{"id":55320,"date":"2018-05-09T09:00:12","date_gmt":"2018-05-09T01:00:12","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=55320"},"modified":"2018-09-19T17:13:44","modified_gmt":"2018-09-19T09:13:44","slug":"%e3%80%8a1987-2018-%e8%b3%87%e5%ae%89%e5%a8%81%e8%84%85%e6%bc%94%e8%ae%8a%e5%8f%b2-%e3%80%8b%e5%9b%9e%e9%a1%a7%e4%b8%bb%e5%8b%95%e4%ba%8b%e4%bb%b6%e6%87%89%e8%ae%8a%e7%ad%96%e7%95%a5%e7%9a%84%e7%99%bc","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=55320","title":{"rendered":"\u300a1987-2018 \u8cc7\u5b89\u5a01\u8105\u6f14\u8b8a\u53f2 \u300b\u56de\u9867\u4e3b\u52d5\u4e8b\u4ef6\u61c9\u8b8a\u7b56\u7565\u7684\u767c\u5c55\u8207\u5c0d\u4f01\u696d\u7684\u610f\u7fa9"},"content":{"rendered":"<p><strong>\u672c\u6587\u56de\u9867\u5a01\u8105\u60c5\u52e2\u767c\u5c55\u4e0a\u4e00\u4e9b\u4fc3\u4f7f\u4f01\u696d\u958b\u59cb\u63a1\u53d6\u4e3b\u52d5\u4e8b\u4ef6\u61c9\u8b8a\u7b56\u7565\u4ee5\u5f37\u5316\u5176\u7db2\u8def\u8cc7\u5b89\u9632\u79a6\u7684\u91cd\u5927\u4e8b\u4ef6\u3002<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>\u4eca\u65e5\u7684\u5a01\u8105\u65e2\u8907\u96dc\u53c8\u7316\u7357\uff0c\u5149\u9760\u9632\u7bc4\u4f3c\u4e4e\u5df2\u7d93\u4e0d\u5920\u3002\u4e8b\u5be6\u4e0a\uff0c\u6839\u64da\u5c08\u5bb6<a href=\"https:\/\/www.raytheon.com\/sites\/default\/files\/2018-02\/2018_Global_Cyber_Megatrends.pdf\">\u6307\u51fa<\/a>\uff0c\u5a01\u8105\u5df2\u7d93<a href=\"https:\/\/www.wsj.com\/articles\/the-disturbing-inevitability-of-cyberattacks-1503355170\">\u7121\u53ef\u907f\u514d<\/a>\u3002<a href=\"https:\/\/www.csoonline.com\/article\/3247708\/security\/research-suggests-cybersecurity-skills-shortage-is-getting-worse.html\">\u9664\u6b64\u4e4b\u5916<\/a>\uff0c\u518d\u52a0\u4e0a<a href=\"https:\/\/blog.trendmicro.com\/lack-of-internal-it-security-expertise-requires-connected-threat-defense\/\">\u7db2\u8def\u8cc7\u5b89\u6280\u8853\u4e0a\u7684\u7f3a\u53e3<\/a>\u4e5f\u4f7f\u5f97\u8cc7\u5b89\u5a01\u8105\u5c0d\u4f01\u696d\u7684\u71df\u904b\u3001\u7372\u5229\u548c\u5546\u8b7d\u5e36\u4f86\u9f90\u5927\u7684\u98a8\u96aa\u3002\u70ba\u4e86\u56e0\u61c9\u9019\u6a23\u7684\u60c5\u6cc1\uff0c\u4f01\u696d\u958b\u59cb\u6539\u61f8\u6613\u8f4d\uff0c\u5efa\u7f6e\u4e00\u4e9b\u4e3b\u52d5\u5075\u6e2c\u6280\u8853\u8207\u4e8b\u4ef6\u61c9\u8b8a\u7b56\u7565\u4f86\u5f37\u5316\u5176\u9632\u79a6\u3002\u63db\u53e5\u8a71\u8aaa\uff0c\u4f01\u696d\u6216\u8a31\u7121\u6cd5\u5b8c\u5168\u907f\u514d\u6240\u6709\u7684\u8cc7\u6599\u5916\u6d29\u6216\u7db2\u8def\u653b\u64ca\uff0c\u4f46\u537b\u80fd\u5920\u91dd\u5c0d\u9019\u985e\u53ef\u80fd\u5e36\u4f86\u91cd\u5927\u640d\u5931\u7684\u4e8b\u4ef6\u505a\u597d\u66f4\u5468\u5168\u7684\u6e96\u5099\uff0c\u9032\u800c\u964d\u4f4e\u3001\u63a7\u5236\u640d\u5bb3\u4e26\u5f9e\u4e2d\u5fa9\u539f\u3002<\/p>\n<p>\u7136\u800c\uff0c\u662f\u4ec0\u9ebc\u6a23\u7684\u539f\u56e0\u9020\u6210\u9019\u6a23\u7684\