Öж«AIºô½ÐÖÐÐÄÆ½Ì¨Ôâ´ó¹æÄ£Êý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬£¬Ì»Â¶Çå¾²Òþ»¼
Ðû²¼Ê±¼ä 2024-10-1210ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ò»´Î´ó¹æÄ£Êý¾Ýй¶ÊÂÎñÔÚÖж«µØÇøÆØ¹â£¬£¬£¬£¬£¬£¬£¬£¬É漰һСÎÒ˽¼Ò¹¤ÖÇÄܺô½ÐÖÐÐÄÆ½Ì¨£¬£¬£¬£¬£¬£¬£¬£¬Áè¼Ý1020ÍòÌõ¶Ô»°¼Í¼±»µÁ¡£¡£¡£¡£¾ÝÍøÂçÇå¾²¹«Ë¾Resecurity³Æ£¬£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÎó²îʹ¹¥»÷ÕßÄܹ»Î´¾ÊÚȨ»á¼û¸Ãƽ̨µÄÖÎÀíÒDZí°å£¬£¬£¬£¬£¬£¬£¬£¬ÍøÂçÏûºÄÕß¡¢ÔËÓªÉ̺ÍAIÊðÀíÖ®¼äµÄ´ó×Ú»¥¶¯Êý¾Ý¡£¡£¡£¡£ÕâЩÊý¾Ý¿ÉÄܱ»ÓÃÓڸ߼¶Ú²Æ¡¢ÍøÂç´¹ÂÚÍýÏëºÍÆäËû¶ñÒâ»î¶¯£¬£¬£¬£¬£¬£¬£¬£¬ÓÈÆäÊÇСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©µÄй¶£¬£¬£¬£¬£¬£¬£¬£¬ÔöÌíÁËÄ£ÄâÕýµ±¿Í»§Ð§Àͽ»Á÷¾ÙÐÐڲƵÄΣº¦¡£¡£¡£¡£¸ÃÊÂÎñ͹ÏÔÁËÈ˹¤ÖÇÄÜÆ½Ì¨ÔÚÌá¸ßЧÂʵÄͬʱ£¬£¬£¬£¬£¬£¬£¬£¬Ò²´øÀ´ÁËÊý¾ÝÒþ˽µÄÖØ´óÍþв¡£¡£¡£¡£ËäÈ»ÈëÇÖÒÑ»ñµÃ»º½â£¬£¬£¬£¬£¬£¬£¬£¬µ«ÈËÃǶԵÚÈý·½È˹¤ÖÇÄÜϵͳµÄÇå¾²ÐԺʹ¦Öóͷ£Ãô¸Ð¿Í»§Êý¾ÝµÄÄÜÁ¦ÌåÏÖµ£ÐÄ¡£¡£¡£¡£ResecurityÇ¿µ÷£¬£¬£¬£¬£¬£¬£¬£¬¶Ô»°Ê½AIƽ̨ÒѳÉΪ´óÐÍÆóÒµºÍÕþ¸®»ú¹¹ÏÖ´úIT¹©Ó¦Á´µÄÒªº¦ÒªËØ£¬£¬£¬£¬£¬£¬£¬£¬ÐèҪƽºâ¹Å°åÍøÂçÇå¾²²½·¥ºÍÕë¶ÔAIÏêϸÇéÐεÄרÃŲ½·¥À´±£»£»£»£»£»£»£»£»¤ËüÃÇ¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/10m-exposed-ai-call-center-hack/
2. APT29ºÚ¿Í´ó¹æÄ£¹¥»÷ZimbraºÍTeamCityЧÀÍÆ÷
10ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÃÀÓ¢ÍøÂç»ú¹¹½ñÈÕÁªºÏÖÒÑԳƣ¬£¬£¬£¬£¬£¬£¬£¬Óë¶íÂÞ˹¶ÔÍâÇ鱨¾Ö(SVR)Ïà¹ØµÄAPT29ºÚ¿Í×éÖ¯ÕýÔÚ¡°´ó¹æÄ£¡±¹¥»÷È«Çò¹æÄ£ÄÚδ´ò²¹¶¡µÄZimbraºÍJetBrains TeamCityЧÀÍÆ÷¡£¡£¡£¡£ÕâЩ¹¥»÷ʹÓÃÁËCVE-2022-27924ºÍCVE-2023-42793Îó²î£¬£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡µç×ÓÓʼþÕÊ»§Æ¾Ö¤ºÍ¾ÙÐÐÔ¶³Ì´úÂëÖ´ÐеȶñÒâ»î¶¯¡£¡£¡£¡£SVRºÚ¿Í×éÖ¯£¬£¬£¬£¬£¬£¬£¬£¬Ò²±»³ÆÎªCozy