¡¾ÍþвÇ鱨¡¿Çå¾²Ñо¿Ö°Ô±·¢Ã÷VIA C3 x86´¦Öóͷ£Æ÷±£´æºóÃÅ»úÖÆ
Çå¾²Ñо¿Ö°Ô±Christopher Domas·¢Ã÷VIA C3 x86´¦Öóͷ£Æ÷Öб£´æºóÃÅ»úÖÆ£¬£¬£¬¿ÉÔÊÐí¹¥»÷Õß´ÓÓû§Ä£Ê½ÌáȨµ½OSÄÚºËģʽ¡£¡£¡£¡£¸Ã´¦Öóͷ£Æ÷ÊÇÓĘ́ÍåVIA Technologies IncÓÚ2001ÄêÖÁ2003Äê¼äÉú²úºÍÏúÊÛµÄCPUϵÁУ¬£¬£¬³£°²ÅÅÔÚPOS»ú¡¢ÖÇÄܵ绰ͤ¡¢ATM¡¢ÓÎÏ·×°±¸¡¢Ò½ÁÆ×°±¸ÒÔ¼°¹¤Òµ×Ô¶¯»¯×°±¸ÉÏ¡£¡£¡£¡£Domas½«¸ÃºóÃÅ»úÖÆ³ÆÎªRosenbridge£¬£¬£¬µ«Ò²ÓÐÑо¿Ö°Ô±ÒÔΪ¸Ã»úÖÆ²¢²»ÊÇÒ»¸öÕæÕýµÄºóÃÅ£¬£¬£¬ÓÉÓÚVIA¹Ù·½ÎĵµÔøÌáµ½¸Ã»úÖÆ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/backdoor-mechanism-discovered-in-via-c3-x86-processors/
¡¾ÍþвÇ鱨¡¿Ñо¿ÍŶÓÌá³öÕë¶ÔAndroid appµÄÐÂÐÍMan-in-the-Disk¹¥»÷
Check PointÑо¿ÍŶӷ¢Ã÷Android appµÄй¥»÷Ãæ£¬£¬£¬ÕâÖÖÃûΪMan-in-the-DiskµÄ¹¥»÷³¡¾°ÔÊÐí¹¥»÷Õß»á¼ûºÍ¸Ä¶¯Íⲿ´æ´¢ÉϵÄÊý¾Ý¡£¡£¡£¡£Man-in-the-Disk¹¥»÷»ùÓÚÁ½¸öÊÂʵ£¬£¬£¬Ê×ÏÈ£¬£¬£¬ÈκÎÓ¦Óö¼¿ÉÒԸ͝ÆäËüÓ¦ÓõÄÍⲿ´æ´¢Êý¾Ý£¬£¬£¬Æä´Î£¬£¬£¬ÓÉÓÚÏÕЩËùÓÐapp¶¼ÒªÇó´ËȨÏÞ£¬£¬£¬Óû§Í¨³£»£»£»£»£»á²»¼ÓÏÓÒɵظøÓè´ËȨÏÞ¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖËûÃÇ¿ÉÒÔÖ´ÐÐÁ½ÖÖÀàÐ͵Ĺ¥»÷£¬£¬£¬Ê¹ÆäËüapp±ÀÀ£»£»£»£»£»ò½«ÆäËüapp¸üÐÂΪ¶ñÒâ°æ±¾¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://blog.checkpoint.com/2018/08/12/man-in-the-disk-a-new-attack-surface-for-android-apps/
¡¾Îó²î²¹¶¡¡¿Oracle¿ª·¢ÍŶÓÐû²¼Çå¾²¸üУ¬£¬£¬ÐÞ¸´¸ßΣÎó²î£¨CVE-2018-3110£©
OracleÐÞ¸´ÆäÊý¾Ý¿â²úÆ·ÖеÄÒ»¸ö¸ßΣÎó²î£¨CVE-2018-3110£©£¬£¬£¬¾ÓÉÔ¶³ÌÉí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉʹÓøÃÎó²î½ÓÊÜÊý¾Ý¿â²¢½¨Éè¶Ôµ×²ãЧÀÍÆ÷µÄshell»á¼û¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚOracle Database ServerµÄJava VM×é¼þÖУ¬£¬£¬ÊÜÓ°ÏìµÄ°æ±¾°üÀ¨WindowsÉϵÄ11.2.0.4¡¢12.2.0.1ºÍ12.1.0.2ÒÔ¼°Unix»òLinuxÉϵÄ12.1.0.2¡£¡£¡£¡£½¨ÒéÓû§¾¡¿ì¾ÙÐиüС£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75310/hacking/cve-2018-3110-oracle-database.html