u6539\u8b8a\uff1f\u4fc3\u4f7f\u4f01\u696d\u5728\u7db2\u8def\u8cc7\u5b89\u9632\u79a6\u7576\u4e2d\u52a0\u5165\u4e3b\u52d5\u5075\u6e2c\u3001\u56de\u61c9\u53ca\u77ef\u6b63\u6280\u8853\u7684\u56e0\u7d20\u70ba\u4f55\uff1f\u8b93\u6211\u5011\u4f86\u56de\u9867\u5a01\u8105\u60c5\u52e2\u767c\u5c55\u4e0a\u4e00\u4e9b\u4fc3\u4f7f\u4f01\u696d\u958b\u59cb\u63a1\u53d6\u4e3b\u52d5\u4e8b\u4ef6\u61c9\u8b8a\u7b56\u7565\u4ee5\u5f37\u5316\u5176\u7db2\u8def\u8cc7\u5b89\u9632\u79a6\u7684\u91cd\u5927\u4e8b\u4ef6\u3002<\/p>\n<p><strong>1987 \u5e74 10 \u6708<\/strong><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/05\/1987.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-55352 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/05\/1987.jpg\" alt=\"\" width=\"324\" height=\"182\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/05\/1987.jpg 533w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/05\/1987-300x169.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/05\/1987-30x17.jpg 30w\" sizes=\"(max-width: 324px) 100vw, 324px\" \/><\/a>Cascade (\u7011\u5e03) \u75c5\u6bd2\u73fe\u8eab (\u5fb7\u570b\u7a31\u70ba\u300cHerbstlaub\u300d)\uff0c\u5176\u540d\u7a31\u7684\u7531\u4f86\u662f\uff1a\u7576\u8a72\u75c5\u6bd2\u555f\u52d5\u6642\uff0c\u87a2\u5e55\u756b\u9762\u4e0a\u7684\u6587\u5b57\u6703\u50cf\u7011\u5e03\u4e00\u6a23\u5f80\u4e0b\u589c\u843d\u5230\u756b\u9762\u5e95\u90e8\u3002Cascade \u7576\u521d\u539f\u672c\u6253\u7b97\u907f\u958b IBM \u96fb\u8166\u4e0d\u52a0\u4ee5\u611f\u67d3\uff0c\u4f46\u537b\u56e0\u70ba\u4e00\u500b\u7a0b\u5f0f\u932f\u8aa4\u800c\u8b93\u5b83\u5e7e\u4e4e<a href=\"https:\/\/www.afcea.org\/committees\/cyber\/documents\/impactofbndprojectrahabandccconthefutureofcomputer-networkmediatedespionage-cuckooseggpreque.pdf\">\u64f4\u6563\u81f3<\/a>\u6bd4\u5229\u6642\u67d0\u500b\u8fa6\u516c\u5ba4\u4e2d\u7684\u6240\u6709\u96fb\u8166\u3002Cascade \u75c5\u6bd2\u7684\u51fa\u73fe\uff0c\u4e5f\u4fc3\u4f7f\u4e86\u9632\u6bd2\u8edf\u9ad4\u7684\u554f\u4e16\u3002<\/p>\n<p>&nbsp;<\/p>\n<p><strong>1987 \u5e74 11 \u6708<\/strong><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/review2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-55322 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/review2.jpg\" alt=\"\" width=\"312\" height=\"175\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/review2.jpg 534w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/review2-300x169.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/review2-30x17.jpg 30w\" sizes=\"(max-width: 312px) 100vw, 312px\" \/><\/a><\/strong><\/p>\n<p><a href=\"https:\/\/www.cs.umd.edu\/class\/spring2018\/cmsc414-0101\/papers\/3viruses.pdf\">Lehigh (\u7406\u6d77) \u75c5\u6bd2<\/a> (\u6216\u7a31\u70ba\u300ccommand.com\u300d\u75c5\u6bd2) \u611f\u67d3\u4e86 DOS \u4f5c\u696d\u7cfb\u7d71\u958b\u6a5f\u6240\u9700\u7684\u7cfb\u7d71\u6a94\u6848\u3002\u8a72\u75c5\u6bd2\u662f\u4ee5\u7576\u521d\u767c\u73fe\u75c5\u6bd2\u7684\u7f8e\u570b\u7406\u6d77\u5927\u5b78 (Lehigh University) \u4f86\u547d\u540d\uff0c\u662f\u7b2c\u4e00\u500b\u6703\u5c07\u96fb\u8166\u8cc7\u6599\u6e05\u9664\u7684\u75c5\u6bd2\u3002\u70ba\u4e86\u56e0\u61c9\u9019\u500b\u75c5\u6bd2\uff0c\u8a72\u5927\u5b78\u7684\u96fb\u8166\u4e2d\u5fc3\u9084\u5c0d\u5168\u6821\u5b78\u751f\u548c\u6559\u8077\u54e1\u767c\u51fa\u4e86\u7dca\u6025\u901a\u544a\u3002\u6b64\u5916\uff0c\u75c5\u6bd2\u7684\u4f5c\u8005\u4e5f\u901a\u77e5\u4e86\u5176\u4ed6\u5927\u5b78\u6709\u95dc\u8a72\u75c5\u6bd2\u53ef\u80fd\u5e36\u4f86\u7684\u5f71\u97ff\u3002<\/p>\n<p>&nbsp;<\/p>\n<p><strong>1988 \u5e74<\/strong><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/review3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-55323 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/review3.jpg\" alt=\"\" width=\"314\" height=\"174\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/review3.jpg 534w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/review3-300x166.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/review3-30x17.jpg 30w\" sizes=\"(max-width: 314px) 100vw, 314px\" \/><\/a>Morris <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/worm\">\u8815\u87f2<\/a>\u767c\u52d5<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/denial-of-service-(dos)\">\u963b\u65b7\u670d\u52d9<\/a> (DoS) \u653b\u64ca\u4e26\u5927\u91cf\u6563\u5e03\uff0c\u6839\u64da\u5831\u5c0e\uff0c\u7db2\u969b\u7db2\u8def\u4e0a\u7d04\u6709 <a href=\"https:\/\/www.cs.cornell.edu\/courses\/cs1110\/2009sp\/assignments\/a1\/p706-eisenberg.pdf\">10%<\/a> \u7684\u96fb\u8166\u56e0\u800c\u7576\u6a5f\u3002\u9019\u662f\u7576\u6642\u7b2c\u4e00\u500b\u5c0d\u7db2\u969b\u7db2\u8def\u9aa8\u5e79\u9020\u6210\u91cd\u5927\u5f71\u97ff\u7684\u75c5\u6bd2\u4e4b\u4e00\u3002\u9019\u8d77\u4e8b\u4ef6\u4e5f\u56e0\u800c\u8b93\u4eba\u610f\u8b58\u5230\u7db2\u8def\u7dca\u6025\u4e8b\u4ef6\u806f\u5408\u61c9\u8b8a\u7684\u5fc5\u8981\u6027\uff0c\u4fc3\u4f7f\u5c08\u5bb6\u5011\u6210\u7acb\u4e86\u5f8c\u4f86\u7684\u300c\u96fb\u8166\u7dca\u6025\u61c9\u8b8a\u5c0f\u7d44\u300d(CERT)\u3002\u800c Morris \u8815\u87f2\u4e5f\u70ba\u96a8\u5f8c\u6578\u5341\u5e74\u4f01\u696d\u6240\u906d\u9047\u7684\u60e1\u610f\u7a0b\u5f0f\u6253\u4e0b\u91cd\u8981\u57fa\u790e\u3002<!--more--><\/p>\n<p><strong><strong><br \/>\n1989 \u5e74<\/strong><\/strong><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/05\/1987.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-55352 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/05\/1987.jpg\" alt=\"\" width=\"286\" height=\"161\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/05\/1987.jpg 533w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/05\/1987-300x169.