IntelÇý¶¯·¨Ê½Bugµ¼ÖÂʹÓÃDirectXµÄWindowsÓ¦ÓÃÍß½â
Ðû²¼Ê±¼ä 2023-02-13
¾ÝýÌå2ÔÂ10ÈÕ±¨µÀ£¬Î¢ÈíÌåÏÖÔÚ°²×°2022Äê11ÔÂÀÛ»ý¸üкó£¬WindowsϵͳÉÏʹÓÃDirectXµÄÓ¦Ó÷¨Ê½»á·¢ÉúÍ߽⡣ÊÜÓ°ÏìÓû§»á´ÓʹÓÃDirectXµÄÓ¦Ó÷¨Ê½Öп´µ½apphelp.dll´íÎó£¨Ó¦Ó÷¨Ê½¼æÈÝÐÔ¿Í»§¶Ë¿â£©£¬ÔÒòÊÇÓ¢ÌضûGPUÇý¶¯·¨Ê½ÒѾ¹ýʱ¡£Î¢ÈíÕýÔÚŬÁ¦ÐÞ¸´Õâ¸öÐÂÎÊÌ⣬²¢»áÔÚ¼´½«Ðû²¼µÄ°æ±¾ÖÐÌṩ¸üС£ÔÚ´Ë֮ǰ£¬ÊÜÓ°ÏìµÄÓû§¿ÉÒÔͨ¹ý½«Intel GPUÇý¶¯·¨Ê½¸üе½×îаæÔÀ´ÔÝʱ½â¾öÕâ¸öÎÊÌâ¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-says-intel-driver-bug-crashes-apps-on-windows-pcs/
2¡¢Ó²¼þÖÆÔìÉÌA10 NetworksÔâµ½ÀÕË÷ÍÅ»ïPlayµÄ¹¥»÷
ýÌåÓÚ2ÔÂ10ÈÕ±¨µÀ£¬¼ÓÀû¸£ÄáÑǵÄÍøÂçÓ²¼þÖÆÔìÉÌA10 NetworksÔâµ½ÁËÀÕË÷ÍÅ»ïPlayµÄ¹¥»÷¡£Ê¼þ·¢ÉúÔÚ2023Äê1ÔÂ23ÈÕ£¬ÊÓ²ìÈ·¶¨¹¥»÷ÕßÉè·¨»ñµÃÁ˶Թ²ÏíÇý¶¯Æ÷µÄ·ÃÎÊȨÏÞ£¬°²×°Á˶ñÒâÈí¼þ£¬²¢ÇÔÈ¡ÁËÓëÈËÁ¦×ÊÔ´¡¢²ÆÕþºÍÖ´·¨Ö°ÄÜÏà¹ØµÄÊý¾Ý¡£Ä¿Ç°£¬¸Ã¹«Ë¾Ô¤¼Æ´Ëʼþ²»»á¶ÔÆäÔËÓª·¢ÉúÖØ´óÓ°Ïì¡£PlayÓÚ2ÔÂ9ÈÕ½«A10 NetworksÌí¼Óµ½ÆäÍøÕ¾£¬²¢ÍþвҪÔÚ2ÔÂ12ÈÕ¹ûÈ»ÇÔÈ¡µÄÎļþ¡£
https://www.bleepingcomputer.com/news/security/a10-networks-confirms-data-breach-after-play-ransomware-attack/
3¡¢ÓòÃû×¢²áÉÌNamecheapµÄÓʼþÕÊ»§±»ºÚ·¢ËÍ´óÁ¿µöÓãÓʼþ
ýÌå2ÔÂ12Èճƣ¬ÓòÃû×¢²áÉÌNamecheapµÄÓʼþÕÊ»§ÔÚÖÜÈÕÍíÉÏÔâµ½¹¥»÷£¬·¢ËÍ´óÁ¿Ö¼ÔÚÇÔÈ¡ÊÕ¼þÈ˵ÄÐÅÏ¢ºÍ¼ÓÃÜ»õ±ÒÇ®°üµÄµöÓãÓʼþ¡£µöÓã»î¶¯¿ªÊ¼ÓÚ4:30 PM ET×óÓÒ£¬Ô´ÓÚNamecheapÓÃÀ´·¢ËÍÐø¶©Í¨ÖªºÍÓªÏúÓʼþµÄµç×ÓÓʼþƽ̨SendGrid¡£ÕâЩµöÓãÓʼþð³äDHL»òMetaMask£¬ÆäÖÐDHLµÄÓʼþαװ³ÉÍê³É°ü¹üµÝËÍËùÐèµÄµÝËÍ·ÑÕ˵¥£¬MetaMaskµÄÓʼþÔò¼Ù×°ÊDZØÐëµÄKYCÑéÖ¤¡£
https://www.bleepingcomputer.com/news/security/namecheaps-email-hacked-to-send-metamask-dhl-phishing-emails/