Bear¡¢Midnight BlizzardºÍDukes£¬£¬£¬£¬£¬£¬£¬£¬¶àÄêÀ´Ò»Ö±Õë¶ÔÃÀ¹úºÍÅ·ÖÞµÄÕþ¸®ºÍ˽ÈË×éÖ¯¡£¡£¡£¡£´Ë´ÎÖÒÑÔÒªÇóÍøÂç·ÀÓùÕßÁ¬Ã¦ÐÞ²¹Ì»Â¶µÄЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬£¬²¢°²ÅÅÇå¾²²¹¶¡»ººÍ½â²½·¥ÒÔ±ÜÃâÇå¾²Îó²î¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬£¬£¬APT29ºÚ¿ÍÒѲ߻®ÁËSolarWinds¹©Ó¦Á´¹¥»÷²¢¹¥ÆÆÁ˶à¸öÃÀ¹úÁª°î»ú¹¹£¬£¬£¬£¬£¬£¬£¬£¬»¹ÈëÇÖÁ˱±Ô¼¹ú¼ÒµÄMicrosoft 365ÕË»§ºÍ΢Èí¸ß¹ÜµÈ¹«Ë¾µÄExchange OnlineÕË»§¡£¡£¡£¡£ÃÀ¹ú¹ú¼ÒÇå¾²¾ÖÍøÂçÇå¾²Ö÷¹ÜÌåÏÖ£¬£¬£¬£¬£¬£¬£¬£¬ÕâÒ»»î¶¯¶ÔÕþ¸®ºÍ˽Ӫ²¿·Ö×é³ÉÁËÈ«ÇòÍþв£¬£¬£¬£¬£¬£¬£¬£¬ÐèÒª³¹µ×Éó²éÇå¾²¿ØÖƲ½·¥¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/us-uk-warn-of-russian-apt29-hackers-targeting-zimbra-teamcity-servers/
3. ºÚ¿ÍʹÓÃYouTubeƽ̨Èö²¥ÖØ´óµÄ¶ñÒâÈí¼þ
10ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¿¨°Í˹»ù½üÆÚ·¢Ã÷ºÚ¿ÍƵÈÔʹÓÃYouTubeƽ̨Èö²¥ÖØ´ó¶ñÒâÈí¼þ¡£¡£¡£¡£ºÚ¿Íͨ¹ýÐ®ÖÆÈÈÃÅÆµµÀαװ³ÉÔʼ´´×÷Õߣ¬£¬£¬£¬£¬£¬£¬£¬Ðû²¼¶ñÒâÁ´½Ó¶ÔÓû§ÊµÑéÕ©Æ¡£¡£¡£¡£2022ÄêºÚ¿ÍÔøÕë¶Ô¶íÂÞ˹Óû§ÊµÑé¼ÓÃÜÇ®±ÒÍÚ¾ò»î¶¯£¬£¬£¬£¬£¬£¬£¬£¬Ê¹Óñ»Ð®ÖƵÄYouTubeÕË»§·Ö·¢Î±×°³ÉÊ¢ÐÐÓ¦ÓõĶñÒâÎļþ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ý¶à½×¶Î¹¥»÷ÐòÁÐѬȾϵͳ£¬£¬£¬£¬£¬£¬£¬£¬½ÓÄÉÒþ²Ø¶ñÒâ´úÂë²¢¼á³ÖÊðÃûÓÐÓÃÐÔµÄÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬£¬Ê¹ÓöàÖÖ»úÖÆ½¨É賤ÆÚÐÔ£¬£¬£¬£¬£¬£¬£¬£¬²¢ÊµÑéÖØ´óµÄ·ÀÓù¹æ±ÜÊÖÒÕÒþ²Ø¶ñÒâ×é¼þ¡£¡£¡£¡£×îÖÕÓÐÓÃÔØºÉΪSilentCryptoMiner£¬£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÍÚ¾òÒþ˽¼ÓÃÜÇ®±Ò£¬£¬£¬£¬£¬£¬£¬£¬