Windows¸üе¼ÖÂÀ¶ÆÁ²¢ÏÔʾUNSUPPORTED_PROCESSOR
Ðû²¼Ê±¼ä 2023-08-251¡¢Windows¸üе¼ÖÂÀ¶ÆÁ²¢ÏÔʾUNSUPPORTED_PROCESSOR
¾ÝýÌå8ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬£¬½üÆÚÐû²¼µÄWindows 10ºÍ Windows 11µÄ8Ô·ÝÔ¤ÀÀ¸üпɵ¼ÖÂÀ¶ÆÁ£¬£¬£¬£¬£¬²¢Ö¸³ö²»Ö§³ÖµÄ´¦Öóͷ£Æ÷ÎÊÌâ¡£¡£¡£¡£¡£ÓÐÎÊÌâµÄ¸üл®·ÖΪKB5029351(Win 11)ºÍKB5029331 (Win 10)£¬£¬£¬£¬£¬ËüÃÇÉæ¼°ËÑË÷Ó¦ÓÃÐÞ¸´ºÍÒýÈëеı¸·ÝÓ¦Óᣡ£¡£¡£¡£ÊÜÓ°ÏìÓû§³Æ£¬£¬£¬£¬£¬ÔÚ×°ÖÃ8ÔÂ2ÈÕÐû²¼µÄ¸üк󣬣¬£¬£¬£¬»á·ºÆðÀ¶ÆÁ²¢ÏÔʾ¹ýʧÐÅÏ¢¡°UNSUPPORTED_PROCESSOR¡±¡£¡£¡£¡£¡£²¿·ÖÓû§³Æ£¬£¬£¬£¬£¬ÓÐÎÊÌâµÄ¿ÉÑ¡¸üÐÂÔÚÒ»ÔÙÖØÆôºó»á×Ô¶¯»Ø¹ö¡£¡£¡£¡£¡£Î¢ÈíÕýÔÚÊÓ²ìÕâÒ»ÎÊÌ⣬£¬£¬£¬£¬ÒÔÈ·¶¨ËüÊÇ·ñÓë΢ÈíÏà¹Ø£¬£¬£¬£¬£¬²¢½¨ÒéÓöµ½BSOD¹ýʧµÄÓû§Ê¹Ó÷´ÏìÖÐÐÄÌá½»±¨¸æ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/new-windows-updates-cause-unsupported-processor-blue-screens/
2¡¢ESETÅû¶ͨ¹ýSpacecolon¹¤¾ß¼¯·Ö·¢ScarabµÄ»î¶¯
ESETÔÚ8ÔÂ23ÈÕÅû¶ÁËͨ¹ýÒ»¸öСÐ͹¤¾ß¼¯Spacecolon·Ö·¢ÀÕË÷Èí¼þScarabµÄ»î¶¯¡£¡£¡£¡£¡£Spacecolon¿ÉÒÔ×·Ëݵ½2020Äê5Ô£¬£¬£¬£¬£¬×îа汾±àÒëÓÚ½ñÄê5Ô¡£¡£¡£¡£¡£ËüÓÉÈý¸öDelphi×é¼þ×é³É£¬£¬£¬£¬£¬»®·ÖΪScHackTool¡¢ScInstallerºÍScService¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÈëÇÖWebЧÀÍÆ÷»ò±©Á¦ÆÆ½âRDPƾ֤½øÈëÄ¿µÄ£¬£¬£¬£¬£¬»¹»áƾ֤ÐèÒªÌṩ¶àÖÖµÚÈý·½ºì¶Ó¹¤¾ß£¬£¬£¬£¬£¬×îÖÕ»á×°ÖÃÀÕË÷Èí¼þScarab¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¹¥»÷ÕßËÆºõÕýÔÚ×¼±¸·Ö·¢ÐµÄÀÕË÷Èí¼þScRansom£¬£¬£¬£¬£¬¿ÉÊÇÑо¿Ö°Ô±ÉÐδÔÚÒ°Íâ·¢Ã÷Ëü£¬£¬£¬£¬£¬ÍƲâÆäÈÔ´¦ÓÚ¿ª·¢½×¶Î¡£¡£¡£¡£¡£
https://www.welivesecurity.com/en/eset-research/scarabs-colon-izing-vulnerable-servers/
