ã¤ã©ã³ã®æé«æå°è ã§ãããã¡ãã¤å¸«ãX(æ§Twitter)ã«æ稿ãããã¹ãã«å¯¾ãã.ãã¨ããè¿ä¿¡ãè¡ã£ããã¨ãæ¿æ¨©æ¹å¤ã¨è¦ãªãããä½å®¶å ¼æ´»å家ã®ãã»ã¤ã³ã»ã·ã£ã³ãã¶ãæ°ã«å¯¾ãæ²å½¹12å¹´ã®åã宣åããã¾ããã Iran writer Shanbehzadeh sentenced to 12 years after tweeting dot to supreme leader : NPR https://www.npr.org/2024/09/02/g-s1-20579/iran-sentenced-12-years-tweet-supreme-leader A single dot under Khamenei's tweet gets Iranian blogger long jail term | Iran International https://www.iranintl.com/e
Googleã®ã»ãã¥ãªãã£ç 究ãã¼ã ãThreat Analysis Group(TAG)ãã2024å¹´2æ14æ¥ã«ãã¤ã¹ã©ã¨ã«ã»ããã¹æ¦äºã«ããããµã¤ãã¼æ»æã®æ¦æ³ãã¾ã¨ããã¬ãã¼ããçºè¡¨ãã¾ããããã®ã¬ãã¼ãã«ãããã¤ã©ã³ãã¤ã¹ã©ã¨ã«ãã¢ã¡ãªã«ã®ä¸è«ãæ¨çã¨ãããµã¤ãã¼æ»æã¸ã®é¢ä¸ãå¼·ãã¦ãããã¨ããã¦ã¯ã©ã¤ãæ¦äºã®ä¸ç°ã¨ãã¦ãã·ã¢ãè¡ã£ã¦ãããµã¤ãã¼æ»æã¨ã®å¤§ããªéããªã©ãæµ®ã彫ãã«ãªãã¾ããã Tool of First Resort: Israel-Hamas War in Cyber https://blog.google/technology/safety-security/tool-of-first-resort-israel-hamas-war-in-cyber/ Googleã®TAGã¯ãä»åçºè¡¨ããã¬ãã¼ãã(PDFãã¡ã¤ã«)Tool of First Resortãã®
2023å¹´10æã«ããã¹ã¨ã¤ã¹ã©ã¨ã«ã®æ¦äºãå§ã¾ã£ã¦ä»¥éãã¤ã©ã³æ¿åºã¨é¢é£ããã°ã«ã¼ããããã¹ãæ¯æ´ãããµã¤ãã¼ä½æ¦ãå±éãã¦ãã¾ããMicrosoft Threat Analysis Center(MTACï¼Microsoftè å¨åæã»ã³ã¿ã¼)ããã¤ã©ã³ã«ããåã¤ã¹ã©ã¨ã«ã®ãµã¤ãã¼æ»æã«ã¤ãã¦ã®èª¿æ»çµæãå ¬éãã¾ããã Iran accelerates cyber ops against Israel from chaotic start - Microsoft On the Issues https://blogs.microsoft.com/on-the-issues/2024/02/06/iran-accelerates-cyber-ops-against-israel/ Iran's srael cyber ops tease US election meddling tacti
ã¢ã¡ãªã«ã¨ã¤ã¹ã©ã¨ã«ã¯2000年代å¾åã«ã¤ã©ã³ã®æ ¸å®é¨æ½è¨ã¸ã®å¦¨å®³å·¥ä½ã主å°ãã¦ãããã¨ãç¥ããã¦ããã妨害工ä½ã§ã¯ã¢ã¡ãªã«ã¨ã¤ã¹ã©ã¨ã«ãéçºãããã«ã¦ã§ã¢ãã¹ã¿ãã¯ã¹ããããã使ããããã¨ããã¹ã¿ãã¯ã¹ããããæ»æ対象ã¸ä¾µå ¥ãããã®ã¯ãªã©ã³ãã®æ å ±æ©é¢ãAIVDãã®ã¹ãã¤ã§ãããã¨ãªã©ãé¢ä¿è ã«ãã£ã¦è¨¼è¨ããã¦ãã¾ããæ°ãã«ãã¹ã¿ãã¯ã¹ãããã®éçºã«10åãã«(ç´1500åå)è¦æ¨¡ã®è³éãæå ¥ããã¦ãããã¨ããAIVDã®é¢ä¸ããªã©ã³ãæ¿åºãèªèãã¦ããªãã£ããã¨ãªã©ãå ±ãããã¾ããã Sabotage in Iran: een missie in duisternis https://www.volkskrant.nl/kijkverder/v/2024/sabotage-in-iran-een-missie-in-duisternis~v989743/ "Dutch engineer
2023å¹´11æ以éãã¤ã©ã³ã®ã¤ã¹ã©ã é©å½é²è¡é(IRGC)åä¸ã«ãããCyberAv3ngersãã¨ãããããã³ã°ã°ã«ã¼ãããã¤ã¹ã©ã¨ã«è£½ã®ã³ã³ãã¥ã¼ã¿ã¼æ©å¨ã使ãã¢ã¡ãªã«ã®æ°´éæ½è¨ãªã©ã«ãããã³ã°ãè¡ã£ã¦ãã¾ããä¸é¨ã®æ°´éäºæ¥è ã¯ãè¨åã®ãã¹ã¯ã¼ããããã©ã«ãè¨å®ã®ã1111ãããå¤æ´ãã¦ããªãã£ããããç°¡åã«ãããã³ã°ããã¦ãã¾ã£ãã¨å ±ãããã¦ãã¾ãã IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities | CISA https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-335a Iran-linked cyberattacks t
