Apple½ôÆÈ¸üÐÂÐÞ¸´Òѱ»Ê¹ÓõÄÎó²îCVE-2023-37450
Ðû²¼Ê±¼ä 2023-07-111¡¢Apple½ôÆÈ¸üÐÂÐÞ¸´Òѱ»Ê¹ÓõÄÎó²îCVE-2023-37450
¾ÝýÌå7ÔÂ10ÈÕ±¨µÀ£¬£¬£¬£¬£¬AppleÐû²¼ÁËÐÂÒ»ÂÖ¿ìËÙÇå¾²ÏìÓ¦(RSR)¸üУ¬£¬£¬£¬£¬ÒÔÐÞ¸´ÔÚ¹¥»÷Öб»Ê¹ÓõÄÎó²î£¨CVE-2023-37450£©¡£¡£¡£¡£¡£¸ÃÎó²îÊÇÔÚWebKitä¯ÀÀÆ÷ÒýÇæÖз¢Ã÷µÄ£¬£¬£¬£¬£¬Ó°ÏìÁËmacOS¡¢iOSºÍiPadOS¡£¡£¡£¡£¡£¹¥»÷Õß¿Éͨ¹ýÓÕÆÄ¿µÄ·¿ª°üÀ¨¶ñÒâÖÆ×÷ÄÚÈݵÄÍøÒ³£¬£¬£¬£¬£¬ÔÚÄ¿µÄ×°±¸ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£AppleÌåÏÖÒÑͨ¹ýˢмì²éÀ´ÐÞ¸´¸ÃÎó²î£¬£¬£¬£¬£¬½¨ÒéËùÓÐÓû§Ó¦Óøò¹¶¡¡£¡£¡£¡£¡£ÕâÊÇ×Ô2023ÄêÍ·ÒÔÀ´£¬£¬£¬£¬£¬AppleÐÞ¸´µÄµÚÊ®¸öÁãÈÕÎó²î¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/apple/apple-releases-emergency-update-to-fix-zero-day-exploited-in-attacks/
2¡¢ÃÀ¹ú·ÒëЧÀÍKings of Translationй¶ÊýÍòÌõ¼Í¼
¾Ý7ÔÂ7ÈÕ±¨µÀ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸ö²»ÊÜÃÜÂë±£»£»£»£»£»£»£»£»¤µÄÊý¾Ý¿â£¬£¬£¬£¬£¬ÆäÖаüÀ¨Áè¼Ý25000Ìõ¼Í¼¡£¡£¡£¡£¡£Í¨¹ýÆäÖеIJο¼×ÊÁϺͷ¢Æ±£¬£¬£¬£¬£¬Ñо¿Ö°Ô±È·¶¨¸ÃÊý¾Ý¿âÊôÓÚŦԼ·ÒëЧÀÍÌṩÉÌKings of Translation¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨Ô´´úÂë½ØÍ¼ºÍ¿Í»§ÉÏ´«µÄÎĵµ£¬£¬£¬£¬£¬ÀýÈç˰ÎñÉ걨¡¢»¤ÕÕ¡¢¼ÝʻִÕÕ¡¢³öÉúºÍ»éÒö¼Í¼¡¢ÉÌÒµÎļþºÍǩ֤ÉêÇëµÈ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿âÒѱ»±£»£»£»£»£»£»£»£»¤ÆðÀ´£¬£¬£¬£¬£¬Éв»ÇåÎúÔÚ´Ë֮ǰÒÑ̻¶Á˶à¾Ã¡£¡£¡£¡£¡£
https://www.hackread.com/global-translation-service-exposed-records/
3¡¢ºÚ¿ÍÉù³ÆÒÑÇÔÈ¡RazerµÄÔ´ÂëºÍÃÜÔ¿µÈÊý¾Ý²¢ÔÚ°µÍø³öÊÛ
ýÌå7ÔÂ8Èճƣ¬£¬£¬£¬£¬ºÚ¿ÍÔÚ°µÍøÒÔ10ÍòÃÀÔªµÄ¼ÛÇ®³öÊÛRazerµÄÊý¾Ý¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÌû×ÓÖÐÌáµ½£¬£¬£¬£¬£¬ËûÇÔÈ¡ÁËrazer.com¼°Æä²úÆ·µÄÔ´´úÂë¡¢¼ÓÃÜÃÜÔ¿¡¢Êý¾Ý¿âºÍºó¶Ë»á¼ûµÇ¼µÈÐÅÏ¢£¬£¬£¬£¬£¬²¢ÌåÏÖ¸ÃÊý¾Ý¿âÖ»»á³öÊÛÒ»´Î¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Âô¼Ò¼á³ÖʹÓÃÖÐÐÄÈË£¬£¬£¬£¬£¬Õâͨ³£ÊǶÔÂò¼ÒºÍÂô¼ÒµÄ±£»£»£»£»£»£»£»£»¤ºÍ°ü¹Ü£¬£¬£¬£¬£¬¼´Õâ²»ÊÇÒ»¸öȦÌס£¡£¡£¡£¡£Ö¤Êµ°üÀ¨³¤´ï580Ò³µÄÎļþÊ÷ÒÔ¼°²î±ðĿ¼ÏÂÎļþ¼ÐµÄ½ØÆÁ¡£¡£¡£¡£¡£RazerÉÐδ¶Ô´ËÊÂ×ö³ö»Ø¸´¡£¡£¡£¡£¡£
https://www.databreaches.net/intellectual-property-allegedly-from-razer-appears-for-sale-on-hacking-forum/
4¡¢MOVEitÐÞ¸´ÓÖÒ»¸öSQL×¢ÈëÎó²îCVE-2023-36934
