Ó¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©Ðû²¼Îó²îÅû¶ָÄÏ£»£»£»£»£»£»BlindSide¹¥»÷¿ÉʹÓÃCPUµÄÍÆ²âÖ´Ðй¦Ð§ÈƹýASLR
Ðû²¼Ê±¼ä 2020-09-161.Ó¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©Ðû²¼Îó²îÅû¶ָÄÏ

Ó¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©Ðû²¼ÁËÎó²îÅû¶ָÄÏ£¬£¬£¬£¬£¬ÒÔ×ÊÖú¹«Ë¾ÊµÑéÎó²îÅû¶Á÷³Ì»òÔÚÒѾ½¨ÉèÎó²îÅû¶Á÷³ÌµÄÇéÐÎÏÂ¶ÔÆä¾ÙÐÐˢС£¡£¡£¡£¡£NCSCÌåÏÖ£¬£¬£¬£¬£¬¸ÃÖ¸Äϲ¢²»ÊÇÒ»¸öÎó²îÅû¶µÄ¹æÔòÊֲᣬ£¬£¬£¬£¬¶øÊÇΪ¸üºÃµÄʵÑéÌṩÁËÐëÒªµÄÐÅÏ¢¡£¡£¡£¡£¡£ÆäÖ÷Òª·ÖΪÈý¸öÖ÷Òª²¿·Ö£¬£¬£¬£¬£¬ÐÎòÁËÔõÑù½«ÍⲿÎó²îÐÅÏ¢¶¨Ïò¸øºÏÊʵÄÈË£¬£¬£¬£¬£¬ÒÔ¼°±¨¸æÐè×ñÕչرÕÎó²îµÄ¿ò¼Ü±ê×¼¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/uk-government-releases-toolkit-to-easily-disclose-vulnerabilities/
2.Aqua SecurityÐû²¼2020ÄêCloud Native Threat±¨¸æ

Aqua Security¸ú×Ù²¢ÆÊÎöÁË2019Äê6ÔÂÖÁ2020Äê7ÔÂÖ®¼äµÄ16371Æð¹¥»÷£¬£¬£¬£¬£¬Ðû²¼ÁË2020ÄêCloud Native Threat±¨¸æ¡£¡£¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬£¬½ñÄêÄêÍ·Õë¶ÔÔÆÏµÍ³µÄ¹¥»÷ÔÚ¼¤Ôö£¬£¬£¬£¬£¬Ïà±ÈÉÏÒ»ÄêÔöÌíÁË250£¥¡£¡£¡£¡£¡£ÔÚÕâЩ¹¥»÷ʱ´ú£¬£¬£¬£¬£¬ºÚ¿ÍÊÔͼ»ñµÃ¶ÔÃÛ¹ÞЧÀÍÆ÷µÄ¿ØÖÆÈ¨£¬£¬£¬£¬£¬È»ºóÏÂÔØ²¢°²ÅŶñÒâÈÝÆ÷¾µÏñ¡£¡£¡£¡£¡£AquaÌåÏÖ£¬£¬£¬£¬£¬ÕâЩ¾µÏñÖÐÓÐ95£¥ÊÇÕë¶ÔÍÚ¿ó¼ÓÃÜÇ®±ÒµÄ£¬£¬£¬£¬£¬¶øÆäÓàÔòÓÃÓÚÉèÖÃDDoS»ù´¡ÉèÊ©¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/vast-majority-of-cyber-attacks-on-cloud-servers-aim-to-mine-cryptocurrency/
3.BlindSide¹¥»÷¿ÉʹÓÃCPUµÄÍÆ²âÖ´Ðй¦Ð§ÈƹýASLR

ËÕÀèÊÀÁª°îÀí¹¤Ñ§ÔºµÈ´óѧµÄÑо¿Ö°Ô±·¢Ã÷ÁËеÄBlindSide¹¥»÷·½·¨£¬£¬£¬£¬£¬Æä¿ÉʹÓÃCPUµÄÍÆ²âÖ´Ðй¦Ð§ÈƹýASLR¡£¡£¡£¡£¡£ÍƲâÖ´ÐÐÊÇÏÖ´ú´¦Öóͷ£Æ÷µÄÒ»ÖÖÌá¸ßÐÔÄܵĹ¦Ð§£¬£¬£¬£¬£¬BlindSide¿ÉÒÔʹÓÃÈí¼þÓ¦ÓóÌÐòÖеÄÎó²î£¬£¬£¬£¬£¬²¢ÔÚÍÆ²âÖ´ÐÐÓòÖÐÖØ¸´Ê¹ÓøÃÎó²î£¬£¬£¬£¬£¬Öظ´Ì½²âÄڴ棬£¬£¬£¬£¬Ö±µ½¹¥»÷ÕßÈÆ¹ýASLR¡£¡£¡£¡£¡£ÓÉÓڴ˹¥»÷±¬·¢ÔÚÍÆ²âÖ´ÐеĹæÄ£ÄÚ£¬£¬£¬£¬£¬Òò´ËËùÓÐʧ°ÜµÄ̽²â¶¼»á±»ÑïÆú£¬£¬£¬£¬£¬²¢²»»áÓ°ÏìCPU»òÆäÎȹÌÐÔ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/new-blindside-attack-uses-speculative-execution-to-bypass-aslr/
4.FBIÖÒÑÔÕë¶Ô½ðÈÚ»ú¹¹µÄƾ֤Ìî³ä¹¥»÷µÄÊýÄ¿¼¤Ôö

