Docker HubÉÏÍйܵĴó×Ú¾µÏñй¶˽ԿºÍAPIÃÜÔ¿µÈÐÅÏ¢
Ðû²¼Ê±¼ä 2023-07-181¡¢Docker HubÉÏÍйܵĴó×Ú¾µÏñй¶˽ԿºÍAPIÃÜÔ¿µÈÐÅÏ¢
¾ÝýÌå7ÔÂ16ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬µÂ¹úÑÇ衹¤Òµ´óѧÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬Docker HubÉÏÍйܵĴó×Ú¾µÏñй¶Ãô¸ÐµÄÐÅÏ¢¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÆÊÎöÁËÀ´×ÔDocker HubºÍÊýǧ¸ö˽ÓÐ×¢²á±íµÄ337171¸ö¾µÏñ£¬£¬£¬£¬£¬£¬·¢Ã÷Ô¼8.5%°üÀ¨Ë½Ô¿ºÍAPIÃÜÔ¿µÈÊý¾Ý¡£¡£¡£¡£¡£Ê¹ÓÃÕýÔò±í´ïʽËÑË÷ÌØ¶¨Ãü¾ÝµÄÆÊÎöÏÔʾ£¬£¬£¬£¬£¬£¬28621¸öDocker¾µÏñй¶ÁË52107¸öÓÐÓÃ˽ԿºÍ3158¸ö²î±ðµÄAPIÃÜÔ¿¡£¡£¡£¡£¡£´ó´ó¶¼Ð¹Â¶µÄÐÅÏ¢£¨95%Ϊ˽Կ£¬£¬£¬£¬£¬£¬90%ΪAPIÃÜÔ¿£©¶¼±£´æÓÚµ¥Óû§¾µÏñÖУ¬£¬£¬£¬£¬£¬ÕâÅú×¢ËüÃÇ¿ÉÄÜÊÇÎÞÒâ¼äй¶µÄ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/thousands-of-images-on-docker-hub-leak-auth-secrets-private-keys/
2¡¢Rapid7͸¶¶à¸öAdobe ColdFusionÎó²îÒѱ»×Ô¶¯Ê¹ÓÃ
Rapid7ÔÚ7ÔÂ17ÈÕ͸¶£¬£¬£¬£¬£¬£¬ÆäÊӲ쵽Adobe ColdFusionÎó²îÔÚ¶à¸ö¿Í»§ÏµÍ³Öб»Ê¹ÓõÄÇéÐΡ£¡£¡£¡£¡£Æ¾Ö¤ÏÖÓÐÖ¤¾Ý£¬£¬£¬£¬£¬£¬¹¥»÷ÕßËÆºõÔÚʹÓûá¼û¿ØÖÆÈƹýÎó²î(CVE-2023-29298)ºÍÁíÒ»¸öÎó²î¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬ÊӲ쵽µÄ¹¥»÷ËÆºõÓëCVE-2023-38203Ïà¹Ø¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬AdobeÔÚ7ÔÂ11ÈÕΪCVE-2023-29298ÌṩµÄÐÞ¸´³ÌÐò²¢²»ÍêÕû£¬£¬£¬£¬£¬£¬¾ÓɼòÆÓÐ޸ĵÄÎó²îʹÓÃÈÔÈ»ÊÊÓÃÓÚ×îа汾µÄColdFusion¡£¡£¡£¡£¡£µ«ÓÉÓÚ¸ÃÎó²îÐèÒªÓëÁíÒ»¸öÎó²îÁ¬ÏµÊ¹Ó㬣¬£¬£¬£¬£¬ÀýÈçCVE-2023-38203¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬×°ÖÃ×îа汾µÄColdFusionÈÔ¿ÉÒÔ×èÖ¹Îó²îµÄʹÓᣡ£¡£¡£¡£
https://www.rapid7.com/blog/post/2023/07/17/etr-active-exploitation-of-multiple-adobe-coldfusion-vulnerabilities/