3¡¢3ǧ¶ą̀OpenfireЧÀÍÆ÷δÐÞ¸´Îó²îCVE-2023-32315
¾Ý8ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬£¬VulncheckÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬Áè¼Ý3000̨OpenfireЧÀÍÆ÷ÈÝÒ×Êܵ½OpenfireÎó²îµÄÓ°Ïì¡£¡£¡£¡£¡£ÕâÊÇÒ»¸ö·¾¶±éÀúÎó²î£¨CVE-2023-32315£©£¬£¬£¬£¬£¬ÓÚ5ÔÂ23ÈÕÅû¶£¬£¬£¬£¬£¬ÏÖÒѱ»ÐÞ¸´¡£¡£¡£¡£¡£µ«ÔÚ6Ô·ÝÓб¨µÀ³Æ£¬£¬£¬£¬£¬¸ÃÎó²î±»Ê¹ÓÃÀ´½¨ÉèÖÎÀíÔ±Óû§²¢ÔÚδÐÞ¸´µÄЧÀÍÆ÷ÖÐÉÏ´«¶ñÒâ²å¼þ¡£¡£¡£¡£¡£VulnCheck³Æ£¬£¬£¬£¬£¬ShodanɨÃè·¢Ã÷ÁË6324̨̻¶µÄOpenfireЧÀÍÆ÷£¬£¬£¬£¬£¬ÆäÖÐ50%£¨3162̨£©Î´´ò²¹¶¡£¡£¡£¡£¡£¬£¬£¬£¬£¬ÈÔÈ»ÈÝÒ×Êܵ½¸ÃÎó²îµÄÓ°Ïì¡£¡£¡£¡£¡£
https://securityaffairs.com/149811/breaking-news/openfire-servers-exposed-new-exploit.html
4¡¢Ñо¿Ö°Ô±¼ì²âµ½Ê®¼¸¸öÕë¶ÔRoblox¿ª·¢ÕߵĶñÒâNPM°ü
ReversingLabsÔÚ8ÔÂ22ÈÕ³ÆÆä¼ì²âµ½Ê®¼¸¸ö¶ñÒâNPM°ü£¬£¬£¬£¬£¬Ö¼ÔÚ×°ÖÿªÔ´ÐÅÏ¢ÇÔÈ¡³ÌÐòLuna Grabber¡£¡£¡£¡£¡£¸Ã»î¶¯Ê¼ÓÚ8Ô³õ£¬£¬£¬£¬£¬Ê¹ÓÃÁËαװ³ÉÕýµ±°ünoblox.jsµÄÄ£¿£¿£¿£¿é¡£¡£¡£¡£¡£¸Ã»î¶¯Õë¶ÔµÄÊÇRobloxÓÎϷƽ̨µÄ¿ª·¢Ö°Ô±£¬£¬£¬£¬£¬Õýµ±µÄnoblox.js°üÊÇÒ»¸ö¿ªÔ´Roblox API·â×°³ÌÐò¡£¡£¡£¡£¡£ReversingLabs½«´Ë´Î»î¶¯ÐÎòΪ2021Äê10Ô·¢Ã÷µÄÒ»´Î¹¥»÷µÄÖØÑÝ£¬£¬£¬£¬£¬µ«¶þÕßÒ²±£´æ²î±ð£¬£¬£¬£¬£¬ÌØÊâÊÇлÏÂÔØÁËÒ»¸ö¿ÉÖ´ÐÐÎļþÀ´×°ÖÃLuna Grabber¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬ÕâÊÇnpmÉÏ·¢Ã÷µÄÓÐÊýµÄ¶à½×¶ÎѬȾ°¸ÀýÖ®Ò»¡£¡£¡£¡£¡£
https://www.reversinglabs.com/blog/fake-roblox-api-packages-luna-grabber-npm
5¡¢Check PointÐû²¼2023ÄêÄêÖÐÇå¾²Ì¬ÊÆµÄÆÊÎö±¨¸æ
