Cloudflare³ÆÆä¿Í»§½üÆÚÔâµ½´ó¹æÄ£µÄDDoS¹¥»÷
Ðû²¼Ê±¼ä 2022-06-161¡¢Cloudflare³ÆÆä¿Í»§½üÆÚÔâµ½´ó¹æÄ£µÄDDoS¹¥»÷»î¶¯
CloudflareÔÚ6ÔÂ14ÈÕ͸¶£¬£¬£¬£¬£¬Æä¿Í»§Ôâµ½ÁË´ó¹æÄ£µÄDDoS¹¥»÷¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾³Æ£¬£¬£¬£¬£¬ËüÒѽÓÄÉÐж¯µÖÓùÁËÿÃë2600Íò´ÎÇëÇó(RPS)µÄDDoS¹¥»÷£¬£¬£¬£¬£¬ÕâÊÇÆù½ñΪֹ¼ì²âµ½µÄ×î´óµÄHTTPS DDoS¹¥»÷¡£¡£¡£¡£¡£¡£¡£¹¥»÷À´×ÔÓÉ5067̨װ±¸×é³ÉµÄ½©Ê¬ÍøÂ磬£¬£¬£¬£¬Ã¿¸ö½ÚµãÔÚ·åֵʱ±¬·¢Ô¼5200 RPS¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬¸Ã½©Ê¬ÍøÂçÔÚ²»µ½30ÃëµÄʱ¼äÄÚ´ÓÓ¡¶ÈÄáÎ÷ÑÇ¡¢ÃÀ¹ú¡¢°ÍÎ÷¡¢¶íÂÞ˹ºÍÓ¡¶ÈµÈ121¸ö¹ú¼ÒµÄ1500¶à¸öÍøÂçÖн¨ÉèÁËÁè¼Ý2.12ÒÚ¸öHTTPSÇëÇ󣬣¬£¬£¬£¬Ô¼3%µÄ¹¥»÷À´×ÔTor½Úµã¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2022/06/cloudflare-saw-record-breaking-ddos.html
2¡¢¹ú¼ÊÐ̾¯First Light 2022Ö´·¨Ðж¯¾Ð²¶Ô¼2000¸öÏÓÒÉÈË
ýÌå6ÔÂ15ÈÕ±¨µÀ£¬£¬£¬£¬£¬¹ú¼ÊÐ̾¯×éÖ¯ÔÚ76¸ö¹ú¼ÒºÍµØÇøµÄ¾¯·½ÐÖúÏÂÌᳫÁË´úºÅΪFirst Light 2022µÄ¹ú¼ÊÖ´·¨Ðж¯¡£¡£¡£¡£¡£¡£¡£ÔÚ2022Äê3ÔÂÖÁ5ÔÂʱ´ú£¬£¬£¬£¬£¬Ö´·¨Ö°Ô±Í»Ï®ÁËÈ«ÇòµÄ1770¸öËùÔÚ£¬£¬£¬£¬£¬ÊÓ²ìÁËÔ¼3000ÃûÏÓÒÉÈË£¬£¬£¬£¬£¬¾Ð²¶ÁËÔ¼2000Ãû¼ÓÈëÉç»á¹¤³Ì¹¥»÷µÄÏÓÒÉÈË£¬£¬£¬£¬£¬¶³½áÁË4000¸öÒøÐÐÕË»§²¢²é·âÁ˼ÛÖµÔ¼5000ÍòÃÀÔªµÄ²»·¨×ʽ𡣡£¡£¡£¡£¡£¡£´Ë´ÎÐж¯Öص㹥»÷Éæ¼°µç»°Õ©Æ¡¢ÀËÂþÕ©Æ¡¢BEC¹¥»÷ºÍ¹ØÓÚÏ´Ç®µÄÉç»á¹¤³Ì¹¥»÷¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/interpol-seizes-50-million-arrests-2000-social-engineers/
3¡¢Ñо¿ÍŶӷ¢Ã÷Õë¶ÔIntelºÍAMD CPUµÄ²àÐŵÀ¹¥»÷Hertzbleed
