ÃÀ¹úÐÁÆÕÉ­ÖÆÔ칫˾Ôâµ½ÍøÂç¹¥»÷µ¼ÖÂÔËÓªÊܵ½Ó°Ïì

Ðû²¼Ê±¼ä 2023-10-13

1¡¢ÃÀ¹úÐÁÆÕÉ­ÖÆÔ칫˾Ôâµ½ÍøÂç¹¥»÷µ¼ÖÂÔËÓªÊܵ½Ó°Ïì


¾Ý10ÔÂ12ÈÕ±¨µÀ£¬£¬£¬£¬ÐÁÆÕÉ­ÖÆÔ칫˾£¨Simpson Manufacturing£©Ôâµ½¹¥»÷£¬£¬£¬£¬µ¼ÖÂÔËÓªÊܵ½Ó°Ïì¡£¡£¡£ÕâÊÇÃÀ¹úµÄÒ»¼ÒÐÞ½¨ºÍ½á¹¹ÖÊÁÏÉú²úÉÌ£¬£¬£¬£¬2022Äê¾»ÏúÊÛ¶îΪ21.2ÒÚÃÀÔª¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬10ÔÂ10ÈÕ£¬£¬£¬£¬ËûÃǵÄIT»ù´¡ÉèÊ©ºÍÓ¦ÓóÌÐòÒòÍøÂçÇå¾²ÊÂÎñÖÐÖ¹¡£¡£¡£·¢Ã÷¶ñÒâ»î¶¯ºó£¬£¬£¬£¬ÖÆÔìÉ̹رÕÁ˲¿·ÖϵͳÒÔ×èÖ¹½øÒ»²½µÄ¹¥»÷¡£¡£¡£ÓÉÓÚµ÷½âÐèҪʱ¼ä£¬£¬£¬£¬Òò´ËÔËÓªµÄÔÝÍ£»£»£»¹½«Ò»Á¬Ò»¶Îʱ¼ä¡£¡£¡£Ö»¹ÜÐÁÆÕɭû͸¶¹¥»÷ÀàÐÍ£¬£¬£¬£¬µ«¹Ø±Õϵͳͨ³£ÊǶÔÀÕË÷¹¥»÷µÄÏìÓ¦¡£¡£¡£


https://www.securityweek.com/simpson-manufacturing-takes-systems-offline-following-cyberattack/


2¡¢ÔÆÌṩÉÌShadow PCÁè¼Ý50Íò¿Í»§µÄÐÅÏ¢±»³öÊÛÔÚ°µÍø


¾ÝýÌå10ÔÂ12ÈÕ±¨µÀ£¬£¬£¬£¬ºÚ¿ÍÉù³Æ³öÊ۸߶ËÔÆÅÌËãЧÀÍÌṩÉÌShadow PCÁè¼Ý500000Ãû¿Í»§µÄÊý¾Ý¡£¡£¡£Shadow͸¶£¬£¬£¬£¬ËûÃǵÄÒ»ÃûÔ±¹¤ÔÚ9ÔÂβÔâµ½ÁËÉ繤¹¥»÷¡£¡£¡£¹¥»÷ʼÓÚDiscordƽ̨£¬£¬£¬£¬ÒÔSteamƽ̨ÉϵÄÒ»¿îÓÎϷΪ»Ï×ÓÏÂÔØÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¸Ã¶ñÒâÈí¼þÀÖ³ÉÇÔÈ¡ÁËÉí·ÝÑéÖ¤cookie£¬£¬£¬£¬Ê¹ºÚ¿ÍÄܹ»µÇ¼¸Ã¹«Ë¾µÄSaaSÌṩÉ̵ÄÖÎÀí½çÃæ£¬£¬£¬£¬²¢Ê¹Óô˻á¼ûȨÏÞÇÔÈ¡¿Í»§ÐÅÏ¢¡£¡£¡£Ä³ºÚ¿Í³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬²¢³öÊÛ533624ÃûÓû§µÄÊý¾Ý£¬£¬£¬£¬ÌåÏÖ³ýÁËShadowÒѾ­È·ÈϵÄÊý¾ÝÍ⣬£¬£¬£¬ËûÃÇ»¹»ñµÃÁËIPÅþÁ¬ÈÕÖ¾¡£¡£¡£


https://www.bleepingcomputer.com/news/security/shadow-pc-warns-of-data-breach-as-hacker-tries-to-sell-gamers-info/


