¡¾Çå¾²²¥±¨¡¿Wi-FiͬÃËÕýʽÐû²¼ÐÂÒ»´úÇå¾²±ê×¼WPA3£¬£¬£¬£¬£¬£¬£¬¿É½øÒ»²½Ìá¸ßÍøÂçÇå¾²ÐÔ
±¾ÖÜÒ»Wi-FiͬÃËÕýʽÐû²¼ÐÂÒ»´úÇå¾²±ê×¼WPA3£¬£¬£¬£¬£¬£¬£¬WPA3ÊÇÓÃÓÚWi-FiÅþÁ¬µÄÓû§Éí·ÝÑéÖ¤ÊÖÒÕµÄ×îа汾¡£¡£¡£¡£¡£WPA3ÓÐÁ½ÖÖÇ徲ģʽ£¬£¬£¬£¬£¬£¬£¬WPA3-PersonalºÍWPA3-Enterprise£¬£¬£¬£¬£¬£¬£¬ÕâÁ½ÖÖÇ徲ģʽµÄÖ÷񻂿±ðÔÚÓÚÉí·ÝÑéÖ¤½×¶Î¡£¡£¡£¡£¡£¹ØÓÚÆóÒµ¡¢Õþ¸®ºÍ½ðÈÚÍøÂçÖÐʹÓõÄ×°±¸£¬£¬£¬£¬£¬£¬£¬½¨ÒéʹÓÃWPA3-EnterpriseÇ徲ģʽ£¬£¬£¬£¬£¬£¬£¬WPA3-PersonalÔòÊÇÃæÏòͨË×СÎÒ˽¼ÒÓû§¡£¡£¡£¡£¡£Wi-FiͬÃËÌåÏÖWPA3µÄSAEËã·¨Äܹ»µÖÓù±©Á¦¹¥»÷£¬£¬£¬£¬£¬£¬£¬WPA3½«ÔÚ¶à´Îʧ°ÜʵÑéºó×èÖ¹ÈÏÖ¤ÇëÇ󡣡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/new-wpa3-wi-fi-standard-released/
¡¾ÍþвÇ鱨¡¿Çå¾²Ñо¿ÍŶӷ¢Ã÷Ö÷ÒªÕë¶Ô¶«ÄÏÑǵĹ¥»÷»î¶¯Rancor
Palo Alto NetworksµÄUnit 42Ñо¿ÍŶÓÊӲ쵽Õë¶Ô¶«ÄÏÑǵÄһϵÁй¥»÷»î¶¯£¬£¬£¬£¬£¬£¬£¬Æä¶ñÒâÈí¼þµÄ·Ö·¢ºÍÄ¿µÄµÄÑ¡Ôñ¾ßÓи߶ÈÕë¶ÔÐÔ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪ¸Ã¹¥»÷ÕßÊÇÒ»¸öδ֪µÄ×éÖ¯Rancor£¬£¬£¬£¬£¬£¬£¬RancorÖ÷ҪʹÓÃÁ½¸ö¶ñÒâÈí¼þ¼Ò×壬£¬£¬£¬£¬£¬£¬DDKONGºÍPLAINTEE¡£¡£¡£¡£¡£DDKONGÊÇÆäÖ÷ÒªµÄ¶ñÒâÈí¼þ¹¤¾ß£¬£¬£¬£¬£¬£¬£¬PLAINTEEËÆºõÊÇÐÂÔöÌíµÄ¹¤¾ß¡£¡£¡£¡£¡£Æä¹¥»÷Ä¿µÄ°üÀ¨µ«²»ÏÞÓÚÐÂ¼ÓÆÂºÍ¼íÆÒÕ¯¡£¡£¡£¡£¡£ÕâЩ¹¥»÷»î¶¯´Ó´¹ÂÚÐÅÏ¢×îÏÈ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÔΪÆäÖ÷ÒªÕë¶ÔÕþÖÎʵÌå¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://researchcenter.paloaltonetworks.com/2018/06/unit42-rancor-targeted-attacks-south-east-asia-using-plaintee-ddkong-malware-families/
¡¾ÍþвÇ鱨¡¿Ñо¿Ö°Ô±³Æ2017ÄêµÄÿһ¸ö¼ÓÃÜÇ®±ÒICOƽ¾ù°üÀ¨5¸öÇå¾²Îó²î
Positive.com·¢Ã÷2017ÄêµÄÿһ¸ö¼ÓÃÜÇ®±ÒICOƽ¾ù±£´æ5¸öÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬´ó´ó¶¼Îó²î¶¼ÊÇÔÚICO×Ô¼ºµÄÖÇÄܺÏÔ¼Öз¢Ã÷µÄ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ2017ÄêËùÓеÄICOÒÆ¶¯Ó¦Óö¼±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÁíÍâÈý·ÖÖ®Ò»µÄÎó²î·ºÆðÔÚICOµÄwebÓ¦ÓÃÖУ¬£¬£¬£¬£¬£¬£¬Îó²î¹æÄ£°üÀ¨´úÂë×¢È롢ЧÀÍÆ÷Ãô¸ÐÊý¾Ýй¶¡¢²»Çå¾²µÄÊý¾Ý´«ÊäÒÔ¼°í§ÒâÎļþ¶ÁÈ¡µÈ¡£¡£¡£¡£¡£ICO×éÖ¯ÕßÍùÍùûÓÐΪÆäÏîĿע²áÉ罻ýÌåÕË»§£¬£¬£¬£¬£¬£¬£¬Ê¹ÆäÓû§Ò×ÊÜÉç½»¹¤³ÌºÍ´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£×îºó£¬£¬£¬£¬£¬£¬£¬ICO×éÖ¯ÕßÍùÍùδÄÜΪÆäÃô¸ÐÕË»§ÆôÓÃË«ÒòËØÈÏÖ¤£¬£¬£¬£¬£¬£¬£¬µ¼Ö¹¥»÷Õß¿ÉÄÜÐ®ÖÆ¹Ù·½ÍøÕ¾»òÇ®°ü¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/researchers-last-year-s-icos-had-five-security-vulnerabilities-on-average/
