Æ»¹ûÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸ö²úÆ·ÖеÄÎó²î£»£»£»£»¼ÓÃÜÇ®±ÒÉúÒâËùKuCoinÔâ¹¥»÷£¬£¬£¬£¬£¬£¬£¬1.5ÒÚÃÀԪǮ±Ò±»µÁ

Ðû²¼Ê±¼ä 2020-09-27

1.Æ»¹ûÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸ö²úÆ·ÖеÄÎó²î


1.png


Æ»¹ûÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËmacOS Catalina¡¢High SierraºÍMojave£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Windows iCloudÖеĶà¸öÎó²î¡£¡£¡£¡£ ¡£¡£´Ë´ÎÐÞ¸´µÄÎó²î»®·ÖΪI/O×é¼þµÄÔ½½ç¶ÁÈ¡Îó²î£¨CVE-2020-9973£©£¬£¬£¬£¬£¬£¬£¬Éæ¼°Ëæ´¦Öóͷ£¶ñÒâµÄUSDÎļþ£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐлòDoS¹¥»÷£»£»£»£»ImageIOÖеÄÔ½½ç¶ÁÈ¡Îó²î£¨CVE-2020-9961£©£¬£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂí§Òâ´úÂëÖ´ÐУ»£»£»£»É³ºÐÖеÄÎó²î£¨CVE-2020-9968£©¿ÉÔÊÐí¶ñÒâÓ¦ÓóÌÐò»á¼ûÊÜÏÞÖÆµÄÎļþ£»£»£»£»WebKitÖеÄÎó²î£¨CVE-2020-9952£©¿ÉÔÊÐí¿çÕ¾µã¾ç±¾¹¥»÷£»£»£»£»MailÖÐÎó²î£¨CVE-2020-9941£©¿ÉʹԶ³Ì¹¥»÷Õ߸ü¸ÄÓ¦ÓóÌÐò״̬¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2020/09/25/apple-releases-security-updates


2.GoogleÐû²¼Chrome 85Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸öÎó²î


2.png


GoogleÐû²¼Chrome 85Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸öÎó²î¡£¡£¡£¡£ ¡£¡£ÆäÖаüÀ¨Ô½½ç¶ÁÈ¡Îó²î£¨CVE-2020-15960 £©£¬£¬£¬£¬£¬£¬£¬À©Õ¹ÖеÄÕ½ÂÔÖ´ÐÐȱ·¦Îó²î£¨CVE-2020-15961£©¡¢´®ÐÐÖ´ÐеÄÕ½ÂÔȱ·¦Îó²î£¨CVE-2020-15962£©¡¢À©Õ¹ÖеÄÕþ²ßÖ´ÐÐȱ·¦£¨CVE-2020-15963£©¡¢V8ÖеÄÔ½½çдÎó²î£¨CVE-2020-15965£©¡¢À©Õ¹ÖеÄÕþ²ßÖ´ÐÐȱ·¦£¨CVE-2020-15966£©ºÍýÌåÖеÄÊý¾ÝÑé֤ȱ·¦Îó²î£¨CVE-2020-15964£©¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/chrome-vulnerabilities-expose-users-attacks-malicious-extensions


