{"id":5992,"date":"2024-05-13T11:56:25","date_gmt":"2024-05-13T03:56:25","guid":{"rendered":"https:\/\/aict.nkust.edu.tw\/digitrans\/?p=5992"},"modified":"2024-05-21T11:58:30","modified_gmt":"2024-05-21T03:58:30","slug":"%e8%b3%87%e5%ae%89%e6%a5%ad%e8%80%85zscaler%e5%82%b3%e5%87%ba%e9%81%ad%e9%a7%ad%ef%bc%8c%e8%a9%b2%e5%85%ac%e5%8f%b8%e7%99%bc%e5%b8%83%e8%81%b2%e6%98%8e%e5%90%a6%e8%aa%8d%ef%bc%8c%e4%bd%86%e6%89%bf","status":"publish","type":"post","link":"https:\/\/aict.nkust.edu.tw\/digitrans\/?p=5992","title":{"rendered":"\u8cc7\u5b89\u696d\u8005Zscaler\u50b3\u51fa\u906d\u99ed\uff0c\u8a72\u516c\u53f8\u767c\u5e03\u8072\u660e\u5426\u8a8d\uff0c\u4f46\u627f\u8a8d\u6709\u500b\u7121\u5ba2\u6236\u8cc7\u6599\u7684\u6e2c\u8a66\u74b0\u5883\u66b4\u9732\u5728\u7db2\u969b\u7db2\u8def\u4e0a"},"content":{"rendered":"\n<p>2024-05-13 | \u5468\u5cfb\u4f51<\/p>\n\n\n\n<p>\u60e1\u540d\u662d\u5f70\u7684\u521d\u59cb\u5165\u4fb5\u7ba1\u9053\u63ae\u5ba2IntelBroker\uff0c\u8fd1\u671f\u8072\u7a31\u4ed6\u5011\u5f97\u5230\u5b58\u53d6\u5176\u4e2d\u4e00\u5bb6\u5927\u578b\u8cc7\u5b89\u696d\u8005\u7684\u7ba1\u9053\uff0c\u4e26\u5728\u99ed\u5ba2\u8ad6\u58c7BreachForums\u515c\u552e\uff0c\u958b\u50f9\u70ba2\u842c\u7f8e\u5143\u7684\u9580\u7f85\u5e63\uff08XMR\uff09\u3002<\/p>\n\n\n\n<p>\u8ce3\u5bb6\u8072\u7a31\uff0c\u9019\u5bb6\u8cc7\u5b89\u696d\u8005\u7684\u5e74\u71df\u6536\u9054\u523018\u5104\u7f8e\u5143\uff0c\u4e26\u8868\u793a\u4ed6\u5011\u63e1\u6709SSL\u6191\u8b49\u3001\u80fd\u5b58\u53d6\u8a72\u516c\u53f8\u7684SMTP\u4f3a\u670d\u5668\u4f86\u5bc4\u4fe1\u3001\u5167\u542b\u95dc\u9375\u5e33\u5bc6\u7684\u4e8b\u4ef6\u8a18\u9304\u8cc7\u6599\uff0c\u4ee5\u53caPAuth Pointer Auth Access\u7b49\u5176\u4ed6\u6a5f\u5bc6\u8cc7\u6599\u3002<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/i0.wp.com\/s4.itho.me\/sites\/default\/files\/images\/intelbroker-hacker-cybersecurity-firm-breach-1.jpg?ssl=1\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/s4.itho.me\/sites\/default\/files\/images\/intelbroker-hacker-cybersecurity-firm-breach-1.jpg?w=640&#038;ssl=1\" alt=\"\"\/><\/a><\/figure>\n<\/div>\n\n\n<p>\u96d6\u7136\u4ed6\u5011\u4e26\u672a\u76f4\u63a5\u5728\u5ee3\u544a\u900f\u9732\u8cc7\u5b89\u696d\u8005\u7684\u540d\u7a31\uff0c\u4f46\u7814\u7a76\u4eba\u54e1James H\u8868\u793a\uff0c\u5c0d\u65b9\u5728BreachForums\u7684\u804a\u5929\u5c0d\u8a71\u6846\uff08Shoutbox\uff09\u900f\u9732\uff0c\u8a72\u516c\u53f8\u540d\u7a31\u958b\u982d\u7b2c\u4e00\u500b\u5b57\u6bcd\u662fZ\u3002\u800cZscaler\u5e74\u71df\u6536\u78ba\u5be6\u7b26\u5408\u99ed\u5ba2\u900f\u9732\u7684\u6578\u5b57\uff0c\u800c\u88ab\u5916\u754c\u61f7\u7591\u99ed\u5ba2\u5c31\u662f\u91dd\u5c0d\u4ed6\u5011\u800c\u4f86\u3002<\/p>\n\n\n\n<p>\u5de7\u5408\u7684\u662f\uff0c5\u67088\u65e5Zscaler\u8b49\u5be6\u4ed6\u5011\u5f97\u77e5\u6b64\u4e8b\u4e26\u8457\u624b\u8abf\u67e5\uff0c\u4e14\u5c1a\u672a\u767c\u73fe\u8a72\u516c\u53f8\u74b0\u5883\u906d\u5230\u7834\u58de\u7684\u8de1\u8c61\uff0c\u800c\u6c92\u6709\u5c0d\u5ba2\u6236\u53ca