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/05\/1987-30x17.jpg 30w\" sizes=\"(max-width: 286px) 100vw, 286px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/www.virusbulletin.com\/uploads\/pdf\/magazine\/1990\/199001.pdf\">AIDS \u6728\u99ac\u7a0b\u5f0f<\/a>\u73fe\u8eab (\u4ea6\u7a31\u70ba\u300cAids Info Disk\u300d\u6216\u300cPC Cyborg\u300d\u6728\u99ac\u7a0b\u5f0f)\uff0c\u9019\u6216\u8a31\u662f\u53f2\u4e0a\u7b2c\u4e00\u500b<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/ransomware\">\u52d2\u7d22\u75c5\u6bd2<\/a>\u3002\u5176\u4f5c\u8005\u5728\u4e16\u754c\u885b\u751f\u7d44\u7e54 (WHO) \u7684\u611b\u6ecb\u75c5\u9632\u6cbb\u5927\u6703\u4e0a\u6563\u767c\u4e86 20,000 \u4efd\u542b\u6709\u8a72\u6728\u99ac\u7a0b\u5f0f\u7684\u8edf\u789f\u7247\u7d66\u8207\u6703\u8005\u3002\u8a72\u6728\u99ac\u7a0b\u5f0f\u5728\u904b\u4f5c\u6642\u6703\u8a08\u7b97\u96fb\u8166\u7684\u958b\u6a5f\u6b21\u6578\uff0c\u4e00\u65e6\u5230\u9054 90 \u6b21\uff0c\u5c31\u6703\u5c07 C \u78c1\u789f\u4e0a\u7684\u76ee\u9304\u96b1\u85cf\u4e26\u5c07\u6a94\u6848\u540d\u7a31\u52a0\u5bc6\u3002\u8cc7\u5b89\u5c08\u5bb6\u5728\u4ed4\u7d30\u5206\u6790\u4e86\u8a72\u6728\u99ac\u7a0b\u5f0f\u4e4b\u5f8c\uff0c\u958b\u767c\u4e86\u4e00\u500b\u540d\u70ba <a href=\"https:\/\/medium.com\/un-hackable\/the-bizarre-pre-internet-history-of-ransomware-bb480a652b4b\">AIDSOUT<\/a> \u7684\u89e3\u5bc6\u5de5\u5177\u7a0b\u5f0f\uff0c\u4e26\u4e14\u5728\u7db2\u8def\u4e0a\u514d\u8cbb\u63d0\u4f9b\u3002<\/p>\n<p><strong>1990 \u5e74<\/strong><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/review5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-55325 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/review5.jpg\" alt=\"\" width=\"342\" height=\"193\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/review5.jpg 534w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/review5-300x169.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/review5-30x17.jpg 30w\" sizes=\"(max-width: 342px) 100vw, 342px\" \/><\/a><\/strong><\/p>\n<p>\u7b2c\u4e00\u500b\u6703\u8b8a\u5f62\u7684 Chameleon (\u8b8a\u8272\u9f8d) \u75c5\u6bd2\u73fe\u8eab (\u4ea6\u7a31\u70ba\u300c1260\u300d\u6216\u300cV2P1\u300d)\uff0c\u5176\u4f5c\u8005\u662f\u4ee5\u5148\u524d Vienna \u548c Cascade \u75c5\u6bd2\u70ba<a href=\"https:\/\/piotrbania.com\/all\/articles\/pbania-evading-nemu2009.pdf\">\u57fa\u790e<\/a>\u800c\u958b\u767c\u51fa\u6b64\u75c5\u6bd2\u3002Chameleon \u7684\u7a0b\u5f0f\u78bc\u6bcf\u6b21\u611f\u67d3\u6642\u90fd\u6703\u7522\u751f\u8b8a\u5316\u3002\u9019\u8b93\u7576\u6642\u7684\u9632\u6bd2\u8edf\u9ad4\u56e0\u800c\u7121\u6cd5\u6709\u6548\u5075\u6e2c\uff0c\u56e0\u70ba\u7576\u6642\u7684\u6280\u8853\u53ea\u6703\u6839\u64da\u4e00\u4e9b\u7c21\u55ae\u7684\u7279\u5fb5 (\u4e5f\u5c31\u662f\u75c5\u6bd2\u78bc) \u4f86\u5075\u6e2c\u75c5\u6bd2\u3002\u70ba\u6b64\uff0c\u8cc7\u5b89\u5c08\u5bb6<a href=\"https:\/\/www.virusbulletin.com\/uploads\/pdf\/magazine\/1998\/199804.pdf\">\u767c\u660e\u4e86<\/a>\u4e00\u4e9b\u7279\u6b8a\u7684\u6f14\u7b97\u6cd5\u4f86\u5075\u6e2c\u4e26\u6514\u622a\u9019\u985e\u6703\u8b8a\u5f62\u7684\u75c5\u6bd2\uff0c\u9019\u4e9b\u6f14\u7b97\u6cd5\u81f3\u4eca\u4ecd\u662f\u9632\u6bd2\u7522\u54c1\u7684\u91cd\u8981\u5143\u7d20\u3002<\/p>\n<p><strong>1991 \u5e74<br \/>\n<a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/review6.