Ó¡¶ÈÖ§¸¶Ó¦ÓÃBHIMÒòÉèÖùýʧй¶Êý°ÙÍòÓû§ÐÅÏ¢£»£»£»Æ»¹ûÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´unc0verÔ½ÓüÎó²î

Ðû²¼Ê±¼ä 2020-06-03

1.Ó¡¶ÈÖ§¸¶Ó¦ÓÃBHIMÒòÉèÖùýʧ£¬£¬£¬£¬£¬Ð¹Â¶Êý°ÙÍòÓû§ÐÅÏ¢


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Ó¡¶ÈÒÆ¶¯Ö§¸¶Ó¦ÓóÌÐòBharat Interface for Money (BHIM) ±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬Ð¹Â¶Êý°ÙÍòÓ¡¶ÈÓû§µÄСÎÒ˽¼ÒÊý¾ÝºÍ²ÆÎñÊý¾Ý¡£¡£¡£4ÔÂ23ÈÕ£¬£¬£¬£¬£¬vpnMentorÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬¸ÃÓ¦Óôæ·ÅÊý¾ÝµÄAmazon Web Services S3´æ´¢Í°ÓÉÓÚÉèÖùýʧ£¬£¬£¬£¬£¬µ¼Ö¿ÉÒÔ±»¹ûÕæ»á¼û¡£¡£¡£´Ë´Îй¶µÄÎļþ°üÀ¨É¨ÃèArdaar¿¨£¨Ó¡¶ÈÉí·ÝÖ¤£©¡¢ÖÖÐÕÖ¤Ê顢רҵºÍ½ÌÓýÖ¤Êé¡¢ÓÃ×÷ÆÜÉí֤ʵµÄÕÕÆ¬¡¢ÓëÓ¡¶ÈËùµÃ˰ЧÀÍÏà¹ØµÄÓÀÊÀÕʺţ¨PAN£©¿¨ÒÔ¼°¿ªÉèBHIMÕÊ»§ËùÐèµÄËùÓÐÎļþ£¬£¬£¬£¬£¬Ð¹Â¶Ð¡ÎÒ˽¼ÒÐÅÏ¢°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÄêË꣬£¬£¬£¬£¬ÐԱ𡢼Òͥסַ¡¢ÖÖÐÕÉí·Ý¡¢×Ú½ÌÐÅÑö¡¢ÉúÎïÌØÕ÷ÏêϸÐÅÏ¢¡¢Ö¸ÎÆÉ¨Ãè¡¢Éí·ÝÖ¤ÕÕÆ¬ÒÔ¼°Õþ¸®ÍýÏëºÍÉç»á°ü¹ÜЧÀ͵ÄÉí·ÝÖ¤ºÅÂë¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬ÔÚÊýÐÇÆÚºóµÚ¶þ´ÎÁªÏµÁËÓ¡¶ÈµÄCERTºó£¬£¬£¬£¬£¬¸ÃÎó²î²Å±»ÐÞ¸´¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/indian-payment-app-bhim-data-breach/


2.REvilÀÕË÷Ó¢¹úElexonʧ°Üºó£¬£¬£¬£¬£¬Ð¹Â¶Æä1280¸öÎļþ


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ºÚ¿ÍÍÅ»ïREvilÓÚÁ½ÖÜǰ¶ÔÓ¢¹ú¹«Ë¾ElexonÌᳫÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬ÔÚË÷ÒªÊê½ðʧ°Üºó£¬£¬£¬£¬£¬½«ÇÔÈ¡µÄ1280¸öÎļþÒÔ»º´æµÄÐÎʽÐû²¼ÔÚÆäÍøÕ¾ÉÏ¡£¡£¡£ÕâЩÎļþ°üÀ¨ElexonÔ±¹¤»¤ÕÕµÄÎļþºÍÉÌÒµ°ü¹ÜÉêÇë±í¡£¡£¡£ElexonÔÚ5ÔÂÖÐÑ®Ôâµ½ÍøÂç¹¥»÷ʱÌåÏÖ£¬£¬£¬£¬£¬ÆäÒѾ­È·¶¨ÁË»ù´¡Ôµ¹ÊÔ­Óɲ¢ÕýÔÚ½ÓÄɲ½·¥»Ö¸´ÆäITϵͳ£¬£¬£¬£¬£¬Òò´Ë²¢Î´Ö§¸¶Êê½ð¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬Elexon²¢Î´»ØÓ¦The RegisterµÄÖÃÆÀÇëÇ󣬣¬£¬£¬£¬The RegisterÌåÏÖÈôÊÇ´Ë´Îй¶µÄÊý¾ÝÊÇÕæÊµµÄ£¬£¬£¬£¬£¬REvilµÄÐÐΪ¿ÉÒÔ¿´×÷ÊÇÍýÏëʧ°ÜºóµÄ¸´³ð¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.theregister.com/2020/06/01/elexon_ransomware_was_revil_sodinokibi/