3¡¢¿ÆÂÞÀ¶àÖÝÁ¢´óѧÔâµ½ÀÕË÷¹¥»÷ѧÉúºÍÔ±¹¤µÄÐÅϢй¶
¾Ý7ÔÂ14ÈÕ±¨µÀ£¬£¬£¬£¬£¬£¬¿ÆÂÞÀ¶àÖÝÁ¢´óѧ(CSU)Ôâµ½ÁËClopÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬ÏÖÈκÍǰÈÎѧÉúºÍÔ±¹¤µÄСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£¸Ã´óѧÓÚ7ÔÂ12ÈÕÏòÊÜÓ°ÏìµÄСÎÒ˽¼ÒÐû²¼Í¨Öª¡£¡£¡£¡£¡£´Ë´Îй¶²¢²»ÊÇCSUµÄϵͳÔâµ½¹¥»÷µ¼Öµģ¬£¬£¬£¬£¬£¬¶øÊÇЧÀÍÌṩÉÌ¡¢TIAA¡¢¹ú¼ÒѧÉúÐÅÏ¢½»Á÷ËùºÍCorebridge FinancialµÈʹÓÃÁËMOVEit TransferÇå¾²Îļþ´«ÊäÆ½Ì¨Ôâµ½ÈëÇÖµ¼Öµġ£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸ÃѧУ²»»áÏòCSU»áÔ±ÌṩÉí·Ý͵ÇÔ±£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬£¬£¬½¨Òé»áÔ±×ñÕÕFTCÐû²¼µÄ½¨Òé¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/colorado-state-university-says-data-breach-impacts-students-staff/
4¡¢Cyble·¢Ã÷ð³äTeamViewer×°ÖóÌÐò·Ö·¢njRATµÄ»î¶¯
7ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬CybleÅû¶ÁËð³äTeamViewer×°ÖóÌÐò·Ö·¢Ä¾ÂínjRAT£¨ÓÖÃûBladabindi£©µÄ»î¶¯¡£¡£¡£¡£¡£njRAT×î³õÓÚ2012Äê±»·¢Ã÷£¬£¬£¬£¬£¬£¬Ö÷ÒªÓÃÓÚÕë¶ÔÖж«¹ú¼ÒµÄ×éÖ¯¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷µÄ¶ñÒâÈí¼þÑù±¾ÊÇÒ»¸ö32λÖÇÄÜ×°ÖóÌÐò£¬£¬£¬£¬£¬£¬Ëü»á×°ÖÃÒ»¸öÕý°æTeamViewerÓ¦ÓúͶñÒâÈí¼þnjRAT¡£¡£¡£¡£¡£Ö´Ðк󣬣¬£¬£¬£¬£¬»áÆô¶¯TeamViewerÓ¦Óò¢´¥·¢njRAT¡£¡£¡£¡£¡£ÎªÁËÈ·¼á³¤ÆÚÐÔ£¬£¬£¬£¬£¬£¬njRAT»¹ÐÞ¸ÄϵͳÉèÖ㬣¬£¬£¬£¬£¬´Ó¶øÈƹýÇå¾²ÖÒÑÔÌáÐÑ¡£¡£¡£¡£¡£²¢ÔÚϵͳע²á±íÖн¨Éè×Ô¶¯ÔËÐÐÌõÄ¿£¬£¬£¬£¬£¬£¬ÒÔ°ü¹Üÿ´ÎϵͳÆô¶¯Ê±×Ô¶¯ÔËÐС£¡£¡£¡£¡£
https://blog.cyble.com/2023/07/13/trojanized-application-preying-on-teamviewer-users/
5¡¢ZimbraÌáÐÑÓû§ÊÖ¶¯ÐÞ¸´ÆäZCSÖÐÒѱ»Ê¹ÓõÄXSSÎó²î