¾Ý6ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»ÖÖ³ÆÎªHertzbleedµÄвàÐŵÀ¹¥»÷£¬£¬£¬£¬£¬¿É±»Ô¶³Ì¹¥»÷ÕßÓÃÀ´Í¨¹ýÊӲ춯̬µçѹºÍƵÂÊËõ·Å(DVFS)ÆôÓõÄCPUƵÂÊת±äÇÔÈ¡¼ÓÃÜÃÜÔ¿¡£¡£¡£¡£¡£¡£¡£DVFSÊÇÏÖ´úCPUʹÓõÄÒ»ÖÖµçÔ´ÖÎÀí½ÚÔ¼¹¦Ð§£¬£¬£¬£¬£¬¿ÉÈ·±£ÏµÍ³Ôڸ߸ºÔØÊ±´ú²»»áÁè¼ÝÈȺ͹¦ÂÊÏÞÖÆ£¬£¬£¬£¬£¬²¢ÔÚµÍCPU¸ºÔØÊ±´ú½µµÍÕûÌ幦ºÄ¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÊÇ¿ÉÐе쬣¬£¬£¬£¬ÓÉÓÚÔÚIntel(CVE-2022-24436)ºÍAMD(CVE-2022-23823)x86´¦Öóͷ£Æ÷ÉÏ£¬£¬£¬£¬£¬¶¯Ì¬ÆµÂÊËõ·ÅÈ¡¾öÓÚ¹¦ºÄºÍÕýÔÚ´¦Öóͷ£µÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£IntelºÍAMD͸¶£¬£¬£¬£¬£¬²»ÍýÏëÐû²¼²¹¶¡£¡£¡£¡£¡£¡£¡£¬£¬£¬£¬£¬µ«Ðû²¼ÁËÔõÑù»º½â´ËÀ๥»÷µÄÖ¸ÄÏ¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-hertzbleed-side-channel-attack-affects-intel-amd-cpus/
4¡¢ZimbraÐÞ¸´¿ÉÇÔÈ¡Óû§µÇ¼ƾ֤µÄÎó²îCVE-2022-27924
ýÌå6ÔÂ14Èճƣ¬£¬£¬£¬£¬µç×ÓÓʼþÌ×¼þZimbraÖб£´æÒ»¸öÑÏÖØµÄÎó²î£¨CVE-2022-27924£©£¬£¬£¬£¬£¬Ó°ÏìÁË¿ªÔ´ºÍÉÌÒµ°æ±¾8.8.xºÍ9.x¡£¡£¡£¡£¡£¡£¡£SonarSource½«¸ÃÎó²î×ܽáΪδ¾Éí·ÝÑéÖ¤ÇëÇóµÄMemcachedÖж¾£¬£¬£¬£¬£¬Í¨¹ý½«CRLF×¢Èëµ½Memcached²éÕÒµÄÓû§ÃûÖпÉÒÔʹÓôËÎó²î¡£¡£¡£¡£¡£¡£¡£ÀÖ³ÉʹÓú󣬣¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÔÚ²»ÓëÓû§¾ÙÐÐÈκν»»¥µÄÇéÐÎÏÂÇÔÈ¡Ã÷ÎĵÄÃÜÂë¡£¡£¡£¡£¡£¡£¡£SonarSourceÓÚ½ñÄê3ÔÂ11ÈÕÅû¶Îó²î£»£»£»£»£»ZimbraÔÚ3ÔÂ31ÈÕÐû²¼Á˵ÚÒ»¸ö²¹¶¡£¡£¡£¡£¡£¡£¡£¬£¬£¬£¬£¬µ«²»¿ÉÍêÈ«½â¾öÎÊÌ⣻£»£»£»£»Ö®ºó£¬£¬£¬£¬£¬¹©Ó¦ÉÌÓÖÔÚ5ÔÂ10ÈÕÐû²¼²¹¶¡£¡£¡£¡£¡£¡£¡£¬£¬£¬£¬£¬ÍêÈ«ÐÞ¸´ÁËÎó²î¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2022/06/new-zimbra-email-vulnerability-could.html
5¡¢ÄÏ·ÇÁ¬Ëø³¬ÊÐShopriteÔâµ½RansomHouseµÄÀÕË÷¹¥»÷