7ÔÂ7ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬ProgressÔÚÆä²úÆ·MOVEit TransferÖÐÓÖ·¢Ã÷ÁËÒ»¸öÑÏÖØµÄSQL×¢ÈëÎó²î£¨CVE-2023-36934£©¡£¡£¡£¡£¡£Ê¹ÓôËÎó²î£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÏòMOVEit TransferÓ¦ÓÃÌá½»ÌØÖÆµÄpayload£¬£¬£¬£¬£¬À´µ¼ÖÂMOVEitÊý¾Ý¿âÄÚÈݸ͝ºÍй¶¡£¡£¡£¡£¡£Çå¾²¸üл¹ÐÞ¸´ÁËSQL×¢ÈëÎó²î£¨CVE-2023-36932£©ºÍ¿Éµ¼Ö³ÌÐòÒâÍâÖÕÖ¹µÄÎó²î£¨CVE-2023-36933£©¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ProgressÒѾöÒéÍÆ³öÿÔÂÐû²¼µÄ°´ÆÚÇå¾²¸üУ¬£¬£¬£¬£¬³ÆÎª"Service Packs"¡£¡£¡£¡£¡£Õâ¿ÉÒÔ¼ò»¯Èí¼þÉý¼¶Àú³Ì£¬£¬£¬£¬£¬Ê¹ÖÎÀíÔ±Äܹ»¸ü¿ì¸üÇáËɵØÓ¦ÓÃÐÞ¸´³ÌÐò¡£¡£¡£¡£¡£
https://securityaffairs.com/148252/security/moveit-transfer-critical-flaw.html
5¡¢Ñо¿Ö°Ô±Åû¶Õë¶Ôº«¹úµÄÓïÒô´¹ÂÚ¹¤¾ß¼¯Letscall
ThreatFabricÔÚ7ÔÂ7ÈÕÅû¶ÁËȫеÄÓïÒô´¹ÂÚ¹¤¾ß¼¯Letscall¡£¡£¡£¡£¡£´Ë´Î¹¥»÷»î¶¯Ö÷ÒªÕë¶Ôº«¹úµÄÓû§£¬£¬£¬£¬£¬½ÓÄɶà½×¶Î¹¥»÷À´ÓÕʹĿµÄ´Óð³äGoogle PlayÊÐËÁµÄ´¹ÂÚÍøÕ¾ÏÂÔØ¶ñÒâÓ¦Óᣡ£¡£¡£¡£Ò»µ©×°ÖÃÁ˶ñÒâÈí¼þ£¬£¬£¬£¬£¬Ëü¾Í»áδÀ´µçÖØ¶¨Ïòµ½¹¥»÷Õߵĺô½ÐÖÐÐÄ¡£¡£¡£¡£¡£¾ÓÉѵÁ·µÄÔËÓªÖ°Ô±»áð³äÒøÐÐÔ±¹¤£¬£¬£¬£¬£¬È»ºó´ÓºÁÎÞ½äÐĵÄÄ¿µÄÄÇÀï»ñÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£ÎªÁËÀû±ãÓïÒôÁ÷Á¿µÄ·ÓÉ£¬£¬£¬£¬£¬LetscallʹÓÃÁËVOIPºÍWebRTCµÈÊÖÒÕ£¬£¬£¬£¬£¬»¹Ê¹ÓÃÁËSTUNºÍTURNÐÒé¡£¡£¡£¡£¡£
https://www.threatfabric.com/blogs/letscall-new-sophisticated-vishing-toolset
6¡¢ESET¼òÊöEmotet×Ô2021Äê11Ô»عéÒÔÀ´µÄ¹¥»÷»î¶¯
7ÔÂ6ÈÕ£¬£¬£¬£¬£¬ESET¼òÊöÁËEmotet×Ô2021Äê11Ô»عéÒÔÀ´µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£2021Äê1Ô£¬£¬£¬£¬£¬ÔÚ¶à¸ö¹ú¼ÒÖ´·¨²¿·ÖµÄе÷ÏÂÀֳɵ·»ÙÁËEmotet£¬£¬£¬£¬£¬µ«ºóÕßÔÚ2021Äê11ÔÂÔٴλع顣¡£¡£¡£¡£2022ÄêÍ·£¬£¬£¬£¬£¬EmotetÖ´ÐÐÁ˶à¸öÀ¬»øÓʼþ»î¶¯¡£¡£¡£¡£¡£2022Äê7Ô£¬£¬£¬£¬£¬Î¢Èí½ûÓÃVBAºêµ¼ÖÂEmotet»î¶¯ÏÔ×ÅϽµ¡£¡£¡£¡£¡£2023Ä꣬£¬£¬£¬£¬Emotet¿ªÕ¹ÁËÈý´Î¹¥»÷»î¶¯£¬£¬£¬£¬£¬Ê¹ÓÃÁËǶÈë¶ñÒâVBAºêµÄWordÎļþºÍǶÈëVBScriptµÄOneNoteÎļþµÈ¡£¡£¡£¡£¡£ÕâЩ¹¥»÷´ó¶àÕë¶ÔÈÕ±¾(43%)ºÍÒâ´óÀû(13%)¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬ÏÖÔÚEmotet²»»îÔ¾£¬£¬£¬£¬£¬ºÜ¿ÉÄÜÊÇÓÉÓÚδÄÜÕÒµ½ÓÐÓõÄй¥»÷ÔØÌå¡£¡£¡£¡£¡£
https://www.welivesecurity.com/2023/07/06/whats-up-with-emotet/


¾©¹«Íø°²±¸11010802024551ºÅ