±¾ÖÜÈȵãʼþÍþвÇ鱨

È«ÇòʳƷ·ÖÏú¾ÞÍ·SyscoÅû¶Êý¾Ýй¶ȫÇòʳƷ·ÖÏú¾ÞÍ·Î÷˹¿ÆÅû¶ÁËÒ»ÆðÊý¾Ýй¶Ê¼þ£¬±»Ð¹Â¶µÄÊý¾Ý°üÀ¨¿Í»§ºÍÔ±¹¤Êý¾Ý¡£Sysco CorporationÊÇÒ»¼ÒÃÀ¹ú¿ç¹ú¹«Ë¾£¬´ÓÊÂʳƷ¡¢Ð¡Æ÷¾ß¡¢³ø·¿É豸ºÍ×ÀÃæÓÃÆ·µÄÓªÏúºÍ·ÖÏú¡£ÔÚÑо¿ÈËÔ±¿´µ½µÄ5ÔÂ3ÈÕ·¢¸øÔ±¹¤µÄÒ»·ÝÄÚ²¿±¸Íü¼ÖУ¬¸Ã¹«Ë¾Í¸Â¶£¬ÃÀ¹úºÍ¼ÓÄôóµÄ¿Í»§ºÍ¹©Ó¦ÉÌÊý¾Ý£¬ÒÔ¼°ÊôÓÚÃÀ¹úÔ±¹¤µÄ¸öÈËÐÅÏ¢£¬¿ÉÄÜÒÑÔÚ¸ÃʼþÖÐÊܵ½Ó°Ïì¡£¸Ã¹«Ë¾±íʾ£º¡°µ÷²éÈ·¶¨ÍþвÐÐΪÕßÌáÈ¡ÁËijЩ¹«Ë¾Êý¾Ý£¬°üÀ¨ÓëÒµÎñÔËÓª¡¢¿Í»§¡¢Ô±¹¤ºÍ¸öÈËÊý¾ÝÏà¹ØµÄÊý¾Ý¡£¡±

https://securityaffairs.com/145996/data-breach/sysco-discloses-data-breach.html
LockBit 3.0ÀÕË÷ÍÅ»ïй¶ÁË´ÓÓ¡¶ÈÒøÐÐÇÔÈ¡µÄ600GBÊý¾Ý
LockBit 3.0ÀÕË÷Èí¼þ×éÖ¯ÖÜһй¶ÁË´ÓÓ¡¶ÈÒøÐÐFullerton IndiaÇÔÈ¡µÄ600GB¹Ø¼üÊý¾Ý£¬Á½ÖÜǰ¸Ã×éÖ¯Ïò¸Ã¹«Ë¾Ë÷Òª300ÍòÃÀÔªµÄÊê½ð¡£Fullerton IndiaÓÚ4ÔÂ24ÈÕ±íʾ£¬ËüÔâÊÜÁ˶ñÒâÈí¼þ¹¥»÷£¬×÷ΪԤ·À´ëÊ©£¬Ëü±»ÆÈÔÝʱÀëÏßÔËÓª¡£¸ÃÀÕË÷Èí¼þ×éÖ¯ºÜ¿ìÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÉϽ«Fullerton IndiaÁÐΪÊܺ¦Õߣ¬³ÆÆäÇÔÈ¡Á˳¬¹ý600GBµÄ¡°Óë¸öÈ˺ͺϷ¨¹«Ë¾Ç©¶©µÄ´û¿îÐÒ顱¡£¸Ã×éÖ¯½«¹«Ë¾Ö§¸¶Êê½ðµÄ×îºóÆÚÏÞ¶¨Îª4ÔÂ29ÈÕ£¬ÒÔ×èÖ¹¸Ã×éÖ¯·¢²¼±»µÁÊý¾Ý¡£¸Ã¼¯ÍÅ»¹ÔÊÐí¸Ã¹«Ë¾Ö§¸¶1000ÃÀÔª½«½ØÖ¹ÈÕÆÚÑÓ³¤24Сʱ¡£Fullerton IndiaÔÚÓ¡¶È¾Óª×Å699¼Ò·ÖÖ§»ú¹¹£¬Îª´óÔ¼210Íò¿Í»§ÌṩÉÏÃÅÐÅ´û·þÎñ¡£µ½2022Ä꣬¸Ã¹«Ë¾¹ÜÀíµÄ×ʲú¼ÛÖµ³¬¹ý25ÒÚÃÀÔª£¬Ô±¹¤ÈËÊý³¬¹ý13000ÈË¡£

