ã An inside look at a targeted attack (SANS ISC, 5/31) ã More malicious RTFs detected (Trendmicro blog, 5/31) ã âã°ãªã¼ã³ã»ãã¼ã¿ã»ã³ã¿ã¼âãæ§ç¯ããââçã¨ããå®ç¾ããããã«è¸ãã¹ã7ã¤ã®ã¹ããã (Open Tech Press, 5/31) ã ãè£å¤å¡å¶åº¦ã®ç¥ããããç½ ãã¸ã®åé¿ã®å£° (ä¿åå±äººã®ã©ãã©ãæ¥è¨, 5/31) ãã¯ãããã®åé¡ã®æ ¹æºã¯ãæ¥æ¬ã®è¦å¯ã«ããææ»ãå½é人権æ³ã®è¦³ç¹ããè¦ã¦ãå¶åº¦çã«ä¿¡ç¨æ§ã®ãªããã®ã§ããã¨ãããã¨ããæç½ã«ãªã£ã¦ããã¨ããäºå®ã«ããã¾ãã(ä¸ç¥) ããããè£å¤å¡å¶åº¦ã¯ãç±³å½ã®éªå¯©å¶åº¦ã¨éã£ã¦ãå
¨å¡ä¸è´ã§ã¯ãªããå¤æ°æ±ºã«ãããã¨ã«ãªãã¾ãã æ¥æ¬ã§ã¯ã12人ã®æããç·ãã¯å®è¡ã§ããªãã®ãã ã ãæªããã¨ã¯ã§ãã¾ãããââéæ³ãã¼ã«ã«
{{#tags}}- {{label}}
{{/tags}}