3.Æ»¹ûÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´unc0verÔ½ÓüÎó²î


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


6ÔÂ1ÈÕ£¬£¬£¬£¬£¬Æ»¹ûÐû²¼Á˶à¸ö²úÆ·µÄ°²¸üУ¬£¬£¬£¬£¬ÔÚÕë¶ÔiOS 13.5.1ºÍiPadOS 13.5.1µÄ¸üÐÂÖÐÐÞ¸´ÁËunc0verÔ½ÓüÎó²î£¬£¬£¬£¬£¬Æä±»¸ú×ÙΪCVE-2020-9859£¬£¬£¬£¬£¬ÏÖÔÚÉÐδÐû²¼MITER / NVDÌõÄ¿¡£¡£¡£Æ»¹û¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬ÓÉÓÚ¸ÃÎó²îΪÄÚ´æ´¦Öóͷ£Îó²î²¢ÇÒ¶à¸öPoCsÒѾ­±»Åû¶Áè¼ÝÒ»¸öÐÇÆÚ£¬£¬£¬£¬£¬ÒÔÊÇÕâ¸öÎó²î¿ÉÄÜ»áÈù¥»÷ÕßʹÓÃÄÚºËÌØÈ¨Ö´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬²¢½¨ÒéÓû§Á¬Ã¦¸üС£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬´Ë´Î¸üл¹°üÀ¨Õë¶ÔmacOS Catalina 10.15.5ÖÐͳһÎó²îµÄ¶à´Î¸üеÄÔö²¹¸üÐÂ2020-003£¬£¬£¬£¬£¬ÓÃÓÚApple WatchºÍTV×°±¸µÄwatchOS 6.2.6ºÍtvOS 13.4.6µÄ¸üУ¬£¬£¬£¬£¬ÒÔ¼°ÓÃÓÚApple WatchµÄwatchOS 6.2.6Çå¾²¸üС£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/apple/apple-pushes-fix-across-all-devices-for-unc0ver-jailbreak-flaw/


4.Éç½»ÊÓÆµÓ¦ÓÃMitron±£´æÎó²î£¬£¬£¬£¬£¬¿Éµ¼ÖÂÕË»§½ÓÊÜ


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Çå¾²Ñо¿Ô±Rahul KankraleÔÚMitronÓ¦ÓóÌÐòÖз¢Ã÷ʹÓÃGoogleµÇ¼¹¦Ð§±£´æÎÊÌ⣬£¬£¬£¬£¬¿Éµ¼ÖÂÕË»§½ÓÊÜ¡£¡£¡£¸ÃÓ¦ÓÃÖÐÔÚÓû§ÔÊÐí»á¼ûÉèÖÃÎļþÐÅϢʱ²»½¨Éè˽ÓÐÉí·ÝÑéÖ¤ÁîÅÆ£¬£¬£¬£¬£¬ÒÔÊÇ£¬£¬£¬£¬£¬Ö»ÒªÖªµÀÓû§id¾Í¿ÉÒÔÇáËɵؽÓÊܸÃÕÊ»§£¬£¬£¬£¬£¬¶ø¸ÃidÔÚÒ³ÃæÔ´ÖйûÕæÏÔʾ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬»¹Ã»ÓпÉÓõIJ¹¶¡³ÌÐòÐÞ¸´´ËÎó²î£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÊµÑéÓ뿪·¢Ö°Ô±ÁªÏµ¿ÉÊÇûÓÐÀֳɡ£¡£¡£Òò´Ë£¬£¬£¬£¬£¬ÏÖÔÚ¸ÃÎó²îÈÔδÐÞ¸´£¬£¬£¬£¬£¬ÆäPoCÏÖÒÑÅú¶£¬£¬£¬£¬£¬Òò´ËËùÓÐÓû§¶¼ÈÝÒ×Êܵ½ºÚ¿Í¹¥»÷¡£¡£¡£MitronÔÚGoogle PlayÊÐËÁÖÐÓÐÁè¼Ý500ÍòÓû§£¬£¬£¬£¬£¬Ñо¿Ö°Ô±½¨ÒéÓû§×èֹʹÓôËÓ¦ÓÃÒÔ±£»£»£»¤Òþ˽ºÍÇå¾²¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://latesthackingnews.com/2020/06/02/tiktok-alternative-mitron-app-has-a-critical-vulnerability-allowing-account-takeovers/


5.½ö5Ô·ݾͱ¨¸æÁË105ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬Ð¹Â¶88ÒÚÌõÊý¾Ý