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-55326 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/review6.jpg\" alt=\"\" width=\"328\" height=\"186\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/review6.jpg 532w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/review6-300x170.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/review6-30x17.jpg 30w\" sizes=\"(max-width: 328px) 100vw, 328px\" \/><\/a><\/strong><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/the-michelangelo-virus-25-years-later\">Michelangelo (\u7c73\u958b\u6717\u57fa\u7f85) \u75c5\u6bd2<\/a>\u5728\u7db2\u8def\u8cc7\u5b89\u9818\u57df\u6380\u8d77\u4e86\u4e00\u9663\u6050\u614c\uff0c\u56e0\u70ba\u5c08\u5bb6\u5011\u9810\u6e2c\u5b83\u5c07\u5e36\u4f86\u91cd\u5927\u640d\u5bb3\u3002\u4f46\u4e8b\u60c5<a href=\"https:\/\/www.washingtonpost.com\/archive\/business\/1992\/03\/07\/michelangelo-pc-virus-wasnt-quite-an-epidemic\/5ffec11c-eaf4-44e5-b043-d7bbbe3e3565\/\">\u4e26\u672a\u5982\u9810\u671f\u767c\u5c55<\/a>\uff0c\u4e0d\u904e Michelangelo \u75c5\u6bd2\u4ecd\u662f\u4e00\u500b\u8f49\u6369\u9ede\u3002\u9019\u662f\u65e9\u671f\u4f7f\u7528\u5b9a\u6642\u70b8\u5f48\u7684\u75c5\u6bd2\u4e4b\u4e00\uff0c\u63db\u53e5\u8a71\u8aaa\uff0c\u5b83\u6703\u5728\u5730\u7279\u5b9a\u7684\u65e5\u671f\u548c\u6642\u9593\u89f8\u767c\u60e1\u610f\u884c\u70ba\u3002\u9019\u9805\u6280\u5de7\u5f8c\u4f86\u6210\u4e86\u60e1\u610f\u7a0b\u5f0f<a href=\"https:\/\/www.trendmicro.com\/vinfo\/ph\/security\/news\/security-technology\/how-can-advanced-sandboxing-techniques-thwart-elusive-malware\">\u8eb2\u907f<\/a>\u50b3\u7d71\u6c99\u76d2\u6a21\u64ec\u5206\u6790\u5075\u6e2c\u6280\u8853\u7684\u4e00\u9805\u5e38\u7528\u624b\u6cd5\u3002\u5728\u6b64\u540c\u6642\uff0c\u8cc7\u5b89\u5c08\u5bb6\u4e5f\u958b\u767c\u51fa\u591a\u7a2e\u65b9\u6cd5\u4f86\u89e3\u9664\u9019\u4e9b\u5b9a\u6642\u70b8\u5f48\uff0c\u4f8b\u5982\uff1a<a href=\"https:\/\/cs.ucsb.edu\/~chong\/papers\/asplos06temporal.pdf\">\u4f7f\u7528\u865b\u64ec\u6a5f\u5668<\/a>\u4ee5\u53ca<a href=\"https:\/\/www.giac.org\/paper\/gsec\/3504\/diffusing-logic-bomb\/105715\">\u5206\u6790\u8a18\u9304\u6a94<\/a>\u3002<\/p>\n<p><strong>1998 \u5e74<\/strong><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/05\/1998.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-55351 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/05\/1998.jpg\" alt=\"\" width=\"324\" height=\"182\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/05\/1998.jpg 537w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/05\/1998-300x169.