ÃÀ¹úÐÁÆÕÉ­ÖÆÔ칫˾Ôâµ½ÍøÂç¹¥»÷µ¼ÖÂÔËÓªÊܵ½Ó°Ïì

Ðû²¼Ê±¼ä 2023-10-13

1¡¢ÃÀ¹úÐÁÆÕÉ­ÖÆÔ칫˾Ôâµ½ÍøÂç¹¥»÷µ¼ÖÂÔËÓªÊܵ½Ó°Ïì


¾Ý10ÔÂ12ÈÕ±¨µÀ£¬£¬ £¬ÐÁÆÕÉ­ÖÆÔ칫˾£¨Simpson Manufacturing£©Ôâµ½¹¥»÷£¬£¬ £¬µ¼ÖÂÔËÓªÊܵ½Ó°Ïì¡£¡£¡£¡£¡£ÕâÊÇÃÀ¹úµÄÒ»¼ÒÐÞ½¨ºÍ½á¹¹ÖÊÁÏÉú²úÉÌ£¬£¬ £¬2022Äê¾»ÏúÊÛ¶îΪ21.2ÒÚÃÀÔª¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬ £¬10ÔÂ10ÈÕ£¬£¬ £¬ËûÃǵÄIT»ù´¡ÉèÊ©ºÍÓ¦ÓóÌÐòÒòÍøÂçÇå¾²ÊÂÎñÖÐÖ¹¡£¡£¡£¡£¡£·¢Ã÷¶ñÒâ»î¶¯ºó£¬£¬ £¬ÖÆÔìÉ̹رÕÁ˲¿·ÖϵͳÒÔ×èÖ¹½øÒ»²½µÄ¹¥»÷¡£¡£¡£¡£¡£ÓÉÓÚµ÷½âÐèҪʱ¼ä£¬£¬ £¬Òò´ËÔËÓªµÄÔÝÍ£»£»£»£»¹½«Ò»Á¬Ò»¶Îʱ¼ä¡£¡£¡£¡£¡£Ö»¹ÜÐÁÆÕɭû͸¶¹¥»÷ÀàÐÍ£¬£¬ £¬µ«¹Ø±Õϵͳͨ³£ÊǶÔÀÕË÷¹¥»÷µÄÏìÓ¦¡£¡£¡£¡£¡£


https://www.securityweek.com/simpson-manufacturing-takes-systems-offline-following-cyberattack/


2¡¢ÔÆÌṩÉÌShadow PCÁè¼Ý50Íò¿Í»§µÄÐÅÏ¢±»³öÊÛÔÚ°µÍø


¾ÝýÌå10ÔÂ12ÈÕ±¨µÀ£¬£¬ £¬ºÚ¿ÍÉù³Æ³öÊ۸߶ËÔÆÅÌËãЧÀÍÌṩÉÌShadow PCÁè¼Ý500000Ãû¿Í»§µÄÊý¾Ý¡£¡£¡£¡£¡£Shadow͸¶£¬£¬ £¬ËûÃǵÄÒ»ÃûÔ±¹¤ÔÚ9ÔÂβÔâµ½ÁËÉ繤¹¥»÷¡£¡£¡£¡£¡£¹¥»÷ʼÓÚDiscordƽ̨£¬£¬ £¬ÒÔSteamƽ̨ÉϵÄÒ»¿îÓÎϷΪ»Ï×ÓÏÂÔØÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÀÖ³ÉÇÔÈ¡ÁËÉí·ÝÑéÖ¤cookie£¬£¬ £¬Ê¹ºÚ¿ÍÄܹ»µÇ¼¸Ã¹«Ë¾µÄSaaSÌṩÉ̵ÄÖÎÀí½çÃæ£¬£¬ £¬²¢Ê¹Óô˻á¼ûȨÏÞÇÔÈ¡¿Í»§ÐÅÏ¢¡£¡£¡£¡£¡£Ä³ºÚ¿Í³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬ £¬²¢³öÊÛ533624ÃûÓû§µÄÊý¾Ý£¬£¬ £¬ÌåÏÖ³ýÁËShadowÒѾ­È·ÈϵÄÊý¾ÝÍ⣬£¬ £¬ËûÃÇ»¹»ñµÃÁËIPÅþÁ¬ÈÕÖ¾¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/shadow-pc-warns-of-data-breach-as-hacker-tries-to-sell-gamers-info/


