²¿·ÖOutLookÕÊ»§ÐÅϢй¶£»Ð¶ñÒâÈí¼þ¿É¸Ä¶¯CATºÍMRIɨÃèÒǵÄÒ½ÁÆÉ¨ÃèЧ¹û

Ðû²¼Ê±¼ä 2019-04-15
1.΢ÈíÔâºÚ¿Í¹¥»÷£¬²¿·ÖÓû§µÄOutLookÕÊ»§ÐÅϢй¶


×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


΢Èí֤ʵ1ÔÂ1ÈÕÖÁ3ÔÂ29ÈÕʱ´ú¹¥»÷ÕßÈëÇÖÁËÒ»¸ö¿Í»§Ö§³Ö´úÀíÕË»§£¬²¢Ê¹ÓøÃÕË»§»á¼ûÁ˿ͻ§Ö§³ÖÃÅ»§ÍøÕ¾¼°²¿·ÖOutLookÓû§µÄÏà¹ØÐÅÏ¢¡£ÕâЩÐÅÏ¢°üÀ¨µç×ÓÓʼþµØÖ·¡¢Îļþ¼ÐÃû³Æ¡¢ÓʼþÖ÷Ìâ¼°ÁªÏµÈ˵ç×ÓÓʼþµØÖ·£¬µ«²»°üÀ¨Óʼþ¼°¸½¼þµÄÄÚÈÝ¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷µÄÏêϸϸ½Ú£¬µ«Î¢ÈíÌåÏÖÒѾ­½ûÓÃÁ˸ôúÀíÕË»§µÄƾ֤£¬²¢Í¨ÖªËùÓÐÊÜÓ°ÏìµÄÓû§¡£Î¢ÈíҲûÓÐ͸¶ÊÜÓ°ÏìµÄÓû§×ÜÊý¡£

   

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/04/microsoft-outlook-email-hack.html


2.°®´ïºÉÖÝÀ¶Ê®×Ö»á¹ÙÍøÔâºÚ¿ÍÈëÇÖ£¬²¿·ÖÓû§µÄСÎÒ˽¼ÒÐÅϢй¶

×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


°®´ïºÉÖÝÀ¶Ê®×Ö»áµÄµçÉÌÍøÕ¾ÓÚ3ÔÂ21ÈÕÔâºÚ¿ÍÈëÇÖ£¬¹¥»÷ÕßÊÔͼÌᳫڲƭÐÔµÄÉúÒ⣬µ«Ã»ÓÐÀֳɡ£±ðµÄ£¬¹¥»÷Õß»¹»á¼ûÁ˰üÀ¨Óû§PHIÐÅÏ¢µÄ»ã¿îÎļþ£¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨Óû§µÄÐÕÃû¡¢¹ÒºÅ/¶©ÔĺÅÂë¡¢·þÎñÈÕÆÚ¡¢Ò½ÁÆ·þÎñÌṩÕßµÄÃû×Ö¡¢»¼ÕßÕ˺𢏶¿îÐÅÏ¢µÈ£¬µ«²»°üÀ¨Éç»áÇå¾²ºÅÂë¡¢¼ÝÕÕID¼°ÐÅÓÿ¨ºÅÂ롣ƾ֤ÊÓ²ìЧ¹û£¬À¶Ê®×Ö»áÒÔΪ¹¥»÷Õß»á¼ûÁËÔ¼1%µÄÓû§ÐÅÏ¢¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/blue-cross-of-idaho-notice-of-privacy-breach/


3.ºÚ¿ÍÍÅ»ïÔÚÍøÉÏÐû²¼ÊýǧÃûÃÀ¹ú¾¯Ô±ºÍÁª°îÌØ¹¤µÄСÎÒ˽¼ÒÊý¾Ý

×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!

¾ÝÍâýTechcrunch±¨µÀ£¬Ò»¸öºÚ¿ÍÍÅ»ïÉù³ÆÈëÇÖÁËÊýÊ®¸öFBIÁ¥ÊôÍøÕ¾£¬²¢ÇÔÈ¡ÁËÊôÓÚÃÀ¹úÁª°î»ú¹¹ºÍ¹«¹²·þÎñ×éÖ¯Ô±¹¤µÄÁè¼ÝÒ»°ÙÍòÌõÊý¾Ý¡£¸ÃÍÅ»ïÔÚÍøÉÏÐû²¼ÁËÊýÊ®¸öÎļþ£¬ÆäÖаüÀ¨Ô¼4000ÃûÃÀ¹ú¾¯Ô±ºÍÁª°îÌØ¹¤µÄÏêϸСÎÒ˽¼ÒÐÅÏ¢£¬ÕâЩÐÅÏ¢°üÀ¨ÐÕÃû¡¢Ð¡ÎÒ˽¼ÒºÍÕþ¸®ÓÊÏ䵨ַ¡¢Ö°Î»¡¢µç»°ºÅÂëºÍÓÊÕþµØÖ·¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/83763/data-breach/fbi-affiliated-websites-hack.html