¡¾ÍþвÇ鱨¡¿Çå¾²Ñо¿ÍŶÓÐû²¼ÀÕË÷Èí¼þThanatosµÄ½âÃܹ¤¾ß
˼¿ÆTalosÐû²¼ÀÕË÷Èí¼þThanatosµÄÃ⺬»ìÃܹ¤¾ß£¬£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ßÔÚThanatos°æ±¾1ºÍ1.1ÒÔ¼°ÆäËüÒÑÖª°æ±¾É϶¼ÓÐÓᣡ£¡£¡£¡£Thanatosͨ¹ýŲÓÃGetTickCount»ñȡϵͳÔËÐÐʱ¼äµÄºÁÃëÊý£¬£¬£¬£¬£¬£¬£¬È»ºóÌìÉú¼ÓÃÜÃÜÔ¿£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃ(AES)-256¾ÙÐмÓÃÜ¡£¡£¡£¡£¡£Òò´ËÆäÃÜÔ¿ÊÇÒ»¸ö32λµÄÖµ£¬£¬£¬£¬£¬£¬£¬ÔÚÆ½¾ùÿÃë10Íò´ÎµÄ±©Á¦ÆÆ½âÏ£¨²âÊÔÐéÄâ»úµÄ»ù×¼£©£¬£¬£¬£¬£¬£¬£¬»ñµÃÃÜÔ¿ÐèÒªÔ¼14·ÖÖÓµÄʱ¼ä¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://blog.talosintelligence.com/2018/06/ThanatosDecryptor.html
¡¾ÆÊÎö±¨¸æ¡¿Ñо¿ÍŶÓÐû²¼¹ØÓÚ¹ã¸æÈí¼þPbotµÄбäÌåµÄÆÊÎö±¨¸æ
¿¨°Í˹»ùʵÑéÊÒ·¢Ã÷¹ã¸æÈí¼þPBot£¨PythonBot£©µÄбäÌ壬£¬£¬£¬£¬£¬£¬¸Ã±äÌåÊÔͼÔÚÓû§µÄä¯ÀÀÆ÷ÉÏ×°ÖÃ¹ã¸æ²å¼þ£¬£¬£¬£¬£¬£¬£¬ÕâЩ²å¼þ»áÔÚÍøÒ³ÉÏÌí¼ÓÖÖÖÖ¹ã¸æ£¬£¬£¬£¬£¬£¬£¬²¢½«Óû§Öض¨Ïòµ½¹ã¸æÍøÕ¾¡£¡£¡£¡£¡£PBotµÄ¿ª·¢Ö°Ô±Ò»Ö±Ðû²¼¸Ã±äÌåµÄа汾£¬£¬£¬£¬£¬£¬£¬Ã¿¸ö°æ±¾¶¼»áʹ¾ç±¾»ìÏý±äµÃÔ½·¢Öش󡣡£¡£¡£¡£ÔÚ4Ô·ݿ¨°Í˹»ù¼ì²âµ½Áè¼Ý5Íò´Î×°ÖÃPBotµÄʵÑ飬£¬£¬£¬£¬£¬£¬ÔÚ5Ô·ÝÕâÒ»Êý×ÖÉõÖÁ»¹ÔÚÔöÌí¡£¡£¡£¡£¡£PBotÖ÷ÒªÕë¶Ô¶íÂÞ˹¡¢ÎÚ¿ËÀ¼ºÍ¹þÈø¿Ë˹̹µÄÓû§¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://securelist.com/pbot-evolving-adware/86242/
¡¾Çå¾²Îó²î¡¿Ñо¿Ö°Ô±³ÆJolokiaµÄ¹ýʧÉèÖÿÉÄܵ¼ÖÂÐÅϢй¶»òDoS
Çå¾²Ñо¿Ö°Ô±Mat Mannion·¢Ã÷Jolokia Java Management Extensions£¨JMX£©±£´æÒ»Ð©Çå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼Ö¾ܾøÐ§ÀÍ¡¢ÐÅϢй¶µÈÕë¶ÔJava WebЧÀÍÆ÷µÄDZÔÚ¹¥»÷¡£¡£¡£¡£¡£Mannion³ÆJolokiaµÄĬÈÏÉèÖò¢²»Çå¾²£¬£¬£¬£¬£¬£¬£¬Ã»ÓоÙÐÐÊʵ±ÉèÖõÄJolokia¿ÉÄܸøÍøÕ¾´øÀ´Î£º¦£¬£¬£¬£¬£¬£¬£¬ÉõÖÁ°üÀ¨Ò»Ð©½ðÈÚ»ú¹¹µÄÍøÕ¾¡£¡£¡£¡£¡£Mannion»¹Ðû²¼ÁËÕë¶ÔApache Tomcat 8µÄPoC¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://matmannion.com/jolokiapwn/