Ó¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©Ðû²¼Îó²îÅû¶ָÄÏ£»£»£»£»£»£»BlindSide¹¥»÷¿ÉʹÓÃCPUµÄÍÆ²âÖ´Ðй¦Ð§ÈƹýASLR
Ðû²¼Ê±¼ä 2020-09-161.Ó¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©Ðû²¼Îó²îÅû¶ָÄÏ

Ó¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©Ðû²¼ÁËÎó²îÅû¶ָÄÏ£¬£¬£¬£¬ÒÔ×ÊÖú¹«Ë¾ÊµÑéÎó²îÅû¶Á÷³Ì»òÔÚÒѾ½¨ÉèÎó²îÅû¶Á÷³ÌµÄÇéÐÎÏÂ¶ÔÆä¾ÙÐÐˢС£¡£¡£¡£¡£¡£¡£NCSCÌåÏÖ£¬£¬£¬£¬¸ÃÖ¸Äϲ¢²»ÊÇÒ»¸öÎó²îÅû¶µÄ¹æÔòÊֲᣬ£¬£¬£¬¶øÊÇΪ¸üºÃµÄʵÑéÌṩÁËÐëÒªµÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÆäÖ÷Òª·ÖΪÈý¸öÖ÷Òª²¿·Ö£¬£¬£¬£¬ÐÎòÁËÔõÑù½«ÍⲿÎó²îÐÅÏ¢¶¨Ïò¸øºÏÊʵÄÈË£¬£¬£¬£¬ÒÔ¼°±¨¸æÐè×ñÕչرÕÎó²îµÄ¿ò¼Ü±ê×¼¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/uk-government-releases-toolkit-to-easily-disclose-vulnerabilities/
2.Aqua SecurityÐû²¼2020ÄêCloud Native Threat±¨¸æ

Aqua Security¸ú×Ù²¢ÆÊÎöÁË2019Äê6ÔÂÖÁ2020Äê7ÔÂÖ®¼äµÄ16371Æð¹¥»÷£¬£¬£¬£¬Ðû²¼ÁË2020ÄêCloud Native Threat±¨¸æ¡£¡£¡£¡£¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬½ñÄêÄêÍ·Õë¶ÔÔÆÏµÍ³µÄ¹¥»÷ÔÚ¼¤Ôö£¬£¬£¬£¬Ïà±ÈÉÏÒ»ÄêÔöÌíÁË250£¥¡£¡£¡£¡£¡£¡£¡£ÔÚÕâЩ¹¥»÷ʱ´ú£¬£¬£¬£¬ºÚ¿ÍÊÔͼ»ñµÃ¶ÔÃÛ¹ÞЧÀÍÆ÷µÄ¿ØÖÆÈ¨£¬£¬£¬£¬È»ºóÏÂÔØ²¢°²ÅŶñÒâÈÝÆ÷¾µÏñ¡£¡£¡£¡£¡£¡£¡£AquaÌåÏÖ£¬£¬£¬£¬ÕâЩ¾µÏñÖÐÓÐ95£¥ÊÇÕë¶ÔÍÚ¿ó¼ÓÃÜÇ®±ÒµÄ£¬£¬£¬£¬¶øÆäÓàÔòÓÃÓÚÉèÖÃDDoS»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/vast-majority-of-cyber-attacks-on-cloud-servers-aim-to-mine-cryptocurrency/
3.BlindSide¹¥»÷¿ÉʹÓÃCPUµÄÍÆ²âÖ´Ðй¦Ð§ÈƹýASLR

ËÕÀèÊÀÁª°îÀí¹¤Ñ§ÔºµÈ´óѧµÄÑо¿Ö°Ô±·¢Ã÷ÁËеÄBlindSide¹¥»÷·½·¨£¬£¬£¬£¬Æä¿ÉʹÓÃCPUµÄÍÆ²âÖ´Ðй¦Ð§ÈƹýASLR¡£¡£¡£¡£¡£¡£¡£ÍƲâÖ´ÐÐÊÇÏÖ´ú´¦Öóͷ£Æ÷µÄÒ»ÖÖÌá¸ßÐÔÄܵĹ¦Ð§£¬£¬£¬£¬BlindSide¿ÉÒÔʹÓÃÈí¼þÓ¦ÓóÌÐòÖеÄÎó²î£¬£¬£¬£¬²¢ÔÚÍÆ²âÖ´ÐÐÓòÖÐÖØ¸´Ê¹ÓøÃÎó²î£¬£¬£¬£¬Öظ´Ì½²âÄڴ棬£¬£¬£¬Ö±µ½¹¥»÷ÕßÈÆ¹ýASLR¡£¡£¡£¡£¡£¡£¡£ÓÉÓڴ˹¥»÷±¬·¢ÔÚÍÆ²âÖ´ÐеĹæÄ£ÄÚ£¬£¬£¬£¬Òò´ËËùÓÐʧ°ÜµÄ̽²â¶¼»á±»ÑïÆú£¬£¬£¬£¬²¢²»»áÓ°ÏìCPU»òÆäÎȹÌÐÔ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/new-blindside-attack-uses-speculative-execution-to-bypass-aslr/
4.FBIÖÒÑÔÕë¶Ô½ðÈÚ»ú¹¹µÄƾ֤Ìî³ä¹¥»÷µÄÊýÄ¿¼¤Ôö

