼¹¤¾ßÒ²ÊÜAcropalypseÇå¾²Îó²îµÄÓ°Ïì¡£¡£¡£¡£¡£¡£ÉÏÖÜ£¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚGoogle Pixel±ê¼Ç¹¤¾ßÖз¢Ã÷¸ÃÎó²î£¬£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÔʼͼÏñÊý¾Ý×ÝÈ»±»±à¼»ò²Ã¼ôÒ²Äܱ£´æÏÂÀ´¡£¡£¡£¡£¡£¡£Windows 11½ØÍ¼¹¤¾ßÓòüôºóµÄ°æ±¾ÁýÕÖÔʼͼÏñʱ£¬£¬£¬£¬£¬£¬£¬£¬³ÌÐòûÓÐ׼ȷ½Ø¶ÏδʹÓõÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬¶øÊDZ£±£´æIENDÊý¾Ý¿éÖ®ºó¡£¡£¡£¡£¡£¡£ÔÚͼÏñÉó²éÆ÷Öз¿ªÎļþÖ»»áÏÔʾ²Ã¼ôºóµÄͼÏñ£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÊÇδ½Ø¶ÏµÄÊý¾Ý¿ÉÓÃÓÚÖØÐÞÔʼͼÏñ£¬£¬£¬£¬£¬£¬£¬£¬´Ó¶ø¿ÉÄܵ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/windows-11-snipping-tool-privacy-bug-exposes-cropped-image-content/
3¡¢Ñо¿ÍŶÓÏêÊöÀÕË÷Èí¼þCatBʹÓÃMSDTCЧÀ͵ÄÈÆ¹ýÕ½ÂÔ
¾Ý3ÔÂ20ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬£¬Ñо¿ÍŶÓÏêÊöÁËÀÕË÷Èí¼þCatBµÄÈÆ¹ýÕ½ÂÔ¡¢¼ÓÃÜÐÐΪÒÔ¼°ÇÔȡƾ֤ºÍä¯ÀÀÆ÷Êý¾ÝµÄʵÑé¡£¡£¡£¡£¡£¡£CatB£¨Ò²³ÆCatB99ºÍBaxtoy£©ÓÚ2022Äêµ×Ê״α»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬£¬Ëü¿ÉÄÜÊÇÀÕË÷Èí¼þPandoraµÄÑݱä»òÖ±½Ó¸üÃû£¬£¬£¬£¬£¬£¬£¬£¬ºóÕßÖ÷ÒªÕë¶ÔÆû³µÐÐÒµ¡£¡£¡£¡£¡£¡£CatBµÄÖ÷ÒªÌØÕ÷ÊÇͨ¹ýMicrosoftÂþÑÜʽÊÂÎñ´¦Öóͷ£Ðµ÷Æ÷(MSDTC)µÄÕýµ±Ð§ÀÍÐ®ÖÆDLL£¬£¬£¬£¬£¬£¬£¬£¬À´ÌáÈ¡ºÍÆô¶¯ÀÕË÷Èí¼þpayload¡£¡£¡£¡£¡£¡£³ýÁËÎļþ¼ÓÃܺͻìÏýÖ®Í⣬£¬£¬£¬£¬£¬£¬£¬CatB»¹»áʵÑé´ÓÄ¿µÄÏµÍ³ÍøÂçÌØ¶¨µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2023/03/researchers-shed-light-on-catb.html
4¡¢°Ä´óÀûÑÇ˰Îñ¾ÖʹÓõÄÓïÒôʶ±ðϵͳ¿É±»AIºÏ³ÉÉùÒôÈÆ¹ý
¾ÝÎÀ±¨3ÔÂ16ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬£¬£¬CentrelinkºÍ°Ä´óÀûÑÇ˰Îñ¾Ö(ATO)ʹÓõÄÓïÒôʶ±ðϵͳ±£´æÎó²î¡£¡£¡£¡£¡£¡£¼Ì±¨µÀ³Æ¾ÓÉѵÁ·µÄAIºÏ³ÉÉùÒô¿ÉÓÃÓÚ»á¼ûÍâÑóµç»°ÒøÐÐЧÀͺ󣬣¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÉùÎÆÏµÍ³Ò²¿ÉÒÔ±»AIÉùÒôËùÓÕÆ¡£¡£¡£¡£¡£¡£Ò»ÃûÎÀ±¨µÄ¼ÇÕß½öÓÃËÄ·ÖÖÓµÄÒôƵ£¬£¬£¬£¬£¬£¬£¬£¬¾ÍÌìÉúÒ»¸ö×Ô¼ºµÄ¿Ë¡ÉùÒô£¬£¬£¬£¬£¬£¬£¬£¬È»ºó¾ÍÄÜÓÃÕâ¸öÉùÒôÁ¬Ïµ×Ô¼ºµÄ¿Í»§²Î¿¼ºÅÂ룬£¬£¬£¬£¬£¬£¬£¬½øÈëÁËCentrelink×ÔÖúЧÀÍÕË»§¡£¡£¡£¡£¡£¡£ATOµÄ½²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã»ú¹¹ÒѽÓÄɲ½·¥À´±£»£»£»£»£»£»¤ÏµÍ³ÃâÊÜAIÓïÒô¿Ë¡֮ÀàµÄÍþв¡£¡£¡£¡£¡£¡£
