安全研究 SECURITY SERVICE

思科修复Webex Player中的两个RCE漏洞

发布时间: 2020-03-06
来源:
浏览数: 19

(2019-03-15)今日威胁情报


1、思科修复Webex Player中的两个RCE漏洞

https://redqueen.tj-un.com/InfoDetails.html?id=b199c5de16704fafb1aeb5ebac876f4d


2、澳大利亚ACSC发布CMS系统安全指南

https://redqueen.tj-un.com/InfoDetails.html?id=9b8430127abc4b30b695766609bae35e


3、研究人员警告微软有600多个子域易遭劫持

https://redqueen.tj-un.com/InfoDetails.html?id=ff390879521b430c857d2995d86a3ac0


4、服装零售商J.Crew遭撞库攻击,客户信息泄露

https://redqueen.tj-un.com/InfoDetails.html?id=5bc2a0144c2f4ab288d9c63fb9062a56


5、有线电视运营商Virgin Media 90万客户信息泄露

https://redqueen.tj-un.com/InfoDetails.html?id=3321bda5a57b4d59bd305d24b89bd539


分享到:
  • 相关推荐 RELATED TO RECOMMEND
  • 点击次数: 13
    2024 - 06 - 19
    韩国ERP服务器遭攻击者部署VPN程序 https://asec.ahnlab.com/ko/66581/ 嵌入二维码的伪造公文被用于针对中国公民 https://cyble.com/blog/rising-wave-of-qr-code-phishing-attacks-chinese-citizens-targeted-using-fake-official-documents/ 韩国医疗机构遭遇挖矿攻击 https://asec.ahnlab.com/ko/66860/ 攻击者诱导用户复制并执行Powershell脚本 https://www.proofpoint.com/us/blog/threat-insight/clipboard-compromise-powershell-self-pwn 疑似巴基斯坦黑客组织UTA0137向印度政府传播DISGOMOJI恶意软件 https://www.volexity.com/blog/2024/06/13/disgomoji-malware-used-to-target-indian-government/
  • 点击次数: 12
    2024 - 06 - 17
    微软补丁日通告:2024年6月版https://msrc.microsoft.com/update-guide/releaseNote/2024-Jun More_eggs恶意软件通过求职网站瞄准工业服务行业 https://www.esentire.com/blog/more-eggs-activity-persists-via-fake-job-applicant-lures 短信钓鱼团伙Smishing Triad攻击范围扩展至巴基斯坦 https://www.resecurity.com/blog/article/smishing-triad-is-targeting-pakistan-to-defraud-banking-customers-at-scale Muhstik恶意软件瞄准Apache RocketMQ平台 https://www.aquasec.com/blog/muhstik-malware-targets-message-queuing-services-applications/ Sticky Werewolf以视频会议邀请为诱饵攻击俄罗斯航空航天行业 https://blog.morphisec.com/sticky-werewolfs-aviation-attacks
  • 点击次数: 14
    2024 - 06 - 12
    UAC-0200利用DarkCrystal RAT恶意软件攻击乌克兰关键组织https://cert.gov.ua/article/6279561ExCobalt组织持续开发GoRed后门以攻击俄罗斯公司https://www.ptsecurity.com/ru-ru/research/pt-esc-threat-intelligence/ex-cobalt-go-red-tehnika-skrytogo-tunnelya/#id29SSLoad恶意软件技术剖析https://intezer.com/blog/research/ssload-technical-malware-analysis/Silver Fox组织ValleyRAT木马最新变体披露https://www.zscaler.com/blogs/security-research/technical-analysis-latest-variant-valleyrat#indicators-of-compromise--iocs-针对西班牙语人群的新Agent Tesla活动追踪https://www.fortinet.com/blog/threat-research/new-agent-tesla-campaign-targeting-spanish-speaking-people
  • 点击次数: 11
    2024 - 06 - 11
    俄罗斯APT28利用HeadLace恶意软件渗透欧洲关键网络https://www.cybernewsgroup.co.uk/2024/05/31/russian-hackers-target-europe-with-headlace-malware-credential-harvesting/攻击者假冒巴林政府官方服务程序窃取用户数据https://www.mcafee.com/blogs/other-blogs/mcafee-labs/fake-bahrain-government-android-app-steals-personal-data-used-for-financial-fraud/NiceRAT正通过僵尸网络感染主机https://asec.ahnlab.com/ko/66040/Chalubo木马被用于破坏性活动,导致60万个路由器离线https://blog.lumen.com/the-pumpkin-eclipse/FaCai团伙通过某翻译软件的引流服务实施钓鱼攻击https://mp.weixin.qq.com/s/SsXfrYYjToet4TBxLprCGA
  • 点击次数: 17
    2024 - 06 - 05
    俄罗斯APT28利用HeadLace恶意软件渗透欧洲关键网络 https://www.cybernewsgroup.co.uk/2024/05/31/russian-hackers-target-europe-with-headlace-malware-credential-harvesting/ PikaBot加载器分析 https://blog.sekoia.io/pikabot-a-guide-to-its-deep-secrets-and-operations/ 攻击者假冒巴林政府官方服务程序窃取用户数据 https://www.mcafee.com/blogs/other-blogs/mcafee-labs/fake-bahrain-government-android-app-steals-personal-data-used-for-financial-fraud/ NiceRAT正通过僵尸网络感染主机 https://asec.ahnlab.com/ko/66040/ Konni黑客组织使用俄罗斯政府软件安装包进行攻击 https://mp.weixin.qq.com/s/3GhWv3wsiAIZTClDBJxG-g
友情连接:
免费服务热线 ree service hotline 400-613-1868 手机端
法律声明 Copyright  西安交大捷普网络科技有限公司  陕ICP备18022218号-1

陕公网安备 61019002000857号

犀牛云提供云计算服务