4¡¢¼ÓÀû¸£ÄáÑÇÖݶà¸öÒ½ÁÆ×éÖ¯Êý¾Ýй¶ӰÏìÔ¼330Íò»¼Õß
¾Ý2ÔÂ11ÈÕ±¨µÀ£¬¼ÓÀû¸£ÄáÑÇHeritage Provider NetworkÖеĶà¸öÒ½ÁÆ×éÖ¯Ôâµ½ÀÕË÷¹¥»÷£¬Ð¹Â¶3300638Ãû»¼ÕßµÄÐÅÏ¢¡£ÊÜÓ°Ïì×éÖ¯°üÂÞRegal Medical GroupºÍLakeside Medical OrganizationµÈ¡£¹¥»÷·¢ÉúÔÚ2022Äê12ÔÂ1ÈÕ£¬RegalÔÚ12ÔÂ2ÈÕ·¢ÏÖ²¿ÃÅ·þÎñÆ÷ÎÞ·¨·ÃÎÊ£¬¾ÊÓ²ìÈ·¶¨ÕâЩ·þÎñÆ÷ѬȾÁ˶ñÒâÈí¼þ¡£RegalÕýÔÚ֪ͨÊÜÓ°ÏìÓû§£¬²¢½«ÎªÆäÌṩΪÆÚÒ»ÄêµÄNorton LifeLockÃâ·ÑÐÅÓüà¿Ø¡£
https://www.theregister.com/2023/02/11/ransomware_regal_medical_group/
5¡¢OtorioÅû¶ÎÞÏßIIoTÉ豸ÖÐÓ°ÏìÒªº¦»ù´¡ÉèÊ©µÄ©¶´
2ÔÂ9ÈÕ±¨µÀ³Æ£¬¹¤ÒµÍøÂçÄþ¾²¹«Ë¾OtorioÔÚ4¼Ò²îÒ칩ӦÉ̵ÄÎÞÏß¹¤ÒµÎïÁªÍø(IIoT)É豸Öз¢ÏÖÁË38¸ö©¶´¡£¹¥»÷Õß¿ÉÒÔÀûÓÃÕâЩ©¶´»ñµÃ¶ÔÄÚ²¿OTϵͳµÄ³õʼ·ÃÎÊȨÏÞ£¬²¢ÈƹýÄþ¾²²ã²¢ÈëÇÖÄ¿±êÍøÂ磬ӰÏìÒªº¦»ù´¡ÉèÊ©¡£ÆäÖУ¬ÓÐÈý¸öÓ°ÏìETIC Telecom µÄÔ¶³Ì·ÃÎÊ·þÎñÆ÷(RAS)µÄ©¶´£¨CVE-2022-3703¡¢CVE-2022-41607ºÍCVE-2022-40981£©£¬¿ÉÄܱ»ÀûÓÃÀ´ÍêÈ«¿ØÖÆÒ×ÊÜÓ°ÏìµÄÉ豸¡£
https://thehackernews.com/2023/02/critical-infrastructure-at-risk-from.html
6¡¢TrendMicro·¢ÏÖÀûÓÃÐé¼ÙÊÂÇéÕë¶Ô¶«Å·µØÓòµÄ¹¥»÷»î¶¯
2ÔÂ9ÈÕ£¬Trend MicroÅû¶ÁËÀûÓÃÐé¼ÙÊÂÇé»ú»áÕë¶Ô¶«Å·µØÓòµÄ¹¥»÷»î¶¯¡£¸Ã»î¶¯ÖУ¬¹¥»÷ÕßʹÓÃÁ˼¸¸ö¸ß¶È»ìÏýÇÒ¿ª·¢²»×ãµÄ×Ô½ç˵¼ÓÔØ·¨Ê½£¬ÒÔ±ãÀûÓÃÇÔÈ¡·¨Ê½EnigmaѬȾÓë¼ÓÃÜ»õ±ÒÐÐÒµÏà¹ØµÄÈË¡£¾ÝϤ£¬EnigmaÊÇ¿ªÔ´µÄC#¶ñÒâÈí¼þStealeriumµÄÐ޸İ汾¡£³ýÁËÕâЩ¼ÓÔØ·¨Ê½Ö®Í⣬¹¥»÷Õß»¹ÀûÓÃIntelÇý¶¯·¨Ê½Â©¶´£¨CVE-2015-2291£©À´¼ÓÔØÖ¼ÔÚ½µµÍMicrosoft DefenderÁîÅÆÍêÕûÐԵĶñÒâÇý¶¯·¨Ê½¡£
https://www.trendmicro.com/en_us/research/23/b/enigma-stealer-targets-cryptocurrency-industry-with-fake-jobs.html