3¡¢BianLianÉù³ÆÒÑÇÔÈ¡¼ÓÄô󺽿չ«Ë¾Ô¼210GBµÄÊý¾Ý


ýÌå10ÔÂ11Èճƣ¬£¬ £¬BianLian¶Ô¼ÓÄô󺽿չ«Ë¾Ôâµ½µÄ¹¥»÷ÈÏÕæ£¬£¬ £¬²¢ÌåÏÖÒÑÍøÂçÔ¼210GBµÄÊý¾Ý¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚ9ÔµÄÒ»·ÝÉùÃ÷ÖÐÌåÏÖ£¬£¬ £¬Ö»Óв¿·ÖÔ±¹¤ÓÐÏÞµÄСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£µ«BianLianÉù³ÆÇÔÈ¡ÁË´Ó2008Äêµ½2023ÄêµÄÊÖÒÕºÍÔËÓªÊý¾Ý£¬£¬ £¬°üÀ¨¹«Ë¾ÊÖÒÕºÍÇå¾²µÄÏêϸÐÅÏ¢¡¢SQL±¸·Ý¡¢Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢¡¢¹©Ó¦É̺͹©Ó¦É̵ÄÊý¾Ý¡¢ÉñÃØÎļþÒÔ¼°¹«Ë¾Êý¾Ý¿âµÄµµ°¸£¬£¬ £¬²¢ÌṩÁ˽ØÍ¼×÷Ϊ֤¾Ý¡£¡£¡£¡£¡£¼ÓÄô󺽿ÕÌåÏÖ£¬£¬ £¬ËûÃÇÖªµÀBianLianµÄÍþв£¬£¬ £¬µ«Ã»ÓÐ֤ʵ¸ÃÍÅ»ï¾ÍÊÇ´Ë´ÎÊÂÎñµÄÄ»ºóºÚÊÖ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/bianlian-extortion-group-claims-recent-air-canada-breach/


4¡¢Cofense³ÆÊ¹ÓÃLinkedInÖÇÄÜÁ´½ÓµÄ´¹Âڻ¼¤Ôö


CofenseÔÚ10ÔÂ11Èճƣ¬£¬ £¬Æä·¢Ã÷ÀÄÓÃLinkedInÖÇÄÜÁ´½ÓÀ´Èƹý¼ì²âµÄ´¹ÂÚ¹¥»÷¼¤Ôö£¬£¬ £¬Ö¼ÔÚÇÔÈ¡MicrosoftÕÊ»§Æ¾Ö¤¡£¡£¡£¡£¡£ÐÂÒ»ÂÖ¹¥»÷±¬·¢ÔÚ7ÔÂÖÁ8ÔÂʱ´ú£¬£¬ £¬°üÀ¨800¶à·âÓʼþºÍ80¸öÆæÒìµÄÖÇÄÜÁ´½Ó£¬£¬ £¬Ô´×Ôн¨Éè»ò±»ÈëÇÖµÄLinkedInÆóÒµÕÊ»§¡£¡£¡£¡£¡£Êý¾ÝÏÔʾ£¬£¬ £¬´Ë´Î»î¶¯Ö÷ÒªÕë¶ÔµÄÊǽðÈÚ¡¢ÖÆÔì¡¢ÄÜÔ´¡¢ÐÞ½¨ºÍÒ½ÁƱ£½¡ÁìÓò¡£¡£¡£¡£¡£ÖÇÄÜÁ´½ÓÊÇLinkedIn Sales NavigatorЧÀ͵ÄÒ»²¿·Ö£¬£¬ £¬ÓÃÓÚÓªÏúºÍ¸ú×Ù£¬£¬ £¬CofenseÔçÔÚ2021Äê¾Í·¢Ã÷¹ýʹÓÃLinkedInÖÇÄÜÁ´½ÓµÄ´ó¹æÄ£´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£


https://cofense2022stg.wpengine.com/blog/linkedin-smart-links-credential-phishing-campaign/