¾ÝýÌå6ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬£¬Shoprite Group³ÆÆäÔÚÉÏÖÜÔâµ½ÁËÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÕâÊÇ·ÇÖÞ×î´óµÄÁ¬Ëø³¬ÊУ¬£¬£¬£¬£¬ÊÕÈë58ÒÚÃÀÔª£¬£¬£¬£¬£¬ÔÚ·ÇÖÞµÄ12¸ö¹ú¼Òı»®×Žü3000¼ÒÃŵ꣬£¬£¬£¬£¬ÓµÓÐ149000¸öÔ±¹¤¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ¿ÉÄÜй¶ÁËÆäλÓÚ˹ÍþÊ¿À¼¡¢ÄÉÃ×±ÈÑǺÍÔÞ±ÈÑǵĿͻ§µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬Éæ¼°ÐÕÃûºÍÉí·ÝÖ¤ºÅÂëµÈ¡£¡£¡£¡£¡£¡£¡£6ÔÂ14ÈÕ£¬£¬£¬£¬£¬RansomHouseÍÅ»ïÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬²¢¹ûÕæÁËÒ»·ÝÉù³Æ´ÓShopriteÇÔÈ¡µÄ600GBÊý¾ÝµÄÑù±¾¡£¡£¡£¡£¡£¡£¡£
https://therecord.media/large-supermarket-chain-in-southern-africa-hit-with-ransomware/
6¡¢Check Point·¢Ã÷Õë¶ÔÒÔÉ«ÁкÍÃÀ¹úµÄÓã²æÊ½´¹ÂÚ¹¥»÷
6ÔÂ14ÈÕ£¬£¬£¬£¬£¬Check PointÐû²¼ÁËÒÁÀÊPhosphorusÕë¶ÔÒÔÉ«ÁкÍÃÀ¹úµÄÓã²æÊ½´¹ÂÚ¹¥»÷µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯¿ÉÒÔ×·Ëݵ½2021Äê12Ô£¬£¬£¬£¬£¬¹¥»÷ÕßÐ®ÖÆÁËÒÔÉ«Áи߼¶¹ÙÔ±µÄµç×ÓÓʼþ£¬£¬£¬£¬£¬È»ºóÓÃËüÀ´¹¥»÷ÆäËûÄ¿µÄ¡£¡£¡£¡£¡£¡£¡£´Ë´Î»î¶¯µÄÄ¿µÄ°üÀ¨£¬£¬£¬£¬£¬ÒÔÉ«ÁÐǰÍâ½»²¿³¤Tzipi Livni¡¢ÃÀ¹úǰפÒÔÉ«ÁдóʹºÍÒÔÉ«Áйú·À¾üǰÉÙ½«µÈÈË¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ¸Ã»î¶¯µÄ×îÖÕÄ¿µÄÊÇÇÔȡĿµÄµÄСÎÒ˽¼ÒÐÅÏ¢¡¢»¤ÕÕɨÃè¼þºÍ»á¼ûµç×ÓÓʼþ£¬£¬£¬£¬£¬²¢½«Æä¹éÒòÓÚÒÁÀʵÄAPTÍÅ»ïPhosphorus¡£¡£¡£¡£¡£¡£¡£
https://blog.checkpoint.com/2022/06/14/iranian-spear-phishing-operation-targets-former-israeli-foreign-minister-former-us-ambassador-to-israel-former-israeli-army-general-and-three-other-high-profile-executives/


¾©¹«Íø°²±¸11010802024551ºÅ