3¡¢BianLianÉù³ÆÒÑÇÔÈ¡¼ÓÄô󺽿չ«Ë¾Ô¼210GBµÄÊý¾Ý


ýÌå10ÔÂ11Èճƣ¬£¬£¬£¬BianLian¶Ô¼ÓÄô󺽿չ«Ë¾Ôâµ½µÄ¹¥»÷ÈÏÕæ£¬£¬£¬£¬²¢ÌåÏÖÒÑÍøÂçÔ¼210GBµÄÊý¾Ý¡£¡£¡£¸Ã¹«Ë¾ÔÚ9ÔµÄÒ»·ÝÉùÃ÷ÖÐÌåÏÖ£¬£¬£¬£¬Ö»Óв¿·ÖÔ±¹¤ÓÐÏÞµÄСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£µ«BianLianÉù³ÆÇÔÈ¡ÁË´Ó2008Äêµ½2023ÄêµÄÊÖÒÕºÍÔËÓªÊý¾Ý£¬£¬£¬£¬°üÀ¨¹«Ë¾ÊÖÒÕºÍÇå¾²µÄÏêϸÐÅÏ¢¡¢SQL±¸·Ý¡¢Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢¡¢¹©Ó¦É̺͹©Ó¦É̵ÄÊý¾Ý¡¢ÉñÃØÎļþÒÔ¼°¹«Ë¾Êý¾Ý¿âµÄµµ°¸£¬£¬£¬£¬²¢ÌṩÁ˽ØÍ¼×÷Ϊ֤¾Ý¡£¡£¡£¼ÓÄô󺽿ÕÌåÏÖ£¬£¬£¬£¬ËûÃÇÖªµÀBianLianµÄÍþв£¬£¬£¬£¬µ«Ã»ÓÐ֤ʵ¸ÃÍÅ»ï¾ÍÊÇ´Ë´ÎÊÂÎñµÄÄ»ºóºÚÊÖ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/bianlian-extortion-group-claims-recent-air-canada-breach/


4¡¢Cofense³ÆÊ¹ÓÃLinkedInÖÇÄÜÁ´½ÓµÄ´¹Âڻ¼¤Ôö


CofenseÔÚ10ÔÂ11Èճƣ¬£¬£¬£¬Æä·¢Ã÷ÀÄÓÃLinkedInÖÇÄÜÁ´½ÓÀ´Èƹý¼ì²âµÄ´¹ÂÚ¹¥»÷¼¤Ôö£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡MicrosoftÕÊ»§Æ¾Ö¤¡£¡£¡£ÐÂÒ»ÂÖ¹¥»÷±¬·¢ÔÚ7ÔÂÖÁ8ÔÂʱ´ú£¬£¬£¬£¬°üÀ¨800¶à·âÓʼþºÍ80¸öÆæÒìµÄÖÇÄÜÁ´½Ó£¬£¬£¬£¬Ô´×Ôн¨Éè»ò±»ÈëÇÖµÄLinkedInÆóÒµÕÊ»§¡£¡£¡£Êý¾ÝÏÔʾ£¬£¬£¬£¬´Ë´Î»î¶¯Ö÷ÒªÕë¶ÔµÄÊǽðÈÚ¡¢ÖÆÔì¡¢ÄÜÔ´¡¢ÐÞ½¨ºÍÒ½ÁƱ£½¡ÁìÓò¡£¡£¡£ÖÇÄÜÁ´½ÓÊÇLinkedIn Sales NavigatorЧÀ͵ÄÒ»²¿·Ö£¬£¬£¬£¬ÓÃÓÚÓªÏúºÍ¸ú×Ù£¬£¬£¬£¬CofenseÔçÔÚ2021Äê¾Í·¢Ã÷¹ýʹÓÃLinkedInÖÇÄÜÁ´½ÓµÄ´ó¹æÄ£´¹ÂÚ¹¥»÷¡£¡£¡£


https://cofense2022stg.wpengine.com/blog/linkedin-smart-links-credential-phishing-campaign/