\u751f\u7522\u74b0\u5883\u9020\u6210\u5f71\u97ff\u3002<\/p>\n\n\n\n<p>\u8a72\u516c\u53f8\u5f8c\u4f86\u900f\u9732\uff0c\u4ed6\u5011\u66fe\u5728\u4e00\u81fa\u66dd\u9732\u65bc\u7db2\u969b\u7db2\u8def\u7684\u4f3a\u670d\u5668\u67b6\u8a2d\u7368\u7acb\u7684\u6e2c\u8a66\u74b0\u5883\uff0c\u8a72\u7cfb\u7d71\u4e26\u672a\u8207Zscaler\u7684\u74b0\u5883\u9023\u7d50\uff0c\u4e5f\u4e26\u672a\u90e8\u7f72\u65bc\u4ed6\u5011\u7684\u57fa\u790e\u67b6\u69cb\u4e0a\u3002\u70ba\u4e86\u63a1\u96c6\u8b49\u64da\uff0c\u4ed6\u5011\u5df2\u5c07\u8a72\u6e2c\u8a66\u74b0\u5883\u96e2\u7dda\u3002<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><a href=\"https:\/\/i0.wp.com\/s4.itho.me\/sites\/default\/files\/images\/qRt7Pw8ry4-zscaler.png?ssl=1\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/s4.itho.me\/sites\/default\/files\/images\/qRt7Pw8ry4-zscaler.png?w=640&#038;ssl=1\" alt=\"\" style=\"width:899px;height:auto\"\/><\/a><\/figure>\n<\/div>\n\n\n<p>\u4f46\u7a76\u7adf\u99ed\u5ba2\u9ede\u540d\u515c\u552e\u5b58\u53d6\u7ba1\u9053\u7684\u9019\u5bb6\u8cc7\u5b89\u516c\u53f8\u662f\u5426\u5c31\u662fZscaler\uff1fZscaler\u8868\u793a\u4ed6\u5011\u5c07\u6301\u7e8c\u9032\u884c\u8abf\u67e5\u3001\u76e3\u63a7\u3002<\/p>\n\n\n\n<p>\u8cc7\u6599\u4f86\u6e90:<a href=\"https:\/\/www.ithome.com.tw\/news\/162839\" data-type=\"link\" data-id=\"https:\/\/www.ithome.com.tw\/news\/162839\">https:\/\/www.ithome.com.tw\/news\/162839<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>2024-05-13 | \u5468\u5cfb\u4f51 \u60e1\u540d\u662d\u5f70\u7684\u521d\u59cb\u5165\u4fb5\u7ba1\u9053\u63ae\u5ba2IntelBroker\uff0c\u8fd1\u671f\u8072\u7a31\u4ed6\u5011\u5f97\u5230\u5b58\u53d6\u5176\u4e2d\u4e00\u5bb6\u5927\u578b\u8cc7\u5b89\u696d\u8005\u7684\u7ba1\u9053\uff0c\u4e26\u5728\u99ed\u5ba2\u8ad6\u58c7BreachForums\u515c\u552e\uff0c\u958b\u50f9\u70ba&hellip;<\/p>\n","protected":false},"author":9,"featured_media":5993,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_post_was_ever_published":false},"categories":[352],"tags":[204],"class_list":["post-5992","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-security","tag-204"],"gutentor_comment":0,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/aict.nkust.edu.tw\/digitrans\/wp-content\/uploads\/2024\/05\/intelbroker-hacker-cybersecurity-firm-breach-1-156.jpg?fit=960%2C420&ssl=1","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts\/5992","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5992"}],"version-history":[{"count":1,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts\/5992\/revisions"}],"predecessor-version":[{"id":5994,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts\/5992\/revisions\/5994"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/media\/5993"}],"wp:attachment":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5992"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5992"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5992"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}