IntelÇý¶¯·¨Ê½Bugµ¼ÖÂʹÓÃDirectXµÄWindowsÓ¦ÓÃÍß½â

Ðû²¼Ê±¼ä 2023-02-13
1¡¢IntelÇý¶¯·¨Ê½Bugµ¼ÖÂʹÓÃDirectXµÄWindowsÓ¦ÓÃÍß½â

      

¾ÝýÌå2ÔÂ10ÈÕ±¨µÀ £¬Î¢ÈíÌåÏÖÔÚ°²×°2022Äê11ÔÂÀÛ»ý¸üÐÂºó £¬WindowsϵͳÉÏʹÓÃDirectXµÄÓ¦Ó÷¨Ê½»á·¢ÉúÍ߽⡣ÊÜÓ°ÏìÓû§»á´ÓʹÓÃDirectXµÄÓ¦Ó÷¨Ê½Öп´µ½apphelp.dll´íÎó£¨Ó¦Ó÷¨Ê½¼æÈÝÐÔ¿Í»§¶Ë¿â£© £¬Ô­ÒòÊÇÓ¢ÌضûGPUÇý¶¯·¨Ê½ÒѾ­¹ýʱ¡£Î¢ÈíÕýÔÚŬÁ¦ÐÞ¸´Õâ¸öÐÂÎÊÌâ £¬²¢»áÔÚ¼´½«Ðû²¼µÄ°æ±¾ÖÐÌṩ¸üС£ÔÚ´Ë֮ǰ £¬ÊÜÓ°ÏìµÄÓû§¿ÉÒÔͨ¹ý½«Intel GPUÇý¶¯·¨Ê½¸üе½×îаæÔ­À´ÔÝʱ½â¾öÕâ¸öÎÊÌâ¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-says-intel-driver-bug-crashes-apps-on-windows-pcs/


2¡¢Ó²¼þÖÆÔìÉÌA10 NetworksÔâµ½ÀÕË÷ÍÅ»ïPlayµÄ¹¥»÷

      

ýÌåÓÚ2ÔÂ10ÈÕ±¨µÀ £¬¼ÓÀû¸£ÄáÑǵÄÍøÂçÓ²¼þÖÆÔìÉÌA10 NetworksÔâµ½ÁËÀÕË÷ÍÅ»ïPlayµÄ¹¥»÷¡£Ê¼þ·¢ÉúÔÚ2023Äê1ÔÂ23ÈÕ £¬ÊÓ²ìÈ·¶¨¹¥»÷ÕßÉè·¨»ñµÃÁ˶Թ²ÏíÇý¶¯Æ÷µÄ·ÃÎÊȨÏÞ £¬°²×°Á˶ñÒâÈí¼þ £¬²¢ÇÔÈ¡ÁËÓëÈËÁ¦×ÊÔ´¡¢²ÆÕþºÍÖ´·¨Ö°ÄÜÏà¹ØµÄÊý¾Ý¡£Ä¿Ç° £¬¸Ã¹«Ë¾Ô¤¼Æ´Ëʼþ²»»á¶ÔÆäÔËÓª·¢ÉúÖØ´óÓ°Ïì¡£PlayÓÚ2ÔÂ9ÈÕ½«A10 NetworksÌí¼Óµ½ÆäÍøÕ¾ £¬²¢ÍþвҪÔÚ2ÔÂ12ÈÕ¹ûÈ»ÇÔÈ¡µÄÎļþ¡£


https://www.bleepingcomputer.com/news/security/a10-networks-confirms-data-breach-after-play-ransomware-attack/


3¡¢ÓòÃû×¢²áÉÌNamecheapµÄÓʼþÕÊ»§±»ºÚ·¢ËÍ´óÁ¿µöÓãÓʼþ

      

ýÌå2ÔÂ12ÈÕ³Æ £¬ÓòÃû×¢²áÉÌNamecheapµÄÓʼþÕÊ»§ÔÚÖÜÈÕÍíÉÏÔâµ½¹¥»÷ £¬·¢ËÍ´óÁ¿Ö¼ÔÚÇÔÈ¡ÊÕ¼þÈ˵ÄÐÅÏ¢ºÍ¼ÓÃÜ»õ±ÒÇ®°üµÄµöÓãÓʼþ¡£µöÓã»î¶¯¿ªÊ¼ÓÚ4:30 PM ET×óÓÒ £¬Ô´ÓÚNamecheapÓÃÀ´·¢ËÍÐø¶©Í¨ÖªºÍÓªÏúÓʼþµÄµç×ÓÓʼþƽ̨SendGrid¡£ÕâЩµöÓãÓʼþð³äDHL»òMetaMask £¬ÆäÖÐDHLµÄÓʼþαװ³ÉÍê³É°ü¹üµÝËÍËùÐèµÄµÝËÍ·ÑÕ˵¥ £¬MetaMaskµÄÓʼþÔò¼Ù×°ÊDZØÐëµÄKYCÑéÖ¤¡£


https://www.bleepingcomputer.com/news/security/namecheaps-email-hacked-to-send-metamask-dhl-phishing-emails/