Áª°îÊÓ²ì¾Ö£¨FBI£©ÖÒÑÔÕë¶Ô½ðÈÚ»ú¹¹µÄƾ֤Ìî³ä¹¥»÷µÄÊýÄ¿¼¤Ôö¡£¡£¡£¡£¡£Æ¾Ö¤Ìî³äÊÇÏà¶Ô½ÏеÄÊõÓ£¬£¬£¬£¬ÔçÏȺڿÍֻʹÓÃÕâÀ๥»÷Õë¶ÔÔÚÏßÓÎÏ·ºÍʳÎï¶©¹ºÕÊ»§¡£¡£¡£¡£¡£¿ÉÊÇËæ×ÅÕâÖÖÕ½ÂÔµÄÀֳɣ¬£¬£¬£¬£¬¸ü¶àºÚ¿Í×é֯ת¶øÕë¶ÔÔÚÏßÒøÐÐЧÀͺͼÓÃÜÇ®±ÒÉúÒâËù£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡½ðÈÚ×ʲú¡£¡£¡£¡£¡£FBIÌåÏÖ£¬£¬£¬£¬£¬×Ô2017ÄêÒÔÀ´£¬£¬£¬£¬£¬ÆäÊÕµ½Á˽ü5ÍòÆðÕë¶ÔÃÀ¹ú½ðÈÚ»ú¹¹µÄƾ֤Ìî³ä¹¥»÷µ¼ÖµÄÕÊ»§ÐÅϢй¶ÊÂÎñµÄ±¨¸æ£¬£¬£¬£¬£¬Êܺ¦Õß°üÀ¨ÒøÐС¢½ðÈÚЧÀÍÌṩÉÌ¡¢°ü¹Ü¹«Ë¾ºÍͶ×ʹ«Ë¾¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/fbi-says-credential-stuffing-attacks-are-behind-some-recent-bank-hacks/
5.Staples¹«Ë¾Ôâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬¿Í»§¶©µ¥Êý¾Ýй¶

°ì¹«ÁãÊÛ¹«Ë¾Staples·¢³öÁËÊý¾Ýй¶֪ͨÊ飬£¬£¬£¬£¬ÉùÃ÷Æä9ÔÂ2ÈÕ×óÓÒÔâµ½Á˺ڿ͹¥»÷£¬£¬£¬£¬£¬µ¼Ö¿ͻ§¶©µ¥Êý¾Ýй¶¡£¡£¡£¡£¡£¸ÃÊÂÎñй¶µÄÐÅÏ¢°üÀ¨¿Í»§µÄÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢ÐÅÓÿ¨ºÅºóËÄλ¡¢²úÆ·±¾Ç®¡¢½»»õºÍ¶©¹ºµÄ²úÆ·¡£¡£¡£¡£¡£Æ¾Ö¤Í¨Öª£¬£¬£¬£¬£¬²¢Ã»ÓÐÃô¸ÐÊý¾Ý±»Ð¹Â¶£¬£¬£¬£¬£¬°üÀ¨ÕÊ»§Æ¾Ö¤ºÍÍêÕûµÄÖ§¸¶¿¨Êý¾Ý¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/108271/data-breach/staples-data-breach.html
6.ºÚ¿ÍÈëÇÖÃÀ¹úÍËÎéÎäÊ¿ÊÂÎñ²¿£¬£¬£¬£¬£¬ÇÔÈ¡4.6ÍòÎäÊ¿ÐÅÏ¢

ÍËÎéÎäÊ¿ÊÂÎñ²¿£¨VA£©ÌåÏÖ£¬£¬£¬£¬£¬ÓÐδ¾ÊÚȨµÄÓû§»á¼ûÁËÓÉVA½ðÈÚЧÀÍÖÐÐÄ£¨FSC£©ÖÎÀíµÄÔÚÏßÓ¦ÓóÌÐò£¬£¬£¬£¬£¬»ñÈ¡ÁËԼĪ46000ÃûÍËÎéÎäÊ¿µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¸¥¼ªÄáÑÇÖÝÌåÏÖ£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬£¬²¢Ê¹ÓÃÉí·ÝÑéÖ¤ÐÒéÀ´»á¼ûFSCÓ¦ÓóÌÐò£¬£¬£¬£¬£¬È»ºó×ªÒÆÁËÍËÎéÎäÊ¿ÖÎÀí¾ÖÔ±¾ÍýÏëÖ§¸¶¸øÒ½ÁƱ£½¡ÌṩÉÌÓÃÓÚÃÀ¹úÍËÎéÎäÊ¿µÄÒ½ÁƵĿî×Ó¡£¡£¡£¡£¡£Ö»¹Ü¹ÙÔ±ÃÇÈÔÔÚÊÓ²ìÕâÆðÊÂÎñ£¬£¬£¬£¬£¬µ«VAÒÔΪ£¬£¬£¬£¬£¬ºÚ¿Í¿ÉÄÜ»¹ÇÔÈ¡ÁËÍËÎéÎäÊ¿µÄ¼Í¼£¬£¬£¬£¬£¬°üÀ¨Éç»áÇå¾²ºÅÂë¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/department-of-veteran-affairs-discloses-breach-impacting-46000-veterans/


¾©¹«Íø°²±¸11010802024551ºÅ