IntelÇý¶¯³ÌÐòBugµ¼ÖÂʹÓÃDirectXµÄWindowsÓ¦ÓÃÍß½â

Ðû²¼Ê±¼ä 2023-02-13
1¡¢IntelÇý¶¯³ÌÐòBugµ¼ÖÂʹÓÃDirectXµÄWindowsÓ¦ÓÃÍß½â

      

¾ÝýÌå2ÔÂ10ÈÕ±¨µÀ £¬Î¢ÈíÌåÏÖÔÚ×°ÖÃ2022Äê11ÔÂÀÛ»ý¸üкó £¬WindowsϵͳÉÏʹÓÃDirectXµÄÓ¦ÓóÌÐò»á±¬·¢Í߽⡣ÊÜÓ°ÏìÓû§»á´ÓʹÓÃDirectXµÄÓ¦ÓóÌÐòÖп´µ½apphelp.dll¹ýʧ£¨Ó¦ÓóÌÐò¼æÈÝÐÔ¿Í»§¶Ë¿â£© £¬Ôµ¹ÊÔ­ÓÉÊÇÓ¢ÌØ¶ûGPUÇý¶¯³ÌÐòÒѾ­ÓÉʱ¡£Î¢ÈíÕýÔÚÆð¾¢ÐÞ¸´Õâ¸öÐÂÎÊÌâ £¬²¢»áÔÚ¼´½«Ðû²¼µÄ°æ±¾ÖÐÌṩ¸üС£ÔÚ´Ë֮ǰ £¬ÊÜÓ°ÏìµÄÓû§¿ÉÒÔͨ¹ý½«Intel GPUÇý¶¯³ÌÐò¸üе½×îаæÔ­À´ÔÝʱ½â¾öÕâ¸öÎÊÌâ¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-says-intel-driver-bug-crashes-apps-on-windows-pcs/


2¡¢Ó²¼þÖÆÔìÉÌA10 NetworksÔâµ½ÀÕË÷ÍÅ»ïPlayµÄ¹¥»÷

      

ýÌåÓÚ2ÔÂ10ÈÕ±¨µÀ £¬¼ÓÀû¸£ÄáÑǵÄÍøÂçÓ²¼þÖÆÔìÉÌA10 NetworksÔâµ½ÁËÀÕË÷ÍÅ»ïPlayµÄ¹¥»÷¡£ÊÂÎñ±¬·¢ÔÚ2023Äê1ÔÂ23ÈÕ £¬ÊÓ²ìÈ·¶¨¹¥»÷ÕßÏë·¨»ñµÃÁ˶Թ²ÏíÇý¶¯Æ÷µÄ»á¼ûȨÏÞ £¬×°ÖÃÁ˶ñÒâÈí¼þ £¬²¢ÇÔÈ¡ÁËÓëÈËÁ¦×ÊÔ´¡¢²ÆÎñºÍÖ´·¨Ö°ÄÜÏà¹ØµÄÊý¾Ý¡£ÏÖÔÚ £¬¸Ã¹«Ë¾Ô¤¼Æ´ËÊÂÎñ²»»á¶ÔÆäÔËÓª±¬·¢ÖØ´óÓ°Ïì¡£PlayÓÚ2ÔÂ9ÈÕ½«A10 NetworksÌí¼Óµ½ÆäÍøÕ¾ £¬²¢ÍþвҪÔÚ2ÔÂ12ÈÕ¹ûÕæÇÔÈ¡µÄÎļþ¡£


https://www.bleepingcomputer.com/news/security/a10-networks-confirms-data-breach-after-play-ransomware-attack/


3¡¢ÓòÃû×¢²áÉÌNamecheapµÄÓʼþÕÊ»§±»ºÚ·¢ËÍ´ó×Ú´¹ÂÚÓʼþ

      

ýÌå2ÔÂ12ÈÕ³Æ £¬ÓòÃû×¢²áÉÌNamecheapµÄÓʼþÕÊ»§ÔÚÖÜÈÕÍíÉÏÔâµ½¹¥»÷ £¬·¢ËÍ´ó×ÚÖ¼ÔÚÇÔÈ¡ÊÕ¼þÈ˵ÄÐÅÏ¢ºÍ¼ÓÃÜÇ®±ÒÇ®°üµÄ´¹ÂÚÓʼþ¡£´¹ÂÚÔ˶¯×îÏÈÓÚ4:30 PM ET×óÓÒ £¬Ô´ÓÚNamecheapÓÃÀ´·¢ËÍÐø¶©Í¨ÖªºÍÓªÏúÓʼþµÄµç×ÓÓʼþƽ̨SendGrid¡£ÕâЩ´¹ÂÚÓʼþð³äDHL»òMetaMask £¬ÆäÖÐDHLµÄÓʼþαװ³ÉÍê³É°ü¹üµÝËÍËùÐèµÄµÝËÍ·ÑÕ˵¥ £¬MetaMaskµÄÓʼþÔòð³äÊDZØÐèµÄKYCÑéÖ¤¡£


https://www.bleepingcomputer.com/news/security/namecheaps-email-hacked-to-send-metamask-dhl-phishing-emails/