¡¾Îó²î²¹¶¡¡¿Ñо¿Ö°Ô±Åû¶macOSÖеÄÐÂ0 day£¬£¬£¬¿Éͨ¹ýÄ£ÄâÊó±êµã»÷¼ÓÔØÄÚºËÀ©Õ¹
Digita SecurityÑо¿Ö°Ô±Patrick Wardle·¢Ã÷macOSÖеÄÒ»¸öÁãÈÕÎó²î£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÄ£ÄâÊó±êµã»÷ÈÆ¹ýϵͳµÄÇå¾²»úÖÆ£¬£¬£¬¼ÓÔØÏµÍ³ÄÚºËÀ©Õ¹¡£¡£¡£¡£Æ»¹ûÔÚHigh SierraÖÐÍÆ³ö¡°Óû§Åú×¼ÄÚºËÀ©Õ¹¼ÓÔØ¡±µÄÈ«ÐÂÇå¾²¹¦Ð§À´ÔöÇ¿macOSµÄÇå¾²ÐÔ£¬£¬£¬¸Ã¹¦Ð§ÒªÇóÓû§ÔÚÇå¾²ÉèÖýçÃæÊÖ¶¯µã»÷¡°ÔÊÐí¡±°´Å¥À´Åú×¼¼ÓÔØÈκÎÄÚºËÀ©Õ¹¡£¡£¡£¡£µ«Patrick·¢Ã÷Á½´Î¡°°´Ï¡±Êó±ê°´Å¥µÄÊÂÎñ»á±»ÏµÍ³Îóʶ±ðΪ¡°°´Ï¡±ºÍ¡°ËÉ¿ª¡±ÕâÒ»ÍêÕûµÄµã»÷²Ù×÷£¬£¬£¬´Ó¶øÍ»ÆÆÆäÇå¾²»úÖÆ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securityaffairs.co/wordpress/75293/hacking/synthetic-mouse-click-attack.html
¡¾Îó²î²¹¶¡¡¿Ë¼¿ÆÐû²¼IOSºÍIOS XEµÄÇå¾²¸üУ¬£¬£¬ÐÞ¸´Õë¶ÔIKEÐÒéµÄÎó²î
˼¿ÆÐÞ¸´ÁËÆäIOSºÍIOS XEÖеÄÇå¾²Îó²î£¨CVE-2018-0131£©£¬£¬£¬¸ÃÎó²îÊÇÕë¶ÔIKE£¨InternetÃÜÔ¿½»Á÷£©ÐÒéµÄÐÂBleichenbacher oracle¼ÓÃܹ¥»÷µÄËĸöÎó²îÖ®Ò»£¬£¬£¬ÆäÓàÈý¸öÎó²îÊÇ»ªÎª£¨CVE-2017-17305£©¡¢Clavister£¨CVE-2018-8753£©ºÍZyXEL£¨CVE-2018-9129£©¡£¡£¡£¡£Æ¾Ö¤Ë¼¿ÆµÄ˵·¨£¬£¬£¬¸ÃÎó²îÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß»ñÈ¡IKEv1»á»°µÄ¼ÓÃÜËæ»úÊý£¬£¬£¬½ø¶ø»Ö¸´Í¨¹ýIPsec·¢Ë͵ÄÊý¾Ý¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/cisco-patches-its-operating-systems-against-new-ike-crypto-attack/
¡¾¶ñÒâÈí¼þ¡¿Çå¾²Ñо¿ÍŶÓÐû²¼¹ØÓÚÀÕË÷Èí¼þKeyPassµÄÆÊÎö±¨¸æ
¿¨°Í˹»ùʵÑéÊÒÐû²¼¹ØÓÚÀÕË÷Èí¼þKeyPassµÄÆÊÎö±¨¸æ£¬£¬£¬¸ÃÀÕË÷Èí¼þÔÚ8ÔÂ·ÝÆð¾¢¾ÙÐÐÈö²¥¡£¡£¡£¡£¸ÃÑù±¾Ê¹ÓÃC++±àд£¬£¬£¬²¢Í¨¹ýMS Visual Studio¾ÙÐбàÒ룬£¬£¬ÆäʹÓÃÁËÀà¿âMFC¡¢BoostºÍCrypto ++£¬£¬£¬Ñù±¾µÄPEÍ·ÖаüÀ¨ÁË×î½üµÄ±àÒëÈÕÆÚ¡£¡£¡£¡£Ã¿Ò»¸ö¼ÓÃܵÄÎļþ¶¼»á±»Ìí¼Ó.KEYPASSÀ©Õ¹Ãû¡£¡£¡£¡£Æä¼ÓÃÜËã·¨ÊÇAES-256£¬£¬£¬Ê¹ÓÃCFBģʽ²¢ÇÒIVΪ0£¬£¬£¬ËùÓÐÎļþµÄ¼ÓÃÜÃÜÔ¿¶¼ÎªÏàͬµÄ32×Ö½ÚÃÜÔ¿¡£¡£¡£¡£ÆäÓëC£¦CЧÀÍÆ÷µÄͨѶÊÇͨ¹ýHTTPÒÔJSONµÄÐÎʽ´«ÊäµÄ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securelist.com/keypass-ransomware/87412/