²¿ÃÅOutLookÕÊ»§ÐÅϢй¶£»Ð¶ñÒâÈí¼þ¿É´Û¸ÄCATºÍMRIɨÃèÒǵÄÒ½ÁÆÉ¨ÃèÁ˾Ö

°ä²¼¹¦·ò 2019-04-15
1.΢ÈíÔâºÚ¿Í¹¥»÷ £¬²¿ÃÅÓû§µÄOutLookÕÊ»§ÐÅϢй¶


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


΢Èí֤ʵ1ÔÂ1ÈÕÖÁ3ÔÂ29ÈÕÆÚ¼ä¹¥»÷ÕßÈëÇÖÁËÒ»¸ö¿Í»§Ö§³Ö´úÀíÕË»§ £¬²¢ÀûÓøÃÕË»§½Ó¼ûÁ˿ͻ§Ö§³ÖÃÅ»§ÍøÕ¾¼°²¿ÃÅOutLookÓû§µÄÓйØÐÅÏ¢¡£ÕâЩÐÅÏ¢Ô̺¬µç×ÓÓʼþµØÖ·¡¢Îļþ¼ÐÃû³Æ¡¢ÓʼþÖ÷Ìâ¼°ÁªÏµÈ˵ç×ÓÓʼþµØÖ· £¬µ«²»Ô̺¬Óʼþ¼°¸½¼þµÄÄÚÈÝ¡£Ä¿Ç°Éв»Ã÷ÏÔ¹¥»÷µÄ¾ßÌåϸ½Ú £¬µ«Î¢Èí°µÊ¾ÒѾ­½ûÓÃÁ˸ôúÀíÕË»§µÄÍ´´¦ £¬²¢Í¨ÖªËùÓÐÊÜÓ°ÏìµÄÓû§¡£Î¢ÈíҲûÓÐй©ÊÜÓ°ÏìµÄÓû§×ÜÊý¡£

   

Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2019/04/microsoft-outlook-email-hack.html


2.°®´ïºÉÖÝÀ¶Ê®×Ö»á¹ÙÍøÔâºÚ¿ÍÈëÇÖ £¬²¿ÃÅÓû§µÄÓ×ÎÒÐÅϢй¶

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


°®´ïºÉÖÝÀ¶Ê®×Ö»áµÄµçÉÌÍøÕ¾ÓÚ3ÔÂ21ÈÕÔâºÚ¿ÍÈëÇÖ £¬¹¥»÷ÕßÊÔͼÌáÒéڲƭÐÔµÄÂòÂô £¬µ«Ã»Óгɹ¦¡£´Ë±í £¬¹¥»÷Õß»¹½Ó¼ûÁËÔ̺¬Óû§PHIÐÅÏ¢µÄ»ã¿îÎļþ £¬Ð¹Â¶µÄÐÅÏ¢Ô̺¬Óû§µÄÐÕÃû¡¢µÇ¼Ç/¶©ÔĺÅÂë¡¢·þÎñÈÕÆÚ¡¢Ò½ÁÆ·þÎñÌṩÕßµÄÃû×Ö¡¢»¼ÕßÕ˺𢏶¿îÐÅÏ¢µÈ £¬µ«²»Ô̺¬Éç»á°²È«ºÅÂë¡¢¼ÝÕÕID¼°ÐÅÓþ¿¨ºÅÂ롣ƾ¾Ýµ÷²éÁ˾Ö £¬À¶Ê®×Ö»áÒÔΪ¹¥»÷Õß½Ó¼ûÁËÔ¼1%µÄÓû§ÐÅÏ¢¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.databreaches.net/blue-cross-of-idaho-notice-of-privacy-breach/


3.ºÚ¿ÍÍÅ»ïÔÚÍøÉϰ䲼ÊýǧÃûÃÀ¹ú¾¯Ô±ºÍÁª¹ú¼éϸµÄÓ×ÎÒÊý¾Ý

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

¾Ý±íýTechcrunch±¨Â· £¬Ò»¸öºÚ¿ÍÍÅ»ïÐû³ÆÈëÇÖÁËÊýÊ®¸öFBI´ÓÊôÍøÕ¾ £¬²¢ÇÔÈ¡ÁËÊôÓÚÃÀ¹úÁª¹ú»ú¹¹ºÍ¹«¹²·þÎñ×éÖ¯Ô±¹¤µÄ³¬¹ýÒ»°ÙÍòÌõÊý¾Ý¡£¸ÃÍÅ»ïÔÚÍøÉϰ䲼ÁËÊýÊ®¸öÎļþ £¬ÆäÖÐÔ̺¬Ô¼4000ÃûÃÀ¹ú¾¯Ô±ºÍÁª¹ú¼éϸµÄ¾ßÌåÓ×ÎÒÐÅÏ¢ £¬ÕâЩÐÅÏ¢Ô̺¬ÐÕÃû¡¢Ó×ÎҺ͵±¾ÖÓÊÏ䵨ַ¡¢Ö°Î»¡¢µç»°ºÅÂëºÍÓÊÕþµØÖ·¡£