ã¤ã©ã³ã®å½æã¡ãã£ã¢ã2023å¹´12æ18æ¥ã«ããµã¤ãã¼æ»æã«ããã¤ã©ã³å ¨åã«ããã¬ã½ãªã³ã¹ã¿ã³ãã®70ï¼ ããµã¼ãã¹ãåæ¢ããã¨å ±ãã¾ãããåæ¥ãã¤ã©ã³å´ãã¤ã¹ã©ã¨ã«ã¨ã¤ãªãããããã¨ä¸»å¼µãã¦ããããã«ã¼éå£ãããæ»æã¯ã¤ã¹ã©ã å ±åå½ã®ä¾µç¥ã«å¯¾æãããã®ã§ãããã¨ã®ç¯è¡å£°æãçºè¡¨ãã¾ããã Iran points at Israeli-linked group as cyberattack disrupts fuel network | News | Al Jazeera https://www.aljazeera.com/news/2023/12/18/iran-says-cyberattack-disrupts-petrol-stations-across-country Israel-linked group claims cyberattack that shut down 70%
This post is also available in: English (è±èª) æ¦è¦ Playful Taurusã¯æ¥å¸¸çã«ãµã¤ãã¼ã¹ãã¤æ´»åãè¡ãä¸å½ã®æç¶çæ¨çåæ»æã°ã«ã¼ãã§ããAPT15ãBackdoorDiplomacyãVixen PandaãKeChangãNICKELã®ååã§ãç¥ããã¦ãã¾ãããã®ã°ã«ã¼ãã¯å°ãªãã¨ã2010å¹´ã«ã¯æ´»åãéå§ãã¦ãããæ´å²çã«ååç±³ãã¢ããªã«ãä¸æ±ã®æ¿åºæ©é¢ãå¤äº¤æ©é¢ãæ¨çã«ãã¦ãã¾ããã 2021å¹´6æãESETã¯åã°ã«ã¼ãããã¼ã«ããããæ´æ°ããTurianã¨å¼ã°ããæ°ããªããã¯ãã¢ãæè¼ããã¨å ±åãã¾ããããã®ããã¯ãã¢ã®éçºã¯ç¾å¨ãæ´»çºã«è¡ããã¦ãã¾ããç§ãã¡ã¯ãã®ãã¼ã«ã¯ãã£ã±ãPlayful Taurusã®ã¢ã¯ã¿ã¼ã ãã使ç¨ãã¦ããã¨è©ä¾¡ãã¦ãã¾ãããã®ã±ã¤ãããªãã£ã®é²åã«ã¤ã¥ããæè¿ç§ãã¡ã¯åããã¯ãã¢ã®æ°ããªäºç¨®ã¨
ãã¾ãã¾ãªããã°ã©ã ã«ä½¿ããã¦ããJavaã®ãã°åºåã©ã¤ãã©ãªã«ãLog4Shell(CVE-2021-44228)ãã¨ããèå¼±(ããããã)æ§ãçºè¦ãã¦ãããä»®æ³é貨ãã¤ãã³ã°ããã¼ã¿çé£ãªã©ãå¤çºããããæ¿åºç³»ãããã³ã°ã°ã«ã¼ããLog4Shellãå©ç¨ãã¦ãããã¨ãMicrosoftãè¦åãããã¨ã大ããªæ··ä¹±ãçãã§ãã¾ããã¢ã¡ãªã«ã®é£é¦ææ»å±(FBI)ã¨ã¢ã¡ãªã«ãµã¤ãã¼ã»ãã¥ãªãã£ã»ç¤¾ä¼åºç¤å®å ¨ä¿éåº(CISA)ã2022å¹´11æ16æ¥ã«å ±åã§çºè¡¨ããå§åã«ããã¨ãã¤ã©ã³æ¿åºããæ¯æ´ãåããããã«ã¼ã°ã«ã¼ããé£é¦æ°éè¡æ¿æ©é¢(FCEB)ã®çµç¹ããããã³ã°ããæå·è§£èªãã«ã¦ã§ã¢ãXMRigããå°å ¥ãã¦ãããã¨ãæããã«ãªãã¾ããã CISA and FBI Release Advisory on Iranian Government-Sponsored APT Actors Comp
2021å¹´12æ14æ¥ãMicrosoftãJavaã®Log4jã©ã¤ãã©ãªã«åå¨ãã¦ãããªã¢ã¼ãã³ã¼ãå®è¡ãå¯è½ã«ããã¼ããã¤èå¼±æ§ãLog4Shellããä¸å½ã»ã¤ã©ã³ã»åæé®®ã»ãã«ã³ã«é¢é£ããæ¿åºç³»ãããã³ã°ã°ã«ã¼ãã«ãã£ã¦ç¨ãããããã¨ã確èªããã¨çºè¡¨ãã¾ãããããã«åæ¥ã«ã¯ã¢ã¡ãªã«ã®ãµã¤ãã¼ã»ãã¥ãªãã£ã»ã¤ã³ãã©ã¹ãã©ã¯ãã£ã»ãã¥ãªãã£åº(CISA)ãè¡æ¿åçã«å¯¾ãã¦Log4Shellã®ä¿®æ£ãããã12æ24æ¥ã¾ã§ã«é©ç¨ããããã«ééãåºãã¾ããã Guidance for preventing, detecting, and hunting for CVE-2021-44228 Log4j 2 exploitation - Microsoft Security Blog https://www.microsoft.com/security/blog/2021/12/11/guida
January 10, 2022 recap â The Log4j vulnerabilities represent a complex and high-risk situation for companies across the globe. This open-source component is widely used across many suppliersâ software and services. By nature of Log4j being a component, the vulnerabilities affect not only applications that use vulnerable libraries, but also any services that use these applications, so customers may
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}