4.ÃÀ¹ú¸ñÁÖά¶ûÊÐÔâÐÂÀÕË÷Èí¼þRobbinHood¹¥»÷£¬ÊÂÎñÈÔÔÚÊÓ²ì

×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


ÐÂÀÕË÷Èí¼þRobbinHoodÕýÔÚÆð¾¢¾ÙÐй¥»÷Ô˶¯£¬Ñо¿Ö°Ô±ÉÐÎ´ÍøÂçµ½RobbinHoodµÄÑù±¾£¬µ«ÒÑÓжàÃûÊܺ¦ÕßÖÐÕС£RobbinHoodµÄÊê½ðÊÇÿ̨ÅÌËã»ú3±ÈÌØ±Ò»òÕû¸öÍøÂç7±ÈÌØ±Ò£¬²¢ÔÚµÚËÄÌìÖ®ºóÊê½ðÖðÈÕÔöÌí1ÍòÃÀÔª¡£ÔÚRobbinHoodµÄTorÖ§¸¶Ò³ÃæÉÏ£¬¹¥»÷ÕßÇ¿µ÷ËûÃÇÊ®·ÖÌåÌùÊܺ¦ÕßµÄÒþ˽£¬²¢½«ÔÚÊܺ¦Õ߸¶¿îºóɾ³ýÏà¹Ø¼Í¼£¬°üÀ¨¼ÓÃÜÃÜÔ¿ºÍIPµØÖ·¡£Ã½Ì屨µÀ³Æ±±¿¨ÂÞÀ´ÄÉÖݵĸñÁÖά¶ûÊÐÔâµ½RobbinHood¹¥»÷£¬Ïà¹ØÖ´·¨»ú¹¹ÕýÔÚ¾ÙÐÐÊӲ졣

 

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/robbinhood-ransomware-claims-its-protecting-your-privacy/


5.д¹ÂÚÔ˶¯The Nasty List£¬Ö÷ÒªÇÔÈ¡InstagramÓû§Æ¾Ö¤

×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


еĴ¹ÂÚȦÌס°The Nasty List¡±£¨ÁîÈËÑá¶ñµÄÃûµ¥£©ÕýÔÚInstagramÉÏÈö²¥£¬Ö÷ÒªÇÔÈ¡Óû§µÄµÇ¼ƾ֤¡£¸Ã´¹ÂÚÐÅÏ¢Éù³ÆÄ¿µÄÓû§»òÓû§µÄÅóÙ­´¦ÓÚÒ»¸öÁîÈËÑá¶ñµÄÃûµ¥ÉÏ£¬²¢°üÀ¨Ãûµ¥ÏêϸÐÅÏ¢µÄÁ´½Ó£¬µ«¸ÃÁ´½ÓÖ¸ÏòÒ»¸öαÔìµÄInstagramµÇÂ¼Ò³Ãæ£¬×Åʵ¼ÊÓòÃûΪnastylist-instatop50[.]me¡£Ò»µ©Óû§ÊäÈëÆ¾Ö¤£¬¹¥»÷Õß½«Ê¹ÓÃËûÃǵÄÕË»§½øÒ»²½Èö²¥¸ÃȦÌס£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/the-nasty-list-phishing-scam-is-sweeping-through-instagram/


6.жñÒâÈí¼þ¿É¸Ä¶¯CATºÍMRIɨÃèÒǵÄÒ½ÁÆÉ¨ÃèЧ¹û

×ðÁú¿­Ê± - ÈËÉú¾ÍÊDz«!


Ben-Gurion´óѧµÄÒ»¸öÑо¿ÍŶÓÑÝʾÁËÒ»ÖÖÄܹ»¸Ä¶¯Ò½ÁÆÉ¨ÃèЧ¹ûµÄжñÒâÈí¼þ£¬ÕâÖÖ¶ñÒâÈí¼þ¿É¸Ä¶¯É¨Ãè³öµÄÒ½ÁÆÍ¼Ïñ£¬½«Ö×ÁöÌí¼Óµ½Í¼ÏñÖлòÊÇ´ÓͼÏñÖÐÒÆ³ýÖ×Áö£¬ÒÔÎóµ¼Ò½ÉúµÄÕïÖÎЧ¹û¡£Ñо¿Ö°Ô±²âÊÔÁË70ÕÅͼÏñ£¬ÀÖ³ÉÓÕÆ­ÁËÈýÃû·ÅÉä¿ÆÒ½ÉúºÍÒ½ÔºµÄ×Ô¶¯É¸Ñ¡ÏµÍ³¡£Ñо¿Ö°Ô±³ÆÕâÖÖ¹¥»÷µÄÔµ¹ÊÔ­ÓÉÊÇÒ½ÁÆ×°±¸µÄÇå¾²²½·¥È±·¦£¬ÀýÈçȱÉÙ¶ÔͼÏñµÄÊðÃûºÍ¼ÓÃÜ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.pandasecurity.com/mediacenter/news/new-malware-healthcare-sector/