  

Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/83763/data-breach/fbi-affiliated-websites-hack.html


4.ÃÀ¹ú¸ñÁÖά¶ûÊÐÔâÐÂÀÕË÷Èí¼þRobbinHood¹¥»÷ £¬ÊÂÎñÈÔÔÚµ÷²é

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


ÐÂÀÕË÷Èí¼þRobbinHoodÔÚ»ý¼«½øÐй¥»÷»î¶¯ £¬×êÑÐÈËÔ±ÉÐÎ´ÍøÂçµ½RobbinHoodµÄÑù±¾ £¬µ«ÒÑÓжàÃûÊܺ¦ÕßÖÐÕС£RobbinHoodµÄÊê½ðÊÇÃ¿Ì¨ÍÆËã»ú3±ÈÌØ±Ò»òÕû¸öÍøÂç7±ÈÌØ±Ò £¬²¢ÔÚµÚËÄÌìÖ®ºóÊê½ðÖðÈÕÔö³¤1ÍòÃÀÔª¡£ÔÚRobbinHoodµÄTorÖ§¸¶Ò³ÃæÉÏ £¬¹¥»÷ÕßÇ¿µ÷ËûÃǼ«¶È¹ØÇÐÊܺ¦ÕßµÄÒþÖÔ £¬²¢½«ÔÚÊܺ¦Õ߸¶¿îºóɾ³ýÓйؼͼ £¬Ô̺¬¼ÓÃÜÃÜÔ¿ºÍIPµØÖ·¡£Ã½Ì屨·³Æ±±¿¨ÂÞÀ´ÄÉÖݵĸñÁÖά¶ûÊÐÔâµ½RobbinHood¹¥»÷ £¬Óйط¨ÂÉ»ú¹¹ÔÚ½øÐе÷²é¡£

 

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/robbinhood-ransomware-claims-its-protecting-your-privacy/


5.д¹µö»î¶¯The Nasty List £¬ÖØÒªÇÔÈ¡InstagramÓû§Í´´¦

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


еĴ¹µöȦÌס°The Nasty List¡±£¨ÁîÈËÌÖÑáµÄÃûµ¥£©ÔÚInstagramÉÏ´«²¼ £¬ÖØÒªÇÔÈ¡Óû§µÄµÇ¼ʹ´¦¡£¸Ã´¹µöÐÅÏ¢Ðû³ÆÖ¸±êÓû§»òÓû§µÄ°é´¦ÓÚÒ»¸öÁîÈËÌÖÑáµÄÃûµ¥ÉÏ £¬²¢Ô̺¬Ãûµ¥¾ßÌåÐÅÏ¢µÄÁ´½Ó £¬µ«¸ÃÁ´½ÓÖ¸ÏòÒ»¸öαÔìµÄInstagramµÇÂ¼Ò³Ãæ £¬ÆäÏÖʵÓòÃûΪnastylist-instatop50[.]me¡£Ò»µ©Óû§ÊäÈëÍ´´¦ £¬¹¥»÷Õß½«ÀûÓÃËûÃǵÄÕË»§½øÒ»²½´«²¼¸ÃȦÌס£

  

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/the-nasty-list-phishing-scam-is-sweeping-through-instagram/


6.жñÒâÈí¼þ¿É´Û¸ÄCATºÍMRIɨÃèÒǵÄÒ½ÁÆÉ¨ÃèÁ˾Ö

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


Ben-Gurion´óѧµÄÒ»¸ö×êÑÐÍŶÓÑÝʾÁËÒ»ÖÖ¿ÉÄÜ´Û¸ÄÒ½ÁÆÉ¨ÃèÁ˾ֵÄжñÒâÈí¼þ £¬ÕâÖÖ¶ñÒâÈí¼þ¿É´Û¸ÄɨÃè³öµÄÒ½ÁÆÍ¼Ïñ £¬½«Ö×ÁöÔö³¤µ½Í¼ÏñÖлòÊÇ´ÓͼÏñÖÐÒÆ³ýÖ×Áö £¬ÒÔÎóµ¼Ò½ÉúµÄÕïÖÎÁ˾Ö¡£×êÑÐÈËÔ±²âÊÔÁË70ÕÅͼÏñ £¬³É¹¦ºýŪÁËÈýÃû·ÅÉä¿ÆÒ½ÉúºÍÒ½ÔºµÄ×Ô¶¯É¸Ñ¡ÏµÍ³¡£×êÑÐÈËÔ±³ÆÕâÖÖ¹¥»÷µÄÔ­ÒòÊÇÒ½ÁÆÉ豸µÄ°²È«´ëÊ©²»¼° £¬ÀýÈç¶Ìȱ¶ÔͼÏñµÄÊðÃûºÍ¼ÓÃÜ¡£

  

Ô­ÎÄÁ´½Ó£º

https://www.pandasecurity.com/mediacenter/news/new-malware-healthcare-sector/