7ÔÂ13ÈÕ±¨µÀ³Æ£¬£¬£¬£¬£¬£¬ZimbraÌáÐÑÓû§ÊÖ¶¯ÐÞ¸´Zimbra Collaboration Suite(ZCS)µç×ÓÓʼþЧÀÍÆ÷ÖÐÒѱ»Ê¹ÓõÄXSSÎó²î¡£¡£¡£¡£¡£ËäÈ»ZimbraûÓÐ͸¶¸ÃÎó²î±»ÓÃÓÚ¹¥»÷£¬£¬£¬£¬£¬£¬µ«Google TAGÌåÏÖ£¬£¬£¬£¬£¬£¬¸ÃXSSÎó²îÊÇÔÚÒ»´ÎÓÐÕë¶ÔÐԵĹ¥»÷Öб»·¢Ã÷µÄ¡£¡£¡£¡£¡£ZimbraÉÐδÌṩÇå¾²²¹¶¡À´ÐÞ¸´Õâ¸öÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬µ«ËüȷʵÌṩÁËÒ»¸öÐÞ¸´³ÌÐò£¬£¬£¬£¬£¬£¬²¢½¨ÒéÖÎÀíÔ±ÊÖ¶¯Ó¦ÓøÃÐÞ¸´³ÌÐòÀ´ÐÞ¸´´ËÎó²î¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Zimbra³Æ¸ÃÐÞ¸´³ÌÐòÍýÏëÔÚ7Ô·ݵIJ¹¶¡ÖÐÌṩ¡£¡£¡£¡£¡£
https://securityaffairs.com/148429/hacking/zimbra-collaboration-suite-zeroday.html
6¡¢Check PointÐû²¼2023ÄêQ2ÍøÂç¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ
7ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬Check PointÐû²¼2023ÄêµÚ¶þ¼¾¶ÈÍøÂç¹¥»÷Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£2023ÄêQ2£¬£¬£¬£¬£¬£¬È«Çòƽ¾ùÿÖܹ¥»÷´ÎÊý½ÏÉÏÄêÔöÌí8%£¬£¬£¬£¬£¬£¬Ã¿¸ö×é֯ÿÖܵį½¾ù¹¥»÷´ÎÊýµÖ´ï1258´Î¡£¡£¡£¡£¡£½ÌÓýºÍÑо¿ÐÐÒµÔâµ½µÄ¹¥»÷´ÎÊý×î¶à£¬£¬£¬£¬£¬£¬Ã¿¸ö×é֯ƽ¾ùÿÖܱ»¹¥»÷2179´Î£¬£¬£¬£¬£¬£¬Óë2022ÄêQ2Ïà±ÈϽµÁË6% ¡£¡£¡£¡£¡£Õþ¸®ºÍ¾üʲ¿·Ö´ÎÖ®£¬£¬£¬£¬£¬£¬Æ½¾ùÿÖÜ1772´Î¹¥»÷£¬£¬£¬£¬£¬£¬±ÈÈ¥ÄêͬÆÚÔöÌí9%¡£¡£¡£¡£¡£·ÇÖÞµÄ×éÖ¯Ôâµ½µÄ¹¥»÷×î¶à£¬£¬£¬£¬£¬£¬±ÈÈ¥Äêͬ±ÈÔöÌí23%¡£¡£¡£¡£¡£Æä´ÎÊÇÑÇÌ«µØÇø£¬£¬£¬£¬£¬£¬ÔöÌíÁË22%¡£¡£¡£¡£¡£È«Çòÿ44¸ö×éÖ¯ÖоÍÓÐ1¸öÔâµ½ÁËÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬ÆäÖÐÕþ¸®ºÍ¾üÊÂÐÐÒµÔâµ½´ËÀ๥»÷µÄ´ÎÊý×î¶à¡£¡£¡£¡£¡£
https://blog.checkpoint.com/security/average-weekly-global-cyberattacks-peak-with-the-highest-number-in-2-years-marking-an-8-growth-year-over-year-according-to-check-point-research/


¾©¹«Íø°²±¸11010802024551ºÅ