²¿·ÖOutLookÕÊ»§ÐÅϢй¶£»£»£»£»£»£»Ð¶ñÒâÈí¼þ¿É¸Ä¶¯CATºÍMRIɨÃèÒǵÄÒ½ÁÆÉ¨ÃèЧ¹û

Ðû²¼Ê±¼ä 2019-04-15
1.΢ÈíÔâºÚ¿Í¹¥»÷£¬ £¬£¬²¿·ÖÓû§µÄOutLookÕÊ»§ÐÅϢй¶


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


΢Èí֤ʵ1ÔÂ1ÈÕÖÁ3ÔÂ29ÈÕʱ´ú¹¥»÷ÕßÈëÇÖÁËÒ»¸ö¿Í»§Ö§³ÖÊðÀíÕË»§£¬ £¬£¬²¢Ê¹ÓøÃÕË»§»á¼ûÁ˿ͻ§Ö§³ÖÃÅ»§ÍøÕ¾¼°²¿·ÖOutLookÓû§µÄÏà¹ØÐÅÏ¢¡£¡£¡£ÕâЩÐÅÏ¢°üÀ¨µç×ÓÓʼþµØµã¡¢Îļþ¼ÐÃû³Æ¡¢ÓʼþÖ÷Ìâ¼°ÁªÏµÈ˵ç×ÓÓʼþµØµã£¬ £¬£¬µ«²»°üÀ¨Óʼþ¼°¸½¼þµÄÄÚÈÝ¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷µÄÏêϸϸ½Ú£¬ £¬£¬µ«Î¢ÈíÌåÏÖÒѾ­½ûÓÃÁ˸ÃÊðÀíÕË»§µÄƾ֤£¬ £¬£¬²¢Í¨ÖªËùÓÐÊÜÓ°ÏìµÄÓû§¡£¡£¡£Î¢ÈíҲûÓÐ͸¶ÊÜÓ°ÏìµÄÓû§×ÜÊý¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/04/microsoft-outlook-email-hack.html


2.°®´ïºÉÖÝÀ¶Ê®×Ö»á¹ÙÍøÔâºÚ¿ÍÈëÇÖ£¬ £¬£¬²¿·ÖÓû§µÄСÎÒ˽¼ÒÐÅϢй¶

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


°®´ïºÉÖÝÀ¶Ê®×Ö»áµÄµçÉÌÍøÕ¾ÓÚ3ÔÂ21ÈÕÔâºÚ¿ÍÈëÇÖ£¬ £¬£¬¹¥»÷ÕßÊÔͼÌᳫڲƭÐÔµÄÉúÒ⣬ £¬£¬µ«Ã»ÓÐÀֳɡ£¡£¡£±ðµÄ£¬ £¬£¬¹¥»÷Õß»¹»á¼ûÁ˰üÀ¨Óû§PHIÐÅÏ¢µÄ»ã¿îÎļþ£¬ £¬£¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨Óû§µÄÐÕÃû¡¢¹ÒºÅ/¶©ÔĺÅÂ롢ЧÀÍÈÕÆÚ¡¢Ò½ÁÆÐ§ÀÍÌṩÕßµÄÃû×Ö¡¢»¼ÕßÕ˺𢏶¿îÐÅÏ¢µÈ£¬ £¬£¬µ«²»°üÀ¨Éç»áÇå¾²ºÅÂë¡¢¼ÝÕÕID¼°ÐÅÓÿ¨ºÅÂë¡£¡£¡£Æ¾Ö¤ÊÓ²ìЧ¹û£¬ £¬£¬À¶Ê®×Ö»áÒÔΪ¹¥»÷Õß»á¼ûÁËÔ¼1%µÄÓû§ÐÅÏ¢¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/blue-cross-of-idaho-notice-of-privacy-breach/


3.ºÚ¿ÍÍÅ»ïÔÚÍøÉÏÐû²¼ÊýǧÃûÃÀ¹ú¾¯Ô±ºÍÁª°îÌØ¹¤µÄСÎÒ˽¼ÒÊý¾Ý

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾

¾ÝÍâýTechcrunch±¨µÀ£¬ £¬£¬Ò»¸öºÚ¿ÍÍÅ»ïÉù³ÆÈëÇÖÁËÊýÊ®¸öFBIÁ¥ÊôÍøÕ¾£¬ £¬£¬²¢ÇÔÈ¡ÁËÊôÓÚÃÀ¹úÁª°î»ú¹¹ºÍ¹«¹²Ð§ÀÍ×éÖ¯Ô±¹¤µÄÁè¼ÝÒ»°ÙÍòÌõÊý¾Ý¡£¡£¡£¸ÃÍÅ»ïÔÚÍøÉÏÐû²¼ÁËÊýÊ®¸öÎļþ£¬ £¬£¬ÆäÖаüÀ¨Ô¼4000ÃûÃÀ¹ú¾¯Ô±ºÍÁª°îÌØ¹¤µÄÏêϸСÎÒ˽¼ÒÐÅÏ¢£¬ £¬£¬ÕâЩÐÅÏ¢°üÀ¨ÐÕÃû¡¢Ð¡ÎÒ˽¼ÒºÍÕþ¸®ÓÊÏ䵨µã¡¢Ö°Î»¡¢µç»°ºÅÂëºÍÓÊÕþµØµã¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/83763/data-breach/fbi-affiliated-websites-hack.html


