Epic GamesÒòÎ¥·´Òþ˽·¨µÈÔµ¹ÊÔÓɱ»FTC·£¿£¿£¿£¿£¿£¿î5.2ÒÚÃÀÔª
Ðû²¼Ê±¼ä 2022-12-201¡¢Epic GamesÒòÎ¥·´Òþ˽·¨µÈÔµ¹ÊÔÓɱ»FTC·£¿£¿£¿£¿£¿£¿î5.2ÒÚÃÀÔª
¾Ý12ÔÂ19ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬±¤ÀÝÖ®Ò¹µÄÖÆÔìÉÌEpic Games½«Ö§¸¶5.2ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬ÒÔÏ¢ÕùÓйØÎ¥·´¶ùͯÒþ˽·¨ºÍʹÓÃÆáºÚģʽÓÕʹÊý°ÙÍòÓÎÏ·Íæ¼Ò¾ÙÐÐÎÞÒâÏûºÄµÄÖ¸¿Ø¡£¡£¡£FTCÔÚͶËßÖгƣ¬£¬£¬£¬£¬£¬EpicÔÚδ֪ͨ»òδÕ÷µÃÆäâïÊÑÔ޳ɵÄÇéÐÎÏ£¬£¬£¬£¬£¬£¬ÍøÂç13ËêÒÔÏÂÍæ¼ÒµÄÐÅϢΥ·´ÁËCOPPA£¬£¬£¬£¬£¬£¬±»·£¿£¿£¿£¿£¿£¿î2.75ÒÚÃÀÔª¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Ëü»¹Ê¹ÓÃÆáºÚģʽÓÕÆ°üÀ¨¶ùͯºÍÇàÉÙÄêÔÚÄÚµÄFortniteÍæ¼Ò¾ÙÐв»ÐèÒªµÄÓÎÏ·ÄÚ¹ºÖ㬣¬£¬£¬£¬£¬ÐëÏòÊÜÓ°Ïì¿Í»§Ö§¸¶2.45ÒÚÃÀÔªµÄÍ˿¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÒÑË¢ÐÂĬÈÏÒþ˽ÉèÖ㬣¬£¬£¬£¬£¬²¢¸ü¸ÄÁËÖ§¸¶Á÷³ÌÒÔ·À²»ÐëÒªµÄÊÕ·Ñ¡£¡£¡£
https://www.bleepingcomputer.com/news/gaming/epic-games-to-pay-520-million-for-privacy-violations-dark-patterns/
2¡¢ºÚ¿Í³öÊ۾ݳÆÊÇ´ÓGeminiÇÔÈ¡µÄ570ÍòÓû§µÄÐÅÏ¢
ýÌå12ÔÂ15Èճƣ¬£¬£¬£¬£¬£¬ºÚ¿ÍÔÚ¶à¸ö°µÍøÆ½Ì¨³öÊ۾ݳÆÊÇÀ´×ÔGeminiµÄÊý¾Ý¿â£¬£¬£¬£¬£¬£¬°üÀ¨570ÍòÓû§µÄÐÅÏ¢¡£¡£¡£¼ÓÃÜÇ®±ÒÉúÒâËùGemini½üÆÚÐû²¼Í¨Öª³Æ£¬£¬£¬£¬£¬£¬µÚÈý·½¹©Ó¦ÉÌÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬Î´¾ÊÚȨµÄ¹¥»÷ÕßÇÔÈ¡ÁËGemini¿Í»§µÄÓʼþµØµãºÍµç»°ºÅÂ룬£¬£¬£¬£¬£¬ÏÖÔÚÒÑÓпͻ§ÊÕµ½ÁË´¹ÂÚµç×ÓÓʼþ¡£¡£¡£¸ÃÊý¾Ý¿âËÆºõÔÚ9ÔÂÆð¾Í×îÏȳöÊÛ£¬£¬£¬£¬£¬£¬µ±ÊǼÛǮΪ30¸ö±ÈÌØ±Ò£¨Ô¼ºÏ520000ÃÀÔª£©¡£¡£¡£Gemini½¨Òé¿Í»§Ê¹ÓÃǿʢµÄÉí·ÝÑéÖ¤ÒªÁ죬£¬£¬£¬£¬£¬²¢½¨Ò鼤»î2FA±£»£»£»£»£»£»¤»òʹÓÃÓ²¼þÇå¾²ÃÜÔ¿À´»á¼ûÕÊ»§¡£¡£¡£