4¡¢¼ÓÀû¸£ÄáÑÇÖݶà¸öÒ½ÁÆ×éÖ¯Êý¾Ýй¶ӰÏìÔ¼330Íò»¼Õß

      

¾Ý2ÔÂ11ÈÕ±¨µÀ £¬¼ÓÀû¸£ÄáÑÇHeritage Provider NetworkÖеĶà¸öÒ½ÁÆ×éÖ¯Ôâµ½ÀÕË÷¹¥»÷ £¬Ð¹Â¶3300638Ãû»¼ÕßµÄÐÅÏ¢¡£ÊÜÓ°Ïì×éÖ¯°üÀ¨Regal Medical GroupºÍLakeside Medical OrganizationµÈ¡£¹¥»÷±¬·¢ÔÚ2022Äê12ÔÂ1ÈÕ £¬RegalÔÚ12ÔÂ2ÈÕ·¢Ã÷²¿·Ö·þÎñÆ÷ÎÞ·¨»á¼û £¬¾­ÊÓ²ìÈ·¶¨ÕâЩ·þÎñÆ÷ѬȾÁ˶ñÒâÈí¼þ¡£RegalÕýÔÚ֪ͨÊÜÓ°ÏìÓû§ £¬²¢½«ÎªÆäÌṩΪÆÚÒ»ÄêµÄNorton LifeLockÃâ·ÑÐÅÓÃ¼à¿Ø¡£


https://www.theregister.com/2023/02/11/ransomware_regal_medical_group/


5¡¢OtorioÅû¶ÎÞÏßIIoT×°±¸ÖÐÓ°ÏìÒªº¦»ù´¡ÉèÊ©µÄÎó²î

      

2ÔÂ9ÈÕ±¨µÀ³Æ £¬¹¤ÒµÍøÂçÇå¾²¹«Ë¾OtorioÔÚ4¼Ò²î±ð¹©Ó¦É̵ÄÎÞÏß¹¤ÒµÎïÁªÍø(IIoT)×°±¸Öз¢Ã÷ÁË38¸öÎó²î¡£¹¥»÷Õß¿ÉÒÔʹÓÃÕâЩÎó²î»ñµÃ¶ÔÄÚ²¿OTϵͳµÄ³õʼ»á¼ûȨÏÞ £¬²¢ÈƹýÇå¾²²ã²¢ÈëÇÖÄ¿µÄÍøÂç £¬Ó°ÏìÒªº¦»ù´¡ÉèÊ©¡£ÆäÖÐ £¬ÓÐÈý¸öÓ°ÏìETIC Telecom µÄÔ¶³Ì»á¼û·þÎñÆ÷(RAS)µÄÎó²î£¨CVE-2022-3703¡¢CVE-2022-41607ºÍCVE-2022-40981£© £¬¿ÉÄܱ»Ê¹ÓÃÀ´ÍêÈ«¿ØÖÆÒ×ÊÜÓ°ÏìµÄ×°±¸¡£


https://thehackernews.com/2023/02/critical-infrastructure-at-risk-from.html


6¡¢TrendMicro·¢Ã÷ʹÓÃÐéαÊÂÇéÕë¶Ô¶«Å·µØÇøµÄ¹¥»÷Ô˶¯

      

2ÔÂ9ÈÕ £¬Trend MicroÅû¶ÁËʹÓÃÐéαÊÂÇéʱ»úÕë¶Ô¶«Å·µØÇøµÄ¹¥»÷Ô˶¯¡£¸ÃÔ˶¯ÖÐ £¬¹¥»÷ÕßʹÓÃÁ˼¸¸ö¸ß¶È»ìÏýÇÒ¿ª·¢È±·¦µÄ×Ô½ç˵¼ÓÔØ³ÌÐò £¬ÒÔ±ãʹÓÃÇÔÈ¡³ÌÐòEnigmaѬȾÓë¼ÓÃÜÇ®±ÒÐÐÒµÏà¹ØµÄÈË¡£¾ÝϤ £¬EnigmaÊÇ¿ªÔ´µÄC#¶ñÒâÈí¼þStealeriumµÄÐ޸İ汾¡£³ýÁËÕâЩ¼ÓÔØ³ÌÐòÖ®Íâ £¬¹¥»÷Õß»¹Ê¹ÓÃIntelÇý¶¯³ÌÐòÎó²î£¨CVE-2015-2291£©À´¼ÓÔØÖ¼ÔÚ½µµÍMicrosoft DefenderÁîÅÆÍêÕûÐԵĶñÒâÇý¶¯³ÌÐò¡£


https://www.trendmicro.com/en_us/research/23/b/enigma-stealer-targets-cryptocurrency-industry-with-fake-jobs.html