5¡¢ProofpointÐû²¼2023ÄêÒ½ÁÆÐÐÒµµÄÇå¾²ÆÊÎö±¨¸æ


10ÔÂ11ÈÕ£¬£¬ £¬ProofpointÓëPonemonÏàÖú£¬£¬ £¬Ðû²¼ÁË2023ÄêÒ½ÁÆÐÐÒµµÄÇå¾²ÆÊÎö±¨¸æ¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬ £¬88%µÄÊÜ·ÃʵÌåÔÚÒÑÍù12¸öÔÂÄÚÆ½¾ùÂÄÀúÁË40´Î¹¥»÷£¬£¬ £¬Ò½ÁÆ»ú¹¹Ôâµ½¹¥»÷µÄƽ¾ù×ܱ¾Ç®Îª499ÍòÃÀÔª£¬£¬ £¬±ÈÉÏÄêÔöÌí13%¡£¡£¡£¡£¡£ÀÕË÷Èí¼þÈÔÈ»ÊÇÒ½ÁÆ»ú¹¹Ê¼ÖÕ±£´æµÄÍþв£¬£¬ £¬54%µÄÊÜ·ÃÕß³ÆÔâµ½ÁËÀÕË÷¹¥»÷£¬£¬ £¬¸ßÓÚ2022ÄêµÄ41%¡£¡£¡£¡£¡£ËùÓÐÊܷûú¹¹ÔÚÒÑÍùÁ½ÄêÄÚÖÁÉÙ±¬·¢¹ýÒ»´ÎÉæ¼°Ãô¸ÐºÍÉñÃØÒ½ÁÆÊý¾ÝµÄɥʧ»òй¶ÊÂÎñ¡£¡£¡£¡£¡£BEC¹¥»÷¸üÊܹØ×¢£¬£¬ £¬µ£ÐÄ´ËÀ๥»÷µÄÈË´ÓÈ¥ÄêµÄ46%Ô¾ÉýÖÁ62%¡£¡£¡£¡£¡£


https://www.proofpoint.com/us/newsroom/press-releases/second-annual-ponemon-institute-report-finds-two-thirds-healthcare


6¡¢Critical StartÐû²¼2023ϰëÄêÍþÐ²Ì¬ÊÆÆÊÎö±¨¸æ


10ÔÂ11ÈÕ±¨µÀ³Æ£¬£¬ £¬Critical StartÐû²¼ÁË2023ϰëÄêÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£±¨¸æµÄÖ÷Òª·¢Ã÷°üÀ¨£ºÊ¹ÓÃQRÂëµÄ´¹ÂÚ¹¥»÷³ÊÉÏÉýÇ÷ÊÆ£¬£¬ £¬¹¥»÷Õß½«QRÂëǶÈëPNG»òPDFÖУ¬£¬ £¬Î±×°³ÉMicrosoft Ç徲֪ͨ£»£»£»£»½ÌÓýÊÇ×îÒ×Ôâµ½¹¥»÷µÄÐÐÒµÖ®Ò»£¬£¬ £¬2023ÄêÎó²îʹÓÃÕ¼K-12Ñ§Ð£ÍøÂçÊÂÎñµÄ29%£¬£¬ £¬¶ø´¹ÂÚ¹¥»÷Õ¼30%£»£»£»£»ÀÕË÷Èí¼þÕûÌåµÄÏàÖú±È֮ǰÏëÏóµÄ¸üÆÕ±é£¬£¬ £¬¸üÏêϸµØ·ÖÏíTTP£»£»£»£»Microsoft TeamsÔÊÐíÍⲿÕÊ»§Ö±½ÓÏòÔ±¹¤·¢ËÍÓк¦Îļþ£¬£¬ £¬´Ó¶øÈƹýÇå¾²¼ì²â£¬£¬ £¬ÕâÔöÌíÁ˹¥»÷ÀֳɵÄΣº¦¡£¡£¡£¡£¡£


https://www.criticalstart.com/resources/h2-2023-cyber-threat-intelligence-threat-report/