https://securityaffairs.co/wordpress/139742/data-breach/5-7m-gemini-users-leak.html
3¡¢²ÍÒû¿Í»§ÖÎÀíÆ½Ì¨SevenRooms 427GBµÄÊý¾Ýй¶
¾ÝýÌå12ÔÂ18ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬ÔÚ¹¥»÷Õß³öÊÛ±»µÁÊý¾Ýºó£¬£¬£¬£¬£¬£¬SevenRoomsÈ·ÈÏÆä±¬·¢ÁËÊý¾Ýй¶¡£¡£¡£SevenRoomsÊǹú¼ÊÁ¬Ëø²ÍÌüºÍÂùÝЧÀÍÌṩÉÌʹÓõIJÍÌü¿Í»§¹ØÏµÖÎÀí(CRM)ƽ̨£¬£¬£¬£¬£¬£¬°üÀ¨MGM ResortsºÍBloomin' BrandsµÈ¡£¡£¡£12ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚºÚ¿ÍÂÛ̳BreachedÉÏÐû²¼ÁËÊý¾ÝÑù±¾£¬£¬£¬£¬£¬£¬Éù³ÆÇÔÈ¡ÁËÒ»¸ö427 GBµÄ±¸·ÝÊý¾Ý¿â£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÓйØSevenRooms¿Í»§µÄÐÅÏ¢¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬Ð¹Â¶ÊÇÓÉÓÚSevenRoomsµÚÈý·½¹©Ó¦É̵ÄÎļþ´«Êä½Ó¿ÚÔ⵽δ¾ÊÚȨ»á¼ûµ¼Öµġ£¡£¡£
https://www.bleepingcomputer.com/news/security/restaurant-crm-platform-sevenrooms-confirms-breach-after-data-for-sale/
4¡¢Ñо¿ÍŶÓÅû¶ÀÖ¸ßBrickLinkÍøÕ¾ÖеÄAPIÇå¾²Îó²î
Salt SecurityÔÚ12ÔÂ15ÈÕÅû¶ÁËBrickLinkÍøÕ¾ÖеÄÁ½¸öAPIÎó²î¡£¡£¡£BrickLink.comÊÇLEGO GroupµÄ¹Ù·½¶þÊֺ͹ǶÀָ߻ýľÊг¡£¬£¬£¬£¬£¬£¬ÓµÓÐÁè¼ÝÒ»°ÙÍòµÄ×¢²á»áÔ±¡£¡£¡£ÕâЩÎó²î¿É±»ÓÃÀ´½ÓÊÜ»áÔ±ÕÊ»§¡¢»á¼ûºÍÇÔÈ¡´æ´¢ÔÚÆ½Ì¨ÉϵÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¬£¬£¬£¬£¬£¬ÉõÖÁ»á¼ûÄÚ²¿Éú²úÊý¾Ý²¢ÆÆËðÄÚ²¿Ð§ÀÍÆ÷¡£¡£¡£µÚÒ»¸öÎó²îÊÇÓÅ»ÝȯËÑË÷²¿·ÖµÄ²éÕÒÓû§Ãû¶Ô»°¿òÖеÄXSSÎó²î£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃÌØÖÆÁ´½ÓÔÚÄ¿µÄÖÐ×¢ÈëºÍÖ´ÐдúÂë¡£¡£¡£µÚ¶þ¸öÎó²îλÓÚÉÏ´«µ½Çó¹ºÁбíÒ³Ãæ£¬£¬£¬£¬£¬£¬¿Éͨ¹ýXXE¹¥»÷¶ÁÈ¡WebЧÀÍÆ÷ÉϵÄÎļþ²¢Ö´ÐÐSSRF¹¥»÷£¬£¬£¬£¬£¬£¬Õâ¿ÉÄܵ¼ÖÂAWS EC2ÁîÅÆÐ¹Â¶¡£¡£¡£