5¡¢ProofpointÐû²¼2023ÄêÒ½ÁÆÐÐÒµµÄÇå¾²ÆÊÎö±¨¸æ


10ÔÂ11ÈÕ£¬£¬£¬£¬ProofpointÓëPonemonÏàÖú£¬£¬£¬£¬Ðû²¼ÁË2023ÄêÒ½ÁÆÐÐÒµµÄÇå¾²ÆÊÎö±¨¸æ¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬£¬88%µÄÊÜ·ÃʵÌåÔÚÒÑÍù12¸öÔÂÄÚÆ½¾ùÂÄÀúÁË40´Î¹¥»÷£¬£¬£¬£¬Ò½ÁÆ»ú¹¹Ôâµ½¹¥»÷µÄƽ¾ù×ܱ¾Ç®Îª499ÍòÃÀÔª£¬£¬£¬£¬±ÈÉÏÄêÔöÌí13%¡£¡£¡£ÀÕË÷Èí¼þÈÔÈ»ÊÇÒ½ÁÆ»ú¹¹Ê¼ÖÕ±£´æµÄÍþв£¬£¬£¬£¬54%µÄÊÜ·ÃÕß³ÆÔâµ½ÁËÀÕË÷¹¥»÷£¬£¬£¬£¬¸ßÓÚ2022ÄêµÄ41%¡£¡£¡£ËùÓÐÊܷûú¹¹ÔÚÒÑÍùÁ½ÄêÄÚÖÁÉÙ±¬·¢¹ýÒ»´ÎÉæ¼°Ãô¸ÐºÍÉñÃØÒ½ÁÆÊý¾ÝµÄɥʧ»òй¶ÊÂÎñ¡£¡£¡£BEC¹¥»÷¸üÊܹØ×¢£¬£¬£¬£¬µ£ÐÄ´ËÀ๥»÷µÄÈË´ÓÈ¥ÄêµÄ46%Ô¾ÉýÖÁ62%¡£¡£¡£


https://www.proofpoint.com/us/newsroom/press-releases/second-annual-ponemon-institute-report-finds-two-thirds-healthcare


6¡¢Critical StartÐû²¼2023ϰëÄêÍþÐ²Ì¬ÊÆÆÊÎö±¨¸æ


10ÔÂ11ÈÕ±¨µÀ³Æ£¬£¬£¬£¬Critical StartÐû²¼ÁË2023ϰëÄêÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£±¨¸æµÄÖ÷Òª·¢Ã÷°üÀ¨£ºÊ¹ÓÃQRÂëµÄ´¹ÂÚ¹¥»÷³ÊÉÏÉýÇ÷ÊÆ£¬£¬£¬£¬¹¥»÷Õß½«QRÂëǶÈëPNG»òPDFÖУ¬£¬£¬£¬Î±×°³ÉMicrosoft Ç徲֪ͨ£»£»£»½ÌÓýÊÇ×îÒ×Ôâµ½¹¥»÷µÄÐÐÒµÖ®Ò»£¬£¬£¬£¬2023ÄêÎó²îʹÓÃÕ¼K-12Ñ§Ð£ÍøÂçÊÂÎñµÄ29%£¬£¬£¬£¬¶ø´¹ÂÚ¹¥»÷Õ¼30%£»£»£»ÀÕË÷Èí¼þÕûÌåµÄÏàÖú±È֮ǰÏëÏóµÄ¸üÆÕ±é£¬£¬£¬£¬¸üÏêϸµØ·ÖÏíTTP£»£»£»Microsoft TeamsÔÊÐíÍⲿÕÊ»§Ö±½ÓÏòÔ±¹¤·¢ËÍÓк¦Îļþ£¬£¬£¬£¬´Ó¶øÈƹýÇå¾²¼ì²â£¬£¬£¬£¬ÕâÔöÌíÁ˹¥»÷ÀֳɵÄΣº¦¡£¡£¡£


https://www.criticalstart.com/resources/h2-2023-cyber-threat-intelligence-threat-report/