https://www.theguardian.com/technology/2023/mar/16/voice-system-used-to-verify-identity-by-centrelink-can-be-fooled-by-ai
5¡¢MandiantÐû²¼¹ØÓÚ2022ÄêÁãÈÕÎó²î¹¥»÷µÄÆÊÎö±¨¸æ
3ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬MandiantÐû²¼Á˹ØÓÚ2022ÄêÁãÈÕÎó²î¹¥»÷µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬£¬2022ÄêÓÐ55¸öÁãÈÕÎó²î±»Ê¹Ó㬣¬£¬£¬£¬£¬£¬£¬Õâ¸öÊý×ÖµÍÓÚ2021ÄêµÄ81¸ö¡£¡£¡£¡£¡£¡£ÓëÍùÄêÒ»Ö£¬£¬£¬£¬£¬£¬£¬£¬´ó²¿·ÖÎó²îÀ´×ÔMicrosoft¡¢GoogleºÍApple²úÆ·£¬£¬£¬£¬£¬£¬£¬£¬±»Ê¹ÓÃ×î¶àµÄ²úÆ·ÀàÐÍÊDzÙ×÷ϵͳ£¨19¸ö£©£¬£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊÇä¯ÀÀÆ÷£¨11¸ö£©ÒÔ¼°Çå¾²¡¢ITºÍÍøÂçÖÎÀí²úÆ·£¨10£©¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÖеĴó´ó¶¼£¨55ÆäÖеÄ53¸ö£©Äܱ»ÓÃÓÚÔÚÄ¿µÄ×°±¸ÉÏÌáÉýȨÏÞ»òÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£¡£¡£¡£
https://www.mandiant.com/resources/blog/zero-days-exploited-2022
6¡¢JumpsecÐû²¼2022ÄêÓ¢¹úÀÕË÷¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ
ýÌå3ÔÂ20Èճƣ¬£¬£¬£¬£¬£¬£¬£¬JumpsecÐû²¼ÁË2022ÄêÓ¢¹úÀÕË÷¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£Óë2021ÄêÏà±È£¬£¬£¬£¬£¬£¬£¬£¬2022ÄêÓ¢¹ú±¨¸æµÄ¹¥»÷×ÜÊýÔöÌíÁË17%¡£¡£¡£¡£¡£¡£Ð·ºÆðµÄSpring4Shell¡¢FollinaºÍProxyNotShellµÈÎó²î¿ÉÄÜ»áÔöÌíÀÕË÷ÍÅ»ï¶Ô×éÖ¯µÄ¹¥»÷¡£¡£¡£¡£¡£¡£Ëæ×ÅContiºÍREvilµÄ½âÌ壬£¬£¬£¬£¬£¬£¬£¬ÐµĹ¥»÷ÕßÔÚÀÕË÷Èí¼þÁìÓò±äµÃÔ½·¢Í»³ö¡£¡£¡£¡£¡£¡£Lockbit¼ÌÐøÁËContiµÄÍ·ÏΣ¬£¬£¬£¬£¬£¬£¬£¬³ÉΪȫÇò×î³£¼ûµÄÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬£¬£¬Õ¼¹¥»÷µÄ52%¡£¡£¡£¡£¡£¡£Êý¾ÝÅú×¢£¬£¬£¬£¬£¬£¬£¬£¬½ÌÓý¡¢Ö´·¨ÒÔ¼°ÁãÊÛºÍÅú·¢ÉÌÒµÐÐÒµÔâµ½µÄ¹¥»÷×î¶à¡£¡£¡£¡£¡£¡£
https://www.jumpsec.com/uk-ransomware-trends-lessons-for-2023/


¾©¹«Íø°²±¸11010802024551ºÅ