3.¼ÓÃÜÇ®±ÒÉúÒâËùKuCoinÔâ¹¥»÷£¬£¬£¬£¬£¬£¬£¬1.5ÒÚÃÀԪǮ±Ò±»µÁ


3.jpg


×ܲ¿Î»ÓÚÐÂ¼ÓÆÂµÄ¼ÓÃÜÇ®±ÒÉúÒâËùKuCoinÅû¶ÆäÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬¼ÛÖµ1.5ÒÚÃÀÔªµÄÇ®±Ò±»µÁ¡£¡£¡£¡£ ¡£¡£¸Ã¹«Ë¾ÔÚÉùÃ÷ÖÐ֤ʵ£¬£¬£¬£¬£¬£¬£¬Ò»ºÚ¿ÍÈëÇÖÁËÆäϵͳ£¬£¬£¬£¬£¬£¬£¬²¢ÍµÈ¡ÁËÆäÈÈÇ®°üÖеÄËùÓÐ×ʲú£¬£¬£¬£¬£¬£¬£¬°üÀ¨±ÈÌØ±Ò¡¢erc -20´ú±ÒÒÔ¼°ÆäËûÀàÐ͵Ĵú±Ò¡£¡£¡£¡£ ¡£¡£Æ¾Ö¤Óû§×·×Ù±»µÁ×ʽðµÄEtheriumµØµã£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÔ¤¼ÆËðʧ×îСΪ1.5ÒÚÃÀÔª¡£¡£¡£¡£ ¡£¡£KuCoinÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÒѾ­Æô¶¯ÁËÇå¾²É󼯣¬£¬£¬£¬£¬£¬£¬µ«ÆäÉÐδ·µ»ØÆäËû̸ÂÛÇëÇ󡣡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/kucoin-cryptocurrency-exchange-hacked-for-150-million/


4.Twitter³ÆÒòÆäЧÀÍÉèÖùýʧ£¬£¬£¬£¬£¬£¬£¬Óû§µÄAPIÃÜÔ¿¿ÉÄÜ»áй¶


4.jpg


Twitter³ÆÒòÆäDeveloperÃÅ»§ÉÏЧÀÍÉèÖùýʧ£¬£¬£¬£¬£¬£¬£¬Óû§µÄAPIÃÜÔ¿¿ÉÄÜ»áй¶¡£¡£¡£¡£ ¡£¡£developer.twitter.comÊÇ¿ª·¢Ö°Ô±ÖÎÀíTwitterÓ¦ÓóÌÐòºÍ¸½¼ÓAPIÃÜÔ¿µÄÃÅ»§£¬£¬£¬£¬£¬£¬£¬Í¬Ê±Ò²°üÀ¨TwitterÕË»§µÄ»á¼ûÁîÅÆºÍÃÜÔ¿¡£¡£¡£¡£ ¡£¡£¸ÃÍøÕ¾ÒòÉèÖÃÎÊÌâ»áÏòä¯ÀÀÆ÷·¢Ë͹ýʧָÁ£¬£¬£¬£¬£¬£¬Ê¹Æä½¨ÉèºÍ´æ´¢APIÃÜÔ¿¡¢ÕË»§»á¼ûÁîÅÆºÍÕÊ»§ÃÜÂëµÄ¸±±¾¡£¡£¡£¡£ ¡£¡£¹ØÓÚʹÓù«¹²»ò¹²ÏíÅÌËã»úµÄ¿ª·¢Ö°Ô±À´Ëµ£¬£¬£¬£¬£¬£¬£¬ËûÃǵÄAPIÃÜÔ¿ºÜ¿ÉÄܻᱻй¶¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/twitter-warns-of-possible-api-keys-leak/