https://www.govinfosecurity.com/lockbit-30-leaks-600-gbs-data-stolen-£æ£ò£ï£í-indian-lender-a-22010
¹¥»÷ÕßÀûÓÃαÔìµÄ¶þάÂëÇÔÈ¡Êý¾Ý»ò½Ù³Ö¸¶¿î
Ëæ×ŶþάÂë³ÖÐø±»ºÏ·¨×éÖ¯´óÁ¿Ê¹Ó᪡ª´Ó¹ã¸æµ½Ç¿ÖÆÖ´ÐÐÍ£³µ·ÑºÍ·£¿î£¬Õ©ÆÕßÒѾÇÄÇĽøÈ룬ÀÄÓÃÕâÏî¼¼ÊõÀ´´ïµ½ËûÃÇа¶ñµÄÄ¿µÄ¡£¾Ý±¨µÀ£¬ÐÂ¼ÓÆÂµÄÒ»Ãû¸¾Å®ÔÚÒ»¼ÒÄ̲èµêʹÓöþάÂëÌîд¡°µ÷²éÎÊ¾í¡±ºóËðʧÁË20000ÃÀÔª£¬¶øÔÚÃÀ¹úºÍÓ¢¹úÔò¹Û²ìµ½Õë¶Ô˾»úµÄ´øÓжþάÂëµÄ¼ÙÍ£³µ´«µ¥°¸Àý¡£ÖµµÃ×¢ÒâµÄÊÇ£¬Êܺ¦ÕßÏÂÔØµÄÌØ¶¨¶ñÒâÈí¼þÓ¦ÓóÌÐòÒªÇóÓû§ÊÚÓè¶ÔÊÖ»úÂó¿Ë·çºÍÉãÏñÍ·µÄ·ÃÎÊȨÏÞ£¬´ËÍ⻹ÓÐAndroid¸¨Öú¹¦ÄÜ·þÎñ£¬ÕâÊÇÒ»Ïî°ïÖúÓÐÌØÊâÐèÇóµÄÓû§µÄAndroid¹¦ÄÜ£¬Ëü»¹ÔÊÐíÓ¦ÓóÌÐò¿ØÖÆÊÖ»úÆÁÄ»¡£

https://www.bleepingcomputer.com/news/security/qr-codes-used-in-fake-parking-tickets-surveys-to-steal-your-money/
еÄDDoS½©Ê¬ÍøÂçAndoryuBotÀûÓÃRuckus©¶´·¢Æð¹¥»÷
Ò»ÖÖÃûΪ¡°AndoryuBot¡±µÄÐÂÐͶñÒâÈí¼þ½©Ê¬ÍøÂçÕë¶ÔRuckusÎÞÏß¹ÜÀíÃæ°åÖеÄÑÏÖØÂ©¶´£¬¸ÐȾδ´ò²¹¶¡µÄWi-Fi½ÓÈëµãÒÔÓÃÓÚDDoS¹¥»÷¡£¸Ã©¶´±àºÅΪCVE-2023-25717£¬Ó°ÏìËùÓÐRuckusÎÞÏß¹ÜÀíÃæ°å10.4¼°¸üÔç°æ±¾£¬ÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ýÏòÒ×Êܹ¥»÷µÄÉ豸·¢ËÍδ¾Éí·ÝÑéÖ¤µÄHTTP GETÇëÇóÀ´Ö´ÐдúÂë¡£¸Ã©¶´ÓÚ2023Äê2ÔÂ8ÈÕ±»·¢ÏÖ²¢ÐÞ¸´£¬¾¡¹ÜÈç´Ë£¬Ðí¶àÈË»¹Ã»ÓÐÓ¦ÓÿÉÓõĻƽð³Ç¹ÙÍø¸üС£AndoryuBotÓÚ2023Äê2ÔÂÊ״γöÏÖ£¬µ«Fortinet±íʾÆäÕë¶ÔRuckusÉ豸µÄ¸üа汾ÓÚ4ÔÂÖÐÑ®³öÏÖ¡£½©Ê¬ÍøÂçÖ¼ÔÚ½«Ò×Êܹ¥»÷µÄÉ豸ÄÉÈëÆäÒÔÓªÀûΪĿµÄµÄDDoS£¨·Ö²¼Ê½¾Ü¾ø·þÎñ£©Èº¡£

https://www.bleepingcomputer.com/news/security/critical-ruckus-rce-flaw-exploited-by-new-ddos-botnet-malware/