ÃÀ¹úijERPÈí¼þÌṩÉÌÉèÖùýʧй¶50ÍòÓ¡¶ÈÓû§Êý¾Ý
Ðû²¼Ê±¼ä 2023-01-04
¾ÝýÌå1ÔÂ3ÈÕ±¨µÀ£¬£¬£¬Ñо¿Ö°Ô±É¨Ãèµ½ÃÀ¹ú¼ÓÀû¸£ÄáÑÇÖÝijÆóÒµ×ÊÔ´ÍýÏë(ERP)Èí¼þÌṩÉÌÉèÖùýʧµÄElasticsearchЧÀÍÆ÷¡£¡£¡£Ð¹Â¶Êý¾ÝÉæ¼°50¶àÍòÓ¡¶ÈÇóÖ°Õß¡¢¸Ã¹«Ë¾Ô±¹¤ÒÔ¼°¸Ã¹«Ë¾µÄ¿Í»§£¬£¬£¬°üÀ¨Æ»¹ûºÍÈýÐǵȡ£¡£¡£ÆÊÎöÏÔʾ£¬£¬£¬ÆäÖаüÀ¨Áè¼Ý575000È˵ÄÊý¾Ý£¬£¬£¬¾ÞϸÁè¼Ý6.3GB£¬£¬£¬²¢ÇÒÌìÌì¶¼ÔÚÔöÌíеÄÊý¾Ý¡£¡£¡£Ñо¿Ö°Ô±²¢Î´¹ûÕæ¸Ã¹«Ë¾µÄÃû³Æ£¬£¬£¬ÓÉÓÚЧÀÍÆ÷ÏÖÔÚÈÔÈ»¿ÉÒÔ¹ûÕæ»á¼û¡£¡£¡£
https://www.hackread.com/erp-firm-expose-india-job-seekers-data/
2¡¢SynologyÐÞ¸´VPN Plus ServerÖÐÎó²îCVE-2022-43931
¾Ý1ÔÂ3ÈÕ±¨µÀ³Æ£¬£¬£¬NASÖÆÔìÉÌSynologyÐÞ¸´ÁËÓ°ÏìÆäÉèÖÃΪVPNЧÀÍÆ÷ÔËÐеÄ·ÓÉÆ÷ÖеÄÔ½½çдÈëÎó²î£¨CVE-2022-43931£©¡£¡£¡£¸ÃÎó²î±£´æÓÚ1.4.3-0534ºÍ1.4.4-0635֮ǰµÄSynology VPN Plus ServerµÄÔ¶³Ì×ÀÃæ¹¦Ð§ÖУ¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²îÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£Îó²îµÄCVSSÆÀ·ÖΪ10£¬£¬£¬¿ÉÔÚµÍÖØ´óÐÔ¹¥»÷Öб»Ê¹Ó㬣¬£¬¶øÎÞÐèÄ¿µÄ·ÓÉÆ÷µÄȨÏÞ»òÓû§µÄ½»»¥¡£¡£¡£VPN Plus ServerÔÊÐíÖÎÀíÔ±½«Synology·ÓÉÆ÷ÉèÖÃΪVPNЧÀÍÆ÷£¬£¬£¬À´Ô¶³Ì»á¼û×ÊÔ´¡£¡£¡£´Ë´Î¸üл¹ÐÞ¸´ÁËSRMÖеĶà¸öÎó²î¡£¡£¡£
https://www.bleepingcomputer.com/news/security/synology-fixes-maximum-severity-vulnerability-in-vpn-routers/
3¡¢LockBitΪ¼ÓÄôó¶ù¿ÆÒ½ÔºSickKidsÐû²¼Ãâ·ÑµÄ½âÃÜÆ÷
ýÌå1ÔÂ1Èճƣ¬£¬£¬ÀÕË÷ÍÅ»ïLockBitΪÕë¶Ô¼ÓÄôó¶ù¿ÆÒ½ÔºSickKidsµÄ¹¥»÷ÖÂǸ£¬£¬£¬²¢Ðû²¼Ãâ·ÑµÄ½âÃÜÆ÷¡£¡£¡£¸ÃÍÅ»ïÌåÏÖ£¬£¬£¬ËüµÄÒ»¸öÏàÖúͬ°éÎ¥·´ÁËեȡ¶Ô¿ÉÄܵ¼ÖÂСÎÒ˽¼ÒéæÃüµÄ×é֯ϵͳ¾ÙÐмÓÃܵĹæÔò£¬£¬£¬ÏÖÔÚÒѱ»·â±Õ¡£¡£¡£SickKidsÔÚ2022Äê12ÔÂ18ÈÕÔâµ½¹¥»÷ £¬£¬£¬Æäϵͳ¡¢µç»°Ïß·ºÍÍøÕ¾Êܵ½Ó°Ïì¡£¡£¡£LockBitÌṩµÄÊÇLinux/VMware ESXi½âÃÜÆ÷£¬£¬£¬ÓÉÓÚûÓÐÌØÁíÍâWindows½âÃÜÆ÷£¬£¬£¬ÕâÅú×¢¹¥»÷ÕßÖ»ÄܶÔÒ½ÔºÍøÂçÉϵÄÐéÄâ»ú¾ÙÐмÓÃÜ¡£¡£¡£
https://securityaffairs.com/140193/cyber-crime/lockbit-apologized-attack-sickkids.html
4¡¢ÂíÀ´Î÷ÑǵçÐųÆÁè¼Ý25ÍòUnifi Mobile¿Í»§µÄÊý¾Ýй¶