5.Ñо¿Ö°Ô±·¢Ã÷¿Éͨ¹ýä¯ÀÀÆ÷µÇÂ¼ÈÆ¹ýTikTokµÄMFA


5.jpg


Ñо¿Ö°Ô±·¢Ã÷¿Éͨ¹ýä¯ÀÀÆ÷µÇÂ¼ÈÆ¹ýTikTokµÄMFA¡£¡£¡£¡£ ¡£¡£ÔÚTikTokÍÆ³ö¶àÒòËØÉí·ÝÑéÖ¤£¨MFA£©Ò»¸öԺ󣬣¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷¸ÃÇå¾²¹¦Ð§½öÕë¶ÔÒÆ¶¯Ó¦ÓóÌÐòÆôÓ㬣¬£¬£¬£¬£¬£¬¶øÆäÍøÕ¾ÔòδÆôÓᣡ£¡£¡£ ¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í¿ÉÒÔͨ¹ýÆäÍøÕ¾µÇ¼¾ßÓÐÊܺ¦Æ¾Ö¤µÄÕÊ»§À´ÈƹýMFA¡£¡£¡£¡£ ¡£¡£ÓÉÓÚÍøÒ³°æµÄÖÐTikTokÓû§¿ÉÓõÄÑ¡ÏîÓÐÏÞ£¬£¬£¬£¬£¬£¬£¬Ö»ÄÜÉÏ´«ºÍÐû²¼ÊÓÆµ£¬£¬£¬£¬£¬£¬£¬Òò´Ë¹¥»÷ÕßÒ²ÎÞ·¨Í¨¹ý¸ü¸ÄÓû§ÃÜÂëÒÔÍêÈ«Ð®ÖÆÕÊ»§¡£¡£¡£¡£ ¡£¡£¿ÉÊÇÇå¾²Ñо¿Ô±Zach EdwardsÌåÏÖ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔÌᳫ´ó¹æÄ£»£»£»£Ú®»ÙÔ˶¯£¬£¬£¬£¬£¬£¬£¬ÀýÈçȦÌ×Ðû´«»òÕþÖÎÐû´«µÈÖÖÖÖÖ÷Ìâ¡£¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/you-can-bypass-tiktoks-mfa-by-logging-in-via-a-browser/


6.NISTÐû²¼ÍøÂçÇ徲ʵ¼ùÖ¸ÄÏÒÔ×ÊÖú×éÖ¯´ÓÍøÂç¹¥»÷Öлָ´


6.jpg


ÃÀ¹ú¹ú¼Ò±ê×¼ÊÖÒÕÑо¿Ôº£¨NIST£©Ðû²¼ÁËÒ»·ÝÍøÂçÇ徲ʵ¼ùÖ¸ÄÏ£¬£¬£¬£¬£¬£¬£¬ÒÔ×ÊÖú×éÖ¯´ÓÍøÂç¹¥»÷Öлָ´¡£¡£¡£¡£ ¡£¡£¸ÃÖ¸ÄÏÖ¸³ö£¬£¬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þ¹¥»÷ÊÇÏÖÔÚÓ°ÏìÆóÒµµÄ×î¾ßÆÆËðÐÔµÄÒòËØÖ®Ò»£¬£¬£¬£¬£¬£¬£¬ËäÈ»×îÀíÏëµÄ×ö·¨ÊÇÔÚÀÕË÷Èí¼þ¹¥»÷µÄÔçÆÚ¼ì²â³öËü²¢Ðû²¼Ô¤¾¯ÐźÅ£¬£¬£¬£¬£¬£¬£¬ÒÔ½«ÆäÓ°Ïì×îС»¯»òÍêÈ«×èÖ¹Ëü¡£¡£¡£¡£ ¡£¡£µ«ÈÔÓÐÐí¶à×éÖ¯±»ÈëÇÖ£¬£¬£¬£¬£¬£¬£¬²¢ÐèÒªÖ¸ÄÏÀ´×ÊÖúÆä´ÓÖлָ´¡£¡£¡£¡£ ¡£¡£NISTµÄNCCoE½¨ÉèÏàʶ¾ö¼Æ»®À´½â¾öÕâÐ©ÍøÂçÇå¾²ÌôÕ½£¬£¬£¬£¬£¬£¬£¬²¢Õë¶Ô¼¸¸ö²âÊÔÓÃÀý(ÀÕË÷Èí¼þ¹¥»÷¡¢¶ñÒâÈí¼þ¹¥»÷¡¢Óû§ÐÞ¸ÄÉèÖÃÎļþ¡¢ÖÎÀíÔ±ÐÞ¸ÄÓû§Îļþ¡¢ÖÎÀíÔ±»ò¾ç±¾¹ýʧµØÐÞ¸ÄÊý¾Ý¿â»òÊý¾Ý¿âģʽ)¾ÙÐвâÊÔÁË¡£¡£¡£¡£ ¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/09/24/nist-guide-recover-ransomware/