Áª°îÊÓ²ì¾Ö£¨FBI£©ÖÒÑÔÕë¶Ô½ðÈÚ»ú¹¹µÄƾ֤Ìî³ä¹¥»÷µÄÊýÄ¿¼¤Ôö¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ìî³äÊÇÏà¶Ô½ÏеÄÊõÓ£¬£¬£¬ÔçÏȺڿÍֻʹÓÃÕâÀ๥»÷Õë¶ÔÔÚÏßÓÎÏ·ºÍʳÎï¶©¹ºÕÊ»§¡£¡£¡£¡£¡£¡£¡£¿ÉÊÇËæ×ÅÕâÖÖÕ½ÂÔµÄÀֳɣ¬£¬£¬£¬¸ü¶àºÚ¿Í×é֯ת¶øÕë¶ÔÔÚÏßÒøÐÐЧÀͺͼÓÃÜÇ®±ÒÉúÒâËù£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡½ðÈÚ×ʲú¡£¡£¡£¡£¡£¡£¡£FBIÌåÏÖ£¬£¬£¬£¬×Ô2017ÄêÒÔÀ´£¬£¬£¬£¬ÆäÊÕµ½Á˽ü5ÍòÆðÕë¶ÔÃÀ¹ú½ðÈÚ»ú¹¹µÄƾ֤Ìî³ä¹¥»÷µ¼ÖµÄÕÊ»§ÐÅϢй¶ÊÂÎñµÄ±¨¸æ£¬£¬£¬£¬Êܺ¦Õß°üÀ¨ÒøÐС¢½ðÈÚЧÀÍÌṩÉÌ¡¢°ü¹Ü¹«Ë¾ºÍͶ×ʹ«Ë¾¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/fbi-says-credential-stuffing-attacks-are-behind-some-recent-bank-hacks/
5.Staples¹«Ë¾Ôâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬¿Í»§¶©µ¥Êý¾Ýй¶

°ì¹«ÁãÊÛ¹«Ë¾Staples·¢³öÁËÊý¾Ýй¶֪ͨÊ飬£¬£¬£¬ÉùÃ÷Æä9ÔÂ2ÈÕ×óÓÒÔâµ½Á˺ڿ͹¥»÷£¬£¬£¬£¬µ¼Ö¿ͻ§¶©µ¥Êý¾Ýй¶¡£¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñй¶µÄÐÅÏ¢°üÀ¨¿Í»§µÄÐÕÃû¡¢µØµã¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¡¢ÐÅÓÿ¨ºÅºóËÄλ¡¢²úÆ·±¾Ç®¡¢½»»õºÍ¶©¹ºµÄ²úÆ·¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤Í¨Öª£¬£¬£¬£¬²¢Ã»ÓÐÃô¸ÐÊý¾Ý±»Ð¹Â¶£¬£¬£¬£¬°üÀ¨ÕÊ»§Æ¾Ö¤ºÍÍêÕûµÄÖ§¸¶¿¨Êý¾Ý¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/108271/data-breach/staples-data-breach.html
6.ºÚ¿ÍÈëÇÖÃÀ¹úÍËÎéÎäÊ¿ÊÂÎñ²¿£¬£¬£¬£¬ÇÔÈ¡4.6ÍòÎäÊ¿ÐÅÏ¢

ÍËÎéÎäÊ¿ÊÂÎñ²¿£¨VA£©ÌåÏÖ£¬£¬£¬£¬ÓÐδ¾ÊÚȨµÄÓû§»á¼ûÁËÓÉVA½ðÈÚЧÀÍÖÐÐÄ£¨FSC£©ÖÎÀíµÄÔÚÏßÓ¦ÓóÌÐò£¬£¬£¬£¬»ñÈ¡ÁËԼĪ46000ÃûÍËÎéÎäÊ¿µÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¸¥¼ªÄáÑÇÖÝÌåÏÖ£¬£¬£¬£¬ºÚ¿ÍʹÓÃÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬²¢Ê¹ÓÃÉí·ÝÑéÖ¤ÐÒéÀ´»á¼ûFSCÓ¦ÓóÌÐò£¬£¬£¬£¬È»ºó×ªÒÆÁËÍËÎéÎäÊ¿ÖÎÀí¾ÖÔ±¾ÍýÏëÖ§¸¶¸øÒ½ÁƱ£½¡ÌṩÉÌÓÃÓÚÃÀ¹úÍËÎéÎäÊ¿µÄÒ½ÁƵĿî×Ó¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü¹ÙÔ±ÃÇÈÔÔÚÊÓ²ìÕâÆðÊÂÎñ£¬£¬£¬£¬µ«VAÒÔΪ£¬£¬£¬£¬ºÚ¿Í¿ÉÄÜ»¹ÇÔÈ¡ÁËÍËÎéÎäÊ¿µÄ¼Í¼£¬£¬£¬£¬°üÀ¨Éç»áÇå¾²ºÅÂë¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/department-of-veteran-affairs-discloses-breach-impacting-46000-veterans/


¾©¹«Íø°²±¸11010802024551ºÅ