²¢ÍøÂçϵͳң²âÊý¾Ýͨ¹ýTelegram»úеÈËAPI´«Êä¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâ»î¶¯»¹Õë¶ÔÀ´×Ô°×¶íÂÞ˹¡¢Ó¡¶ÈµÈ¶à¸ö¹ú¼ÒµÄÓû§£¬£¬£¬£¬£¬£¬£¬£¬ÕâЩÓû§Òò³£½ûÓÃAV¹¤¾ß±£»£»£»£»£»£»£»£»¤ºÍÇå¾²²½·¥¶øÒ×Êܹ¥»÷¡£¡£¡£¡£¸Ã¹¥»÷µÄÖØ´óÐÔÌåÏÖÔÚÄ£¿£¿£¿£¿£¿é»¯½á¹¹ÉÏ£¬£¬£¬£¬£¬£¬£¬£¬¿Éƾ֤ĿµÄ¶¯Ì¬¼ÓÔØ²î±ðÓÐÓÃÔØºÉ×é¼þ£¬£¬£¬£¬£¬£¬£¬£¬½ÓÄÉÏȽø»ìÏýÒªÁìºÍ·´ÆÊÎö¹¦Ð§¼á³ÖÒþ²ØÐÔ£¬£¬£¬£¬£¬£¬£¬£¬ÈÚÈëÖØ´óµÄÆóÒµ¼¶¹¥»÷ÊÖÒÕ¡£¡£¡£¡£
https://cybersecuritynews.com/hackers-using-youtube-videos-to-deliver-sophisticated-malware/
4. LynxÀÕË÷Èí¼þ£ºINCÀÕË÷Èí¼þµÄбäÖÖÓëË«ÖØÀÕË÷Íþв
10ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Palo Alto Networks ½üÆÚ·¢Ã÷ÁËÒ»ÖÖÃûΪ¡°Lynx¡±µÄÐÂÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬£¬£¬ËüÏÖʵÉÏÊǶÔ2023Äê8Ô·ºÆðµÄINCÀÕË÷Èí¼þµÄ¸üÃû£¬£¬£¬£¬£¬£¬£¬£¬Á½Õß´úÂëÏàËÆ¶È¸ß´ï48%£¬£¬£¬£¬£¬£¬£¬£¬ÇÒÔ¼70.8%µÄ½¹µã¹¦Ð§±»Öظ´Ê¹Óᣡ£¡£¡£LynxÀÕË÷Èí¼þÖ÷ÒªÕë¶ÔÃÀ¹úºÍÓ¢¹ú¸÷ÐÐÒµ×éÖ¯£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÁãÊÛ¡¢·¿µØ²ú¡¢ÐÞ½¨ºÍ½ðÈÚЧÀ͵ȣ¬£¬£¬£¬£¬£¬£¬£¬ÒÔÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©ÐÎʽ¹©ÆäËûÍøÂç·¸·¨·Ö×ÓʹÓᣡ£¡£¡£Æä×îΣÏյķ½ÃæÖ®Ò»ÊÇʵÑéË«ÖØÀÕË÷Õ½ÂÔ£¬£¬£¬£¬£¬£¬£¬£¬¼´ÔÚ¼ÓÃÜÎļþǰÇÔÈ¡Êܺ¦ÕßÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬Èô²»Ö§¸¶Êê½ð£¬£¬£¬£¬£¬£¬£¬£¬Ôò¿ÉÄÜй¶»ò³öÊÛÕâЩÊý¾Ý¡£¡£¡£¡£LynxÀÕË÷Èí¼þÉù³ÆÒÑÈëÇÖ¶à¼Ò¹«Ë¾£¬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ¹«¹²ÍøÕ¾ÉÏչʾ±»µÁÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬Ö»¹ÜÉù³Æ±Ü¿ªÁËÕþ¸®»ú¹¹¡¢Ò½ÔººÍ·ÇÓªÀû×éÖ¯£¬£¬£¬£¬£¬£¬£¬£¬µ«Æä¹¥»÷ÈÔ¶ÔÐí¶àÐÐÒµ×é³ÉÖØ´óÍþв¡£¡£¡£¡£¸ÃÀÕË÷Èí¼þʹÓø߼¶¼ÓÃÜËã·¨£¬£¬£¬£¬£¬£¬£¬£¬ÈçAES-128ºÍCurve25519 