4¡¢¼ÓÀû¸£ÄáÑÇÖݶà¸öÒ½ÁÆ×éÖ¯Êý¾Ýй¶ӰÏìÔ¼330Íò»¼Õß

      

¾Ý2ÔÂ11ÈÕ±¨µÀ £¬¼ÓÀû¸£ÄáÑÇHeritage Provider NetworkÖеĶà¸öÒ½ÁÆ×éÖ¯Ôâµ½ÀÕË÷¹¥»÷ £¬Ð¹Â¶3300638Ãû»¼ÕßµÄÐÅÏ¢¡£ÊÜÓ°Ïì×éÖ¯°üÂÞRegal Medical GroupºÍLakeside Medical OrganizationµÈ¡£¹¥»÷·¢ÉúÔÚ2022Äê12ÔÂ1ÈÕ £¬RegalÔÚ12ÔÂ2ÈÕ·¢ÏÖ²¿ÃÅ·þÎñÆ÷ÎÞ·¨·ÃÎÊ £¬¾­ÊÓ²ìÈ·¶¨ÕâЩ·þÎñÆ÷ѬȾÁ˶ñÒâÈí¼þ¡£RegalÕýÔÚ֪ͨÊÜÓ°ÏìÓû§ £¬²¢½«ÎªÆäÌṩΪÆÚÒ»ÄêµÄNorton LifeLockÃâ·ÑÐÅÓüà¿Ø¡£


https://www.theregister.com/2023/02/11/ransomware_regal_medical_group/


5¡¢OtorioÅû¶ÎÞÏßIIoTÉ豸ÖÐÓ°ÏìÒªº¦»ù´¡ÉèÊ©µÄ©¶´

      

2ÔÂ9ÈÕ±¨µÀ³Æ £¬¹¤ÒµÍøÂçÄþ¾²¹«Ë¾OtorioÔÚ4¼Ò²îÒ칩ӦÉ̵ÄÎÞÏß¹¤ÒµÎïÁªÍø(IIoT)É豸Öз¢ÏÖÁË38¸ö©¶´¡£¹¥»÷Õß¿ÉÒÔÀûÓÃÕâЩ©¶´»ñµÃ¶ÔÄÚ²¿OTϵͳµÄ³õʼ·ÃÎÊȨÏÞ £¬²¢ÈƹýÄþ¾²²ã²¢ÈëÇÖÄ¿±êÍøÂç £¬Ó°ÏìÒªº¦»ù´¡ÉèÊ©¡£ÆäÖÐ £¬ÓÐÈý¸öÓ°ÏìETIC Telecom µÄÔ¶³Ì·ÃÎÊ·þÎñÆ÷(RAS)µÄ©¶´£¨CVE-2022-3703¡¢CVE-2022-41607ºÍCVE-2022-40981£© £¬¿ÉÄܱ»ÀûÓÃÀ´ÍêÈ«¿ØÖÆÒ×ÊÜÓ°ÏìµÄÉ豸¡£


https://thehackernews.com/2023/02/critical-infrastructure-at-risk-from.html


6¡¢TrendMicro·¢ÏÖÀûÓÃÐé¼ÙÊÂÇéÕë¶Ô¶«Å·µØÓòµÄ¹¥»÷»î¶¯

      

2ÔÂ9ÈÕ £¬Trend MicroÅû¶ÁËÀûÓÃÐé¼ÙÊÂÇé»ú»áÕë¶Ô¶«Å·µØÓòµÄ¹¥»÷»î¶¯¡£¸Ã»î¶¯ÖÐ £¬¹¥»÷ÕßʹÓÃÁ˼¸¸ö¸ß¶È»ìÏýÇÒ¿ª·¢²»×ãµÄ×Ô½ç˵¼ÓÔØ·¨Ê½ £¬ÒÔ±ãÀûÓÃÇÔÈ¡·¨Ê½EnigmaѬȾÓë¼ÓÃÜ»õ±ÒÐÐÒµÏà¹ØµÄÈË¡£¾ÝϤ £¬EnigmaÊÇ¿ªÔ´µÄC#¶ñÒâÈí¼þStealeriumµÄÐ޸İ汾¡£³ýÁËÕâЩ¼ÓÔØ·¨Ê½Ö®Íâ £¬¹¥»÷Õß»¹ÀûÓÃIntelÇý¶¯·¨Ê½Â©¶´£¨CVE-2015-2291£©À´¼ÓÔØÖ¼ÔÚ½µµÍMicrosoft DefenderÁîÅÆÍêÕûÐԵĶñÒâÇý¶¯·¨Ê½¡£


https://www.trendmicro.com/en_us/research/23/b/enigma-stealer-targets-cryptocurrency-industry-with-fake-jobs.html