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ÍøÂçΣº¦ºÍÒþ˽ÖÎÃ÷È·¾ö¼Æ»®ÌṩÉÌIT GovernanceÐû²¼ÁËÒ»·ÝÊý¾Ýй¶ÊÂÎñÇåµ¥£¬£¬£¬£¬£¬¸Ã¹«Ë¾½ö5Ô·ݾÍͳ¼ÆÁË105ÆðÊÂÎñ£¬£¬£¬£¬£¬ÕâЩÊÂÎñ×ܹ²Ð¹Â¶ÁËÁè¼Ý88ÒÚÌõ¼Í¼¡£¡£¡£ÆäÖÐ×î´óµÄÒ»´ÎÊý¾Ýй¶ÊÂÎñÀ´×ÔÌ©¹úAISÒÆ¶¯ÔËÓªÉÌ£¬£¬£¬£¬£¬ÆäDNSÅÌÎʺÍNetFlowÈÕÖ¾Êý¾Ý¿â̻¶£¬£¬£¬£¬£¬Ð¹Â¶83ÒÚÌõ¼Í¼¡£¡£¡£¶ÔÊÂÎñÔµ¹ÊÔ­ÓɾÙÐзÖÀ࣬£¬£¬£¬£¬ÆäÖÐ39ÒòÓÉÎªÍøÂç¹¥»÷£¬£¬£¬£¬£¬37ÒòÓÉΪÊý¾Ýй¶£¬£¬£¬£¬£¬17ÒòÓÉΪÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬6ÒòÓÉΪÄÚ²¿Íþв»òÆäËûÀàÐ͵ÄÍøÂçÊÂÎñ¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬ÕâЩÊý×ÖÖ»ÊǺÜÊÇÊØ¾ÉµÄÔ¤¼Æ£¬£¬£¬£¬£¬ÓÉÓÚËü½ö·´Ó¦³ö¹ûÕæ±¨¸æµÄÊÂÎñ£¬£¬£¬£¬£¬ÉÐÓÐһЩδ֪ÊÂÎñ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/over-460-million-records-exposed-in-breach-incidents-reported-in-may/


6.Ñо¿·¢Ã÷Êý¾Ýй¶ºóÖ»ÓÐÈý·ÖÖ®Ò»µÄÓû§¸ü¸ÄÃÜÂë


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


¿¨ÄÚ»ù÷¡´óѧÇå¾²ÓëÒþ˽Ñо¿Ëù£¨CyLab£©Ñо¿Ö°Ô±½ÒÏþÁËÒ»ÏîÑо¿£¬£¬£¬£¬£¬Åú×¢Ö»ÓÐԼĪÈý·ÖÖ®Ò»µÄÓû§»áÔÚÊý¾Ýй¶ºó¸ü¸ÄÆäÃÜÂë¡£¡£¡£¸ÃÑо¿²»ÊÇ»ùÓÚÊÓ²ìÊý¾Ý£¬£¬£¬£¬£¬¶øÊÇ»ùÓÚÏÖʵµÄä¯ÀÀÆ÷Á÷Á¿¡£¡£¡£Ñо¿Ð¡×éͨ¹ýËѼ¯ÓÚ2017Äê1ÔÂÖÁ2018Äê12ÔÂÖ®¼ä249Ãû¼ÓÈëÕߵļÒÓÃÅÌËã»úµÄÐÅÏ¢¾ÙÐÐÆÊÎö£¬£¬£¬£¬£¬ÍøÂçµÄÊý¾Ý°üÀ¨ÍøÂçÁ÷Á¿¡¢µÇÂ¼ÍøÕ¾µÄÃÜÂëÒÔ¼°´æ´¢ÔÚä¯ÀÀÆ÷ÖеÄÃÜÂë¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬ÔÚÕâ249¸öÓû§ÖÐÓÐ63¸öÓû§Ôâµ½ÁËÊý¾Ýй¶£¬£¬£¬£¬£¬ÆäÖÐÖ»ÓÐ21루33£¥£©¸ü¸ÄÁËÃÜÂ룬£¬£¬£¬£¬¶øÔÚÕâ21λÓû§ÖУ¬£¬£¬£¬£¬Ö»ÓÐ15λÔÚÊý¾Ýй¶ͨ¸æÐû²¼ºóµÄÈý¸öÔÂÄÚ¸ü¸ÄÃÜÂ룬£¬£¬£¬£¬²¢ÇÒÖ»ÓÐ9루Èý·ÖÖ®Ò»£©Æ¾Ö¤ÃÜÂëµÄlog10ת»»Ç¿¶È½«Æä¸ü¸ÄΪ¸üÇ¿µÄÃÜÂë¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/after-a-breach-users-rarely-change-their-passwords-study-finds/