8ÔÂ23ÈÕ£¬£¬£¬£¬£¬Check PointÐû²¼ÁË2023ÄêÄêÖÐÍøÂçÇå¾²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£½ö½ñÄêµÚ¶þ¼¾¶È£¬£¬£¬£¬£¬Ã¿ÖÜÍøÂç¹¥»÷¾ÍÔöÌíÁË8%£¬£¬£¬£¬£¬ÕâÊÇÒÑÍùÁ½ÄêÀ´×îÏÔÖøµÄÔö·ù¡£¡£¡£¡£¡£¹¥»÷Õß²»µ«Ê¹ÓÃ×îÐÂÊÖÒÕ£¬£¬£¬£¬£¬»¹Ê¹ÓÃÒѹûÕæÅû¶µÄÎó²îÀ´Ö´ÐжñÒâ»î¶¯¡£¡£¡£¡£¡£ÉϰëÄ꣬£¬£¬£¬£¬¹²ÓÐ48¸öÀÕË÷ÍÅ»ïÉù³ÆÈëÇÖ²¢ÀÕË÷ÁË2200¶à¸öÄ¿µÄ¡£¡£¡£¡£¡£³ýÁËLockbitºÍAlphvµÈÀÏÅÆ¹¥»÷Õߣ¬£¬£¬£¬£¬ÉÐÓÐRoyalºÍPlayµÈÐÂÃæÄ¿¡£¡£¡£¡£¡£±¨¸æ»¹Ö¸³ö£¬£¬£¬£¬£¬ÍøÂçÇå¾²ÊÇÒ»¸ö¶¯Ì¬µÄÕ½³¡£¡£¡£¡£¡£¬£¬£¬£¬£¬ÆóÒµÐèÒªÁ¬Ïµ×îеÄÈ˹¤ÖÇÄÜÇý¶¯µÄ·ÀÓùºÍ¶Ô¾ÉÎó²îµÄÉîÈëÏàʶ£¬£¬£¬£¬£¬Æ¾Ö¤Ò»Ö±×ª±äµÄÍþÐ²Ì¬ÊÆÀ´¿ª·¢×Ô¼ºµÄÇå¾²Õ½ÂÔ¡£¡£¡£¡£¡£
https://pages.checkpoint.com/2023-mid-year-cyber-security-report.html
6¡¢SophosÐû²¼2023ÄêÉϰëÄê¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ
8ÔÂ23ÈÕ£¬£¬£¬£¬£¬SophosÐû²¼Á˹ØÓÚ2023ÄêÉϰëÄê¹¥»÷»î¶¯µÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£ÀÕË÷Èí¼þÔÚÄ¿µÄÍøÂçÉ쮮ᄵÄʱ¼äÔ½À´Ô½ÉÙ£¬£¬£¬£¬£¬ÉϰëÄ꣬£¬£¬£¬£¬ÀÕË÷¹¥»÷ÕßÍ£Áôʱ¼äµÄÖÐλÊý´Ó2022ÄêµÄ9Ìì½µÖÁ5Ìì¡£¡£¡£¡£¡£ËùÓй¥»÷ÀàÐ͵Ä×ÜÌåÍ£Áôʱ¼äΪ8Ì죬£¬£¬£¬£¬µÍÓÚ2022ÄêµÄ10Ìì¡£¡£¡£¡£¡£ÀÕË÷¹¥»÷Õ¼½ñÄêËê¼µÄËùÓй¥»÷µÄ68.75%¡£¡£¡£¡£¡£43.42%µÄ¹¥»÷±¬·¢ÁËÊý¾Ýй¶£¬£¬£¬£¬£¬±ÈÈ¥ÄêÔöÌíÁË1.3%¡£¡£¡£¡£¡£Éó²éÓйØÈÕÆÚºÍʱ¼äµÄÊý¾Ý·¢Ã÷£¬£¬£¬£¬£¬¹¥»÷Õ߸üÏ²î³ØÚÖܶþ¡¢ÖÜÈýºÍÖÜËÄÌᳫ¹¥»÷¡£¡£¡£¡£¡£Ô¶³Ì×ÀÃæÐÒé(RDP)ÈÔÈ»ÊDZ»Ê¹ÓÃ×î¶àµÄ¹¤¾ßÖ®Ò»£¬£¬£¬£¬£¬Í³¼ÆÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬95%µÄ¹¥»÷¶¼Ê¹ÓÃÁËRDP¡£¡£¡£¡£¡£
https://news.sophos.com/en-us/2023/08/23/active-adversary-for-tech-leaders/


¾©¹«Íø°²±¸11010802024551ºÅ