Donna£¬£¬£¬£¬£¬£¬£¬£¬½âÃÜÄѶȼ«´ó£¬£¬£¬£¬£¬£¬£¬£¬ÇÒרÃÅÕë¶ÔWindowsϵͳ£¬£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃRestart Manager APIÌá¸ß¼ÓÃÜЧÂÊ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬LynxÀÕË÷Èí¼þÉè¼ÆÎÞа£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷Õßͨ¹ýÏÂÁîÐвÎÊý×Ô½ç˵ִÐУ¬£¬£¬£¬£¬£¬£¬£¬ÒÔÖª×ãÌØ¶¨ÐèÇ󡣡£¡£¡£
https://securityonline.info/lynx-ransomware-the-evolution-of-inc-ransomware-into-a-potent-cyber-threat/
5. CISAÖÒÑÔ£ºÎ´¼ÓÃÜF5 BIG-IP Cookie±»ÀÄÓþÙÐÐÍøÂç¹¥»÷
10ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬CISA·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬£¬Ö¸³öÍøÂçÍþвÐÐΪÕßÕýÔÚÀÄÓÃδ¼ÓÃܵÄF5 BIG-IP³¤ÆÚcookieÀ´Ê¶±ðºÍ¶¨Î»Ä¿µÄÍøÂçÉÏµÄÆäËûÄÚ²¿×°±¸¡£¡£¡£¡£ËûÃÇͨ¹ý»æÖÆÄÚ²¿×°±¸Í¼£¬£¬£¬£¬£¬£¬£¬£¬ÔÚÍøÂç¹¥»÷µÄÍýÏë½×¶Îʶ±ðÒ×Êܹ¥»÷µÄ×°±¸¡£¡£¡£¡£F5 BIG-IPÊÇÒ»Ì×Ó¦ÓóÌÐò½»¸¶ºÍÁ÷Á¿ÖÎÀí¹¤¾ß£¬£¬£¬£¬£¬£¬£¬£¬ÆäÍâµØÁ÷Á¿ÖÎÀíÆ÷£¨LTM£©Ä£¿£¿£¿£¿£¿éʹÓó¤ÆÚcookieÀ´Î¬³Ö»á»°Ò»ÖÂÐÔ£¬£¬£¬£¬£¬£¬£¬£¬µ«ÕâЩcookieĬÈÏδ¼ÓÃÜ¡£¡£¡£¡£´Ó11.5.0°æ×îÏÈ£¬£¬£¬£¬£¬£¬£¬£¬ÖÎÀíÔ±¿ÉÑ¡ÔñÇ¿ÖÆ¶ÔËùÓÐcookie¾ÙÐмÓÃÜ£¬£¬£¬£¬£¬£¬£¬£¬µ«Ñ¡Ôñ²»ÆôÓõÄÓû§½«ÃæÁÙÇ徲Σº¦¡£¡£¡£¡£ÕâЩcookie°üÀ¨±àÂëµÄIPµØµã¡¢¶Ë¿ÚºÅºÍÄÚ²¿¸ºÔØÆ½ºâЧÀÍÆ÷µÄÉèÖ㬣¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¶àÄêǰÒÑ·ÖÏíÔõÑùʹÓÃδ¼ÓÃܵÄcookieÀ´²éÕÒÒþ²ØµÄÄÚ²¿Ð§ÀÍÆ÷¡£¡£¡£¡£CISA½¨ÒéF5 BIG-IPÖÎÀíÔ±Éó²é¹©Ó¦É̹ØÓÚÔõÑù¼ÓÃÜÕâЩ³¤ÆÚcookieµÄ˵Ã÷£¬£¬£¬£¬£¬£¬£¬£¬²¢Ö¸³öF5ÒÑ¿ª·¢³öÒ»ÖÖÃûΪ¡°BIG-IP