ÃÀ¹úVoIPÌṩÉÌÔâµ½DDoS¹¥»÷£ºvpnMentorÐû²¼ºÚ¿ÍÆÊÎö±¨¸æ

Ðû²¼Ê±¼ä 2021-09-29

ÃÀ¹úVoIPÌṩÉÌBandwidth.comÔâµ½DDoS¹¥»÷


ÃÀ¹úVoIPÌṩÉÌBandwidth.comÔâµ½DDoS¹¥»÷.png


ÃÀ¹úVoIPÌṩÉÌBandwidth.comÔÚ½üÆÚÔâµ½ÁËDDoS¹¥»÷£¬µ¼ÖÂÒÑÍù¼¸ÌìÄÚÆäÔÚÈ«ÃÀµÄÓïÒô·þÎñÖÐÖ¹¡£Bandwidth´ÓÃÀ¹ú¶«²¿Ê±¼ä9ÔÂ25ÈÕÏÂÖç3:31×îÏȱ¨¸æÆäϵͳ·ºÆð¹ÊÕÏ£¬Ó°ÏìÁËÓïÒô¡¢ÔöÇ¿ÐÍ911(E911)·þÎñ¡¢ÐÂÎÅ·¢Ëͺ͹ÙÍø»á¼û¡£Bandwidthδ¹ûÕæ·þÎñÖÐÖ¹µÄÔµ¹ÊÔ­ÓÉ£¬µ«ÆäÔ±¹¤³ÆÊÇDDoS¹¥»÷µ¼Öµġ£±¾ÔÂVoIP.msÔøÔ⵽ΪÆÚÒ»ÖܵÄDDoS¹¥»÷²¢±»ÀÕË÷450ÍòÃÀÔª£¬Éв»ÇåÎúBandwidthÊÇ·ñÒ²Ôâµ½ÁËÀàËÆµÄÀÕË÷¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/bandwidthcom-is-latest-victim-of-ddos-attacks-against-voip-providers/


ÃÀ¹úÐÝ˹¶Ù¿Ú°¶³ÆÆäÔâµ½ÒÉËÆ¹ú¼ÒÖ§³ÖµÄºÚ¿Í¹¥»÷


ÃÀ¹úÐÝ˹¶Ù¿Ú°¶³ÆÆäÔâµ½ÒÉËÆ¹ú¼ÒÖ§³ÖµÄºÚ¿Í¹¥»÷.png


ÃÀ¹úÐÝ˹¶Ù¿Ú°¶µÄ¹ÙÔ±ÔÚÉÏÖÜËı¨¸æ³Æ£¬ÐÝ˹¶Ù¸ÛÎñ¾ÖÓÚ8Ô·ÝÔøÔâµ½ÍøÂç¹¥»÷¡£CISA¹ÙÔ±Jen Easterly͸¶£¬´Ë´Î¹¥»÷Ô˶¯ºÜÊÇÖØ´ó£¬Ó¦¸Ã¹é×ïÓÚ¹ú¼ÒÖ§³ÖµÄºÚ¿Í£¬²¢ÒÔΪ¹¥»÷ÕßʹÓÃÁËManageEngine ADSelfService PlusÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²îCVE-2021-40539¡£¸ÃÎó²îÒÑÓÚ9Ô³õÐÞ¸´£¬FBI¡¢CGCYBERºÍCISA»¹ÔÚ9ÔÂÖÐѮ͎áÐû²¼ÁËÓйظÃÎó²îµÄÇå¾²×Éѯ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/122599/hacking/port-of-houston-cyberattack.html


OpenSUpdaterеĴúÂëÊðÃûÊÖÒÕ¿ÉÈÆ¹ýÇå¾²¼ì²â


OpenSUpdaterеĴúÂëÊðÃûÊÖÒÕ¿ÉÈÆ¹ýÇå¾²¼ì²â.png


Google TAGÍŶӷ¢Ã÷ÁËOpenSUpdaterеĴúÂëÊðÃûÊÖÒÕ¿ÉÈÆ¹ýÇå¾²¼ì²â¡£OpenSUpdaterͨ³£Ê¹ÓôÓÕýµ±Ö¤Êé½ÒÏþ»ú¹¹»ñµÃµÄ´úÂëÊðÃûÖ¤Êé¾ÙÐÐÊðÃû£¬×Ô8ÔÂÒÔÀ´£¬Ëü×îÏÈʹÓÃÎÞЧÊðÃû¡£ÕâЩÐÂÑù±¾ÒÔEnd of Content(EOC)±ê¼ÇÌæ»»ÁËleaf X.509Ö¤ÊéµÄSignatureAlgorithmµÄ¡°²ÎÊý¡±ÔªËصÄNULL±ê¼Ç¡£Ê¹ÓÃOpenSSLÌáÈ¡ÊðÃûÐÅÏ¢µÄÇå¾²²úÆ·»áÒÔΪÕâÖÖ±àÂëÎÞЧ£¬È»¶øÒ»Ð©ÆÊÎöÆ÷ÒÔΪÕâЩ±àÂëÓÐÓò¢ÔÊÐíÑéÖ¤¡£Ê¹ÓÃÕâÖÖ·½·¨£¬¿ÉÒÔµÖ´ïÈÆ¹ý¼ì²âµÄÄ¿µÄ¡£


 Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/122576/hacking/code-signing-avoid-detection.html


Cisco·¢Ã÷ʹÓÃNetwireºÍWarzone¹¥»÷Ó¡¶ÈµÄÔ˶¯


Cisco·¢Ã÷ʹÓÃNetwireºÍWarzone¹¥»÷Ó¡¶ÈµÄÔ˶¯.png


Cisco TalosÔÚ9ÔÂ23ÈÕÅû¶ÁËÕë¶ÔÓ¡¶ÈÕþ¸®ºÍ¾üÊ»ú¹¹µÄ¹¥»÷Ô˶¯¡°Operation Armor Piercer¡±¡£´Ë´ÎÔ˶¯ÖÐʹÓõÄһЩսÂÔÓë°Í»ù˹̹Ïà¹Ø×éÖ¯APT36ºÍSideCopyÏàËÆ£¬²¢Ê¹ÓÃÁËÉÌÒµRAT NetwireºÍWarzone(AveMaria)¡£¹¥»÷Õß»¹Ê¹ÓÃÁËÖÖÖÖÓÕ¶ü£¬ËüÃÇÖ÷Ҫαװ³ÉÓëÓ¡¶ÈÕþ¸®»ù´¡ÉèÊ©ºÍ²Ù×÷Ïà¹ØµÄÖ¸ÄÏ£¬ÀýÈçKavachºÍITÏà¹ØÖ¸ÄÏ¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/threat-actor-targets-indian-government-commercial-rats


vpnMentorÐû²¼ºÚ¿ÍÔÚTelegramÉÏÔ˶¯µÄÆÊÎö±¨¸æ


vpnMentorÐû²¼ºÚ¿ÍÔÚTelegramÉÏÔ˶¯µÄÆÊÎö±¨¸æ.png


vpnMentor½üÆÚÐû²¼ÁËÓйغڿÍÔÚTelegramÉÏÔ˶¯µÄÆÊÎö±¨¸æ¡£±¨¸æÖ¸³ö£¬¹¥»÷ÕßËÆºõ×îÏÈ´ó×ÚÓ¿ÏòTelegramÀ´·ÖÏíºÍÌÖÂÛ´ó¹æÄ£µÄÊý¾Ýй¶¡£Ñо¿Ö°Ô±¼ÓÈëÁ˼¸¸öÒÔ¶ñÒâÍøÂçÔ˶¯ÎªÖ÷µÄTelegramС×飬·¢Ã÷¹¥»÷Õß»áÔÚÆµµÀÖÐÐû²¼×ª´¢µÄÊý¾Ý£¬²¢¶ÔÊý¾Ý¾ÙÐмòҪ˵Ã÷ÒÔ¹©ÆäËûÓû§Ê¹Óã»»òÕßÊÇÊý°ÙÃû³ÉÔ±Ò»ÆðÌÖÂÛÓйØÍøÂç¹¥»÷µÄ¸÷¸ö·½ÃæÒÔ¼°ÔõÑùʹÓÃת´¢µÄÊý¾Ý¡£


Ô­ÎÄÁ´½Ó£º

https://www.vpnmentor.com/blog/cybercrime-on-telegram/


RiskReconÐû²¼2020ÄêÊý¾Ýй¶ÊÂÎñµÄÁ¿»¯ÆÊÎö±¨¸æ


RiskReconÐû²¼2020ÄêÊý¾Ýй¶ÊÂÎñµÄÁ¿»¯ÆÊÎö±¨¸æ.png


RiskReconºÍCyentia InstituteÍŽáÐû²¼ÁË2020ÄêÊý¾Ýй¶ÊÂÎñµÄÁ¿»¯ÆÊÎö±¨¸æ¡£±¨¸æÖ¸³ö£¬×Ô2008ÄêÒÔÀ´ÒÑ·¢Ã÷897ÆðÊý¾Ýй¶µÄÁ¬ËøÊÂÎñ£¨ripple event£©£¬ÆäÖеÄ108Æð±¬·¢ÔÚÒÑÍùÈýÄêÖУ»´ËÀàÊÂÎñÔì³ÉµÄ¾­¼ÃËðʧÊǹŰåµÄÊý¾Ýй¶ÊÂÎñµÄ10±¶£¬ÆäÖÐ×îÑÏÖØµÄ¿É´ï26±¶£»µä·¶µÄÁ¬ËøÊÂÎñÐèÒª379Ììºó²Å»ªÓ°Ïì75%µÄÏÂÓÎÊܺ¦Õߣ¬¶øÉæ¼°µ½×éÖ¯µÄÊýĿƽ¾ùΪ4¸ö¡£


Ô­ÎÄÁ´½Ó£º

https://www.riskrecon.com/report-measuring-the-impact-of-multi-party-breaches