https://salt.security/blog/missing-bricks-finding-security-holes-in-lego-apis
5¡¢Mandiant·¢Ã÷UNC4166Õë¶ÔÎÚ¿ËÀ¼Õþ¸®µÄ¹¥»÷»î¶¯
¾ÝMandiant 12ÔÂ15Èճƣ¬£¬£¬£¬£¬£¬Æä·¢Ã÷ÁËÕë¶ÔÎÚ¿ËÀ¼Õþ¸®µÄ¹©Ó¦Á´¹¥»÷»î¶¯¡£¡£¡£±»×·×ÙΪUNC4166µÄ¹¥»÷ÍÅ»ïͨ¹ýÎÚ¿ËÀ¼ÓïºÍ¶íÓïµÄTorrentÎļþ¹²ÏíÍøÕ¾£¬£¬£¬£¬£¬£¬·Ö·¢Î±×°³ÉÕýµ±Windows 10×°ÖóÌÐòµÄľÂí»¯ISOÎļþ¡£¡£¡£ÕâЩ¶ñÒâ×°ÖóÌÐòÌṩµÄ¶ñÒâÈí¼þÄܹ»´ÓÄ¿µÄÅÌËã»úÍøÂçÊý¾Ý¡¢×°ÖÃÆäËü¶ñÒ⹤¾ß²¢½«ÇÔÈ¡µÄÊý¾Ýй¶µ½¹¥»÷ÕßµÄЧÀÍÆ÷¡£¡£¡£ÔÚÆðÔ´Õì֮̽ºó£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹×°ÖÃÁ˺óÃÅStowaway¡¢BeaconºÍSparepart£¬£¬£¬£¬£¬£¬À´¼á³Ö¶ÔÄ¿µÄµÄ»á¼û¡¢Ö´ÐÐÏÂÁî¡¢´«ÊäÎļþºÍÇÔÊØÐÅÏ¢¡£¡£¡£
https://www.mandiant.com/resources/blog/trojanized-windows-installers-ukrainian-government
6¡¢TrendMicroÐû²¼¹ØÓÚÀÕË÷Èí¼þAgendaµÄÆÊÎö±¨¸æ
12ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬TrendMicroÐû²¼Á˹ØÓÚÀÕË÷Èí¼þAgendaµÄÆÊÎö±¨¸æ¡£¡£¡£½üÆÚ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÒ»¸öÓÃRust¿ª·¢µÄAgendaÑù±¾£¬£¬£¬£¬£¬£¬¼ì²âЧ¹ûΪRansom.Win32.AGENDA.THIAFBB¡£¡£¡£AgendaÔÚÆäÍøÕ¾ÉÏÐû²¼µÄ±»¹¥»÷×é֯λÓÚ²î±ð¹ú¼Ò£¬£¬£¬£¬£¬£¬Ö÷ÒªÊôÓÚÖÆÔìÒµºÍITÐÐÒµ£¬£¬£¬£¬£¬£¬×ÜÊÕÈëÁè¼Ý5.5ÒÚÃÀÔª¡£¡£¡£Óë½ÓÊÜ10¸ö²ÎÊýµÄGolang±äÌå²î±ð£¬£¬£¬£¬£¬£¬Rust±äÌåÖ»½ÓÊÜ3¸ö²ÎÊý£¬£¬£¬£¬£¬£¬Ëü»¹Ê¹ÓüäЪÐÔ¼ÓÃÜÕ½ÂÔÀ´Ìṩ¸ü¿ìµÄ¼ÓÃܲ¢¸üÓÐÓõØÈƹý¼ì²â¡£¡£¡£
https://www.trendmicro.com/en_us/research/22/l/agenda-ransomware-uses-rust-to-target-more-vital-industries.html


¾©¹«Íø°²±¸11010802024551ºÅ