iHealth¡±µÄÕï¶Ï¹¤¾ß£¬£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚ¼ì²â²úÆ·µÄ¹ýʧÉèÖò¢ÏòÖÎÀíÔ±·¢³öÖÒÑÔ¡£¡£¡£¡£µ±ÉèÖÃΪ¡°±ØÐ衱ʱ£¬£¬£¬£¬£¬£¬£¬£¬ËùÓг¤ÆÚÐÔcookie¶¼Ê¹ÓÃÇ¿AES-192¼ÓÃܾÙÐмÓÃÜ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-hackers-abuse-f5-big-ip-cookies-to-map-internal-servers/
6. Mozilla½ôÆÈÐû²¼FirefoxÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÑÏÖØÎó²îCVE-2024-9680
10ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬MozillaΪÆäFirefoxä¯ÀÀÆ÷Ðû²¼Á˽ôÆÈÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬£¬ÒÔ½â¾öÒ»¸ö±»ÆÕ±éʹÓõÄÑÏÖØÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î±»×·×ÙΪCVE-2024-9680£¬£¬£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÔÊÐí¹¥»÷ÕßÔÚÓû§ÏµÍ³ÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£Îó²îλÓÚFirefoxµÄ¶¯»Ê±¼äÖá×é¼þÖУ¬£¬£¬£¬£¬£¬£¬£¬ÊÇWeb Animations APIµÄÒ»ÖÖ»úÖÆ£¬£¬£¬£¬£¬£¬£¬£¬ÏêϸΪÊͷźóʹÓÃÎó²î£¬£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÄÚ´æË𻵡£¡£¡£¡£MozillaÔÚÊÕµ½·´²¡¶¾¹«Ë¾ESETµÄÖÒÑԺ󣬣¬£¬£¬£¬£¬£¬£¬Ñ¸ËÙÕÙ¼¯ÍŶӶÔÎó²î¾ÙÐÐÄæÏò¹¤³Ì£¬£¬£¬£¬£¬£¬£¬£¬²¢ÔÚ25СʱÄÚ¿ª·¢²¢Ðû²¼ÁËÐÞ¸´³ÌÐò¡£¡£¡£¡£ÐÞ²¹µÄ°æ±¾°üÀ¨Firefox 131.0.2µÈ¶à¸ö°æ±¾¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬MozillaÒÑÈ·ÈϸÃÎó²îÕýÔÚ±»Æð¾¢Ê¹ÓÃÀ´¹¥»÷Torä¯ÀÀÆ÷Óû§£¬£¬£¬£¬£¬£¬£¬£¬µ«¹ØÓÚ¹¥»÷µÄÏêϸϸ½ÚÈÔ²»µÃ¶øÖª¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬£¬£¬Óû§Ó¦Á¬Ã¦¸üÐÂÖÁ×îа汾µÄFirefoxÒÔ±£»£»£»£»£»£»£»£»¤×Ô¼ºµÄϵͳÇå¾²¡£¡£¡£¡£
https://securityonline.info/mozilla-confirms-active-attacks-on-tor-browser-via-firefox-vulnerability/


¾©¹«Íø°²±¸11010802024551ºÅ