2022Äê12ÔÂ30ÈÕ±¨µÀ£¬£¬£¬ÂíÀ´Î÷ÑǵçÐÅ£¨Telekom Malaysia Bhd£©Í¸Â¶£¬£¬£¬12ÔÂ28ÈÕÓÐ250248¸öUnifi Mobile¿Í»§Êܵ½Êý¾Ýй¶µÄÓ°Ïì¡£¡£¡£ÆäÖмȰüÀ¨Unifi MobileµÄСÎÒ˽¼Ò¿Í»§£¬£¬£¬Ò²°üÀ¨ÖÐСÐÍÆóÒµ(SME)¡£¡£¡£Ð¹Â¶µÄÊý¾ÝÀàÐÍÖ÷񻃾¼°ÐÕÃû¡¢µç»°ºÅÂëºÍµç×ÓÓʼþ£¬£¬£¬Ã»ÓÐÆäËüÐÅϢй¶¡£¡£¡£TMÌåÏÖÒÑ֪ͨÊÜÓ°ÏìÓû§£¬£¬£¬²¢ÏòÓйØÕþ¸®±¨¸æ´ËÊ¡£¡£¡£¸Ã¹«Ë¾²¢Î´ËµÃ÷ÕâÊǺÎÖÖÎ¥¹æÐÐΪ»òÊÇÔõÑù±¬·¢¡£¡£¡£
https://www.nst.com.my/business/2022/12/865784/250248-unifi-mobile-customers-affected-data-breach-says-tm
5¡¢EmisoftÐû²¼2022ÄêÃÀ¹úÀÕË÷¹¥»÷Ì¬ÊÆµÄͳ¼ÆÆÊÎö±¨¸æ
1ÔÂ2ÈÕ£¬£¬£¬EmisoftÐû²¼Á˹ØÓÚ2022ÄêÃÀ¹úÀÕË÷¹¥»÷Ì¬ÊÆµÄͳ¼ÆÆÊÎö±¨¸æ¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬2022ÄêµÄÀÕË÷¹¥»÷Ó°ÏìÁËÃÀ¹úÕþ¸®¡¢½ÌÓýºÍÒ½ÁƱÊÖ±ÁìÓò¹«¹²²¿·ÖµÄ200¶à¸ö´óÐÍ×éÖ¯¡£¡£¡£Óë2021ÄêÏà±È£¬£¬£¬Õë¶ÔµØ·½Õþ¸®µÄÀÕË÷¹¥»÷´Ó77ÆðÔöÌíµ½105Æð£»£»£»£»£»£»ÀÕË÷Èí¼þѬȾÁËÃÀ¹ú89¼Ò½ÌÓý»ú¹¹¡¢44Ëù´óѧºÍ45¸öÑ§Çø£¬£¬£¬ºÚ¿ÍÔÚÖÁÉÙ58´Î¹¥»÷ÖÐÇÔÈ¡ÁËÊý¾Ý£»£»£»£»£»£»Õë¶ÔÒ½ÔººÍ¶àÒ½ÔºÎÀÉúϵͳµÄ¹¥»÷2022ÄêÔöÌíµ½24Æð£¬£¬£¬¿ÉÄÜÓ°Ïì¶à´ï289¼ÒÒ½Ôº¡£¡£¡£
https://www.emsisoft.com/en/blog/43258/the-state-of-ransomware-in-the-us-report-and-statistics-2022/
6¡¢ImpervaÐû²¼2022ÄêDDoS¹¥»÷ÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£
ImpervaÔÚ2022Äê12ÔÂ27ÈÕÐû²¼ÁË2022ÄêDDoS¹¥»÷ÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£×Ô2021ÄêÒÔÀ´£¬£¬£¬DDoS¹¥»÷ÔÚÊýÄ¿ºÍƵÂÊÉ϶¼ÓÐÉÏÉýµÄÇ÷ÊÆ£¬£¬£¬Ã¿ÃëÖÁÉÙ50ÍòRPSµÄµÚ7²ãDDoS¹¥»÷ÔÚÒÑÍùÒ»ÄêÖÐÔöÌíÁË81%¡£¡£¡£³ýÁËÆµÂʸü¸ßÖ®Í⣬£¬£¬2022Äê×î´ó¹¥»÷±È2021ÄêµÄ´ó4.5±¶¡£¡£¡£2021ÄêϰëÄ꣬£¬£¬Æ½¾ùÿÔ±¬·¢2.2´Î´ó¹æÄ£DDoS¹¥»÷£¬£¬£¬2022ÄêÆ½¾ùÿÔ±¬·¢4´Î´ó¹æÄ£¹¥»÷¡£¡£¡£2021ÄêµÄËùÓй¥»÷¾ùµÍÓÚ100ÍòRPS£¬£¬£¬µ«2022Äê´ó¹æÄ£DDoS¹¥»÷µÄƽ¾ùֵΪ145ÍòRPS£¬£¬£¬ÆäÖÐ×î´ó¹¥»÷µÖ´ï1000ÍòRPS¡£¡£¡£2021Ä꣬£¬£¬´ó¹æÄ£¹¥»÷Ö÷ÒªÕë¶ÔÕþ¸®¡¢½ðÈÚºÍÆû³µÍøÕ¾£¬£¬£¬2022ÄêÔòÊÇÕë¶ÔÆû³µ¡¢ÅÌËãºÍµçÐÅÁìÓò¡£¡£¡£
https://www.imperva.com/blog/81-increase-in-large-volume-ddos-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