4.ÃÀ¹ú¸ñÁÖά¶ûÊÐÔâÐÂÀÕË÷Èí¼þRobbinHood¹¥»÷£¬ £¬£¬ÊÂÎñÈÔÔÚÊÓ²ì

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ÐÂÀÕË÷Èí¼þRobbinHoodÕýÔÚÆð¾¢¾ÙÐй¥»÷»î¶¯£¬ £¬£¬Ñо¿Ö°Ô±ÉÐÎ´ÍøÂçµ½RobbinHoodµÄÑù±¾£¬ £¬£¬µ«ÒÑÓжàÃûÊܺ¦ÕßÖÐÕС£¡£¡£RobbinHoodµÄÊê½ðÊÇÿ̨ÅÌËã»ú3±ÈÌØ±Ò»òÕû¸öÍøÂç7±ÈÌØ±Ò£¬ £¬£¬²¢ÔÚµÚËÄÌìÖ®ºóÊê½ðÖðÈÕÔöÌí1ÍòÃÀÔª¡£¡£¡£ÔÚRobbinHoodµÄTorÖ§¸¶Ò³ÃæÉÏ£¬ £¬£¬¹¥»÷ÕßÇ¿µ÷ËûÃÇÊ®·ÖÌåÌùÊܺ¦ÕßµÄÒþ˽£¬ £¬£¬²¢½«ÔÚÊܺ¦Õ߸¶¿îºóɾ³ýÏà¹Ø¼Í¼£¬ £¬£¬°üÀ¨¼ÓÃÜÃÜÔ¿ºÍIPµØµã¡£¡£¡£Ã½Ì屨µÀ³Æ±±¿¨ÂÞÀ´ÄÉÖݵĸñÁÖά¶ûÊÐÔâµ½RobbinHood¹¥»÷£¬ £¬£¬Ïà¹ØÖ´·¨»ú¹¹ÕýÔÚ¾ÙÐÐÊӲ졣¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/robbinhood-ransomware-claims-its-protecting-your-privacy/


5.д¹ÂڻThe Nasty List£¬ £¬£¬Ö÷ÒªÇÔÈ¡InstagramÓû§Æ¾Ö¤

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


еĴ¹ÂÚȦÌס°The Nasty List¡±£¨ÁîÈËÑá¶ñµÄÃûµ¥£©ÕýÔÚInstagramÉÏÈö²¥£¬ £¬£¬Ö÷ÒªÇÔÈ¡Óû§µÄµÇ¼ƾ֤¡£¡£¡£¸Ã´¹ÂÚÐÅÏ¢Éù³ÆÄ¿µÄÓû§»òÓû§µÄÅóÙ­´¦ÓÚÒ»¸öÁîÈËÑá¶ñµÄÃûµ¥ÉÏ£¬ £¬£¬²¢°üÀ¨Ãûµ¥ÏêϸÐÅÏ¢µÄÁ´½Ó£¬ £¬£¬µ«¸ÃÁ´½ÓÖ¸ÏòÒ»¸öαÔìµÄInstagramµÇÂ¼Ò³Ãæ£¬ £¬£¬×Åʵ¼ÊÓòÃûΪnastylist-instatop50[.]me¡£¡£¡£Ò»µ©Óû§ÊäÈëÆ¾Ö¤£¬ £¬£¬¹¥»÷Õß½«Ê¹ÓÃËûÃǵÄÕË»§½øÒ»²½Èö²¥¸ÃȦÌס£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/the-nasty-list-phishing-scam-is-sweeping-through-instagram/


6.жñÒâÈí¼þ¿É¸Ä¶¯CATºÍMRIɨÃèÒǵÄÒ½ÁÆÉ¨ÃèЧ¹û

918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Ben-Gurion´óѧµÄÒ»¸öÑо¿ÍŶÓÑÝʾÁËÒ»ÖÖÄܹ»¸Ä¶¯Ò½ÁÆÉ¨ÃèЧ¹ûµÄжñÒâÈí¼þ£¬ £¬£¬ÕâÖÖ¶ñÒâÈí¼þ¿É¸Ä¶¯É¨Ãè³öµÄÒ½ÁÆÍ¼Ïñ£¬ £¬£¬½«Ö×ÁöÌí¼Óµ½Í¼ÏñÖлòÊÇ´ÓͼÏñÖÐÒÆ³ýÖ×Áö£¬ £¬£¬ÒÔÎóµ¼Ò½ÉúµÄÕïÖÎЧ¹û¡£¡£¡£Ñо¿Ö°Ô±²âÊÔÁË70ÕÅͼÏñ£¬ £¬£¬ÀÖ³ÉÓÕÆ­ÁËÈýÃû·ÅÉä¿ÆÒ½ÉúºÍÒ½ÔºµÄ×Ô¶¯É¸Ñ¡ÏµÍ³¡£¡£¡£Ñо¿Ö°Ô±³ÆÕâÖÖ¹¥»÷µÄÔµ¹ÊÔ­ÓÉÊÇÒ½ÁÆ×°±¸µÄÇå¾²²½·¥È±·¦£¬ £¬£¬ÀýÈçȱÉÙ¶ÔͼÏñµÄÊðÃûºÍ¼ÓÃÜ¡£¡£¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.pandasecurity.com/mediacenter/news/new-malware-healthcare-sector/