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/05\/1998-30x17.jpg 30w\" sizes=\"(max-width: 324px) 100vw, 324px\" \/><\/a><\/p>\n<p>\u6703\u8986\u5beb\u78c1\u789f\u958b\u6a5f\u78c1\u5340\u7684 <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/threat-encyclopedia\/malware\/pe_cih.1003\">CIH \u75c5\u6bd2<\/a>\u958b\u767c\u6210\u529f (\u4ea6\u7a31\u70ba\u300c\u8eca\u8afe\u6bd4\u75c5\u6bd2\u300d(Chernobyl) \u6216\u300cSpacefiller\u300d)\uff0c\u4e0d\u904e\u8a72\u75c5\u6bd2\u7684\u6548\u61c9\u4e00\u76f4\u5230 1999 \u5e74 4 \u6708 26 \u65e5\u624d\u51fa\u73fe\u3002CIH \u75c5\u6bd2\u4e00\u822c\u8a8d\u70ba\u662f\u7d93\u7531\u76dc\u7248\u8edf\u9ad4\u6563\u5e03\uff0c\u4f46\u4e5f\u6709\u53ef\u80fd\u56e0\u70ba\u4eba\u70ba\u758f\u5931\u800c\u96a8\u4e00\u4e9b\u5546\u7528\u8edf\u9ad4\u51fa\u8ca8\u3002\u8a72\u75c5\u6bd2\u5149\u5728\u5357\u97d3\u5c31\u9020\u6210\u4e86 25 \u842c\u53f0\u96fb\u8166\u611f\u67d3\u8207 <a href=\"https:\/\/news.bbc.co.uk\/2\/hi\/science\/nature\/329688.stm\">2.5 \u5104\u7f8e\u5143<\/a>\u7684\u640d\u5931\u3002CIH \u75c5\u6bd2\u7684\u4f5c\u8005\u5f8c\u4f86\u4e5f\u51fa\u9762\u767c\u8868<a href=\"https:\/\/www.parenting.com.tw\/article\/5020407-\u5f9e\u99ed\u96fb\u8166\u5230\u611b\u65c5\u884c\u2500\u6614\u65e5\u7db2\u8def\u5c0f\u5b50\u9673\u76c8\u8c6a\/\">\u9053\u6b49\u8072\u660e<\/a>\u4e26\u63d0\u4f9b\u4e86\u4e00\u500b\u91dd\u5c0d\u8a72\u75c5\u6bd2\u7684\u9632\u6bd2\u5de5\u5177\u3002\u6b64\u5916\uff0cCERT \u5354\u8abf\u4e2d\u5fc3 (CERT\/CC) \u4e5f<a href=\"https:\/\/resources.sei.cmu.edu\/asset_files\/WhitePaper\/1999_019_001_496442.pdf\">\u767c\u5e03\u4e86<\/a>\u4e00\u4efd\u516c\u544a\u4f86\u6559\u5c0e\u6c11\u773e\u5982\u4f55\u5fa9\u539f\u7cfb\u7d71\u3002<\/p>\n<p><strong><strong>1999 \u5e74<br \/>\n<a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/05\/1999.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-55350 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/05\/1999.jpg\" alt=\"\" width=\"300\" height=\"169\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/05\/1999.jpg 537w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/05\/1999-300x169.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/05\/1999-30x17.jpg 30w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/strong><\/strong>\u00a0\u60e1\u540d\u662d\u5f70\u7684<a href=\"https:\/\/resources.sei.cmu.edu\/asset_files\/WhitePaper\/1999_019_001_496184.pdf\">Melissa (\u6885\u8389\u838e)<\/a> \u5de8\u96c6\u75c5\u6bd2<a href=\"https:\/\/www.theregister.co.uk\/2002\/05\/01\/melissa_virus_author_jailed\/\">\u73fe\u8eab<\/a>\uff0c\u5728\u5168\u7403\u9020\u6210\u4e86 <a href=\"https:\/\/www.theguardian.com\/technology\/2002\/may\/02\/viruses.security\">8,000 \u842c\u7f8e\u5143<\/a>\u4ee5\u4e0a\u7684\u640d\u5931\u3002Melissa \u6703\u4e0d\u65b7\u5730\u5c07\u81ea\u5df1\u5bc4\u7d66\u4e00\u5806\u7121\u8f9c\u7684\u6536\u4ef6\u4eba\uff0c\u5c0d\u90f5\u4ef6\u4f3a\u670d\u5668\u9020\u6210\u91cd\u5927\u8ca0\u8377\u3002\u4e00\u4e9b\u77e5\u540d\u7684\u4f01\u696d\u548c\u653f\u5e9c\u6a5f\u69cb\u90fd\u66ab\u6642\u95dc\u9589\u4e86\u90f5\u4ef6\u9598\u9053\u4f86\u6e1b\u8f15\u7db2\u8def\u585e\u8eca\u3002\u4e8b\u4ef6\u61c9\u8b8a\u5c08\u5bb6<a href=\"https:\/\/resources.sei.cmu.edu\/asset_files\/whitepaper\/1999_019_001_496184.pdf\">\u5efa\u8b70<\/a>\u4f7f\u7528\u90f5\u4ef6\u904e\u6ffe\u689d\u4ef6\u4f86\u904e\u6ffe Melissa \u75c5\u6bd2\u3002<\/p>\n<p>&nbsp;<\/p>\n<p><strong>2000 \u5e74<\/strong><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/02\/Mail4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-11384 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/02\/Mail4.jpg\" alt=\"\" width=\"249\" height=\"249\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/02\/Mail4.jpg 960w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/02\/Mail4-150x150.jpg 150w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/02\/Mail4-300x300.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/02\/Mail4-768x768.jpg 768w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/02\/Mail4-600x600.jpg 600w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/02\/Mail4-30x30.jpg 30w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/02\/Mail4-800x800.jpg 800w\" sizes=\"(max-width: 249px) 100vw, 249px\" \/><\/a><br \/>\n<\/strong><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/threat-encyclopedia\/archive\/malware\/vbs_loveletter\">ILOVEYOU (\u6211\u611b\u4f60)<\/a> \u8815\u87f2 (\u4ea6\u7a31\u70ba\u300cLove Bug\u300d\u6216\u300cLove Letter\u300d) \u73fe\u8eab\uff0c<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/remembering-the-love-bug-10-years-on\/\">\u8b49\u660e\u4e86<\/a>\u793e\u4ea4\u5de5\u7a0b\u6280\u5de7\u7684\u5a01\u529b\uff0c\u6240\u6709\u53d7\u5bb3\u8005\u7686\u88ab\u4e00\u5c01\u770b\u4f3c\u6eab\u99a8\u4fe1\u4ef6\u6240\u9a19\u3002ILOVEYOU \u6703\u96b1\u85cf\u4e26\u8986\u5beb\u6a94\u6848\uff0c\u4e26\u4e14\u5c07\u81ea\u5df1\u5bc4\u7d66\u53d7\u5bb3\u8005\u7684\u6240\u6709 Microsoft Outlook \u806f\u7d61\u4eba\u3002\u9023\u9396\u53cd\u61c9\u7684\u7d50\u679c\uff0c\u5c31\u5982\u540c\u6d77\u562f\u4e00\u822c\u8972\u64ca\u90f5\u4ef6\u4f3a\u670d\u5668\uff0c\u8b93\u90f5\u4ef6\u4f3a\u670d\u5668\u96e3\u4ee5\u627f\u53d7\uff0c\u5168\u7403\u7d04\u6709 <a href=\"https:\/\/www.wired.com\/2010\/05\/0504i-love-you-virus\/\">5,500 \u842c\u53f0\u96fb\u8166<\/a>\u53d7\u5230\u611f\u67d3\uff0c\u9020\u6210 <a href=\"https:\/\/edition.cnn.com\/2000\/TECH\/computing\/05\/04\/iloveyou.01\/\">10 \u5104\u7f8e\u5143<\/a>\u4ee5\u4e0a\u7684\u640d\u5931\u3002ILOVEYOU \u6240\u5e36\u4f86\u7684\u5f71\u97ff\uff0c\u4e5f\u4fc3\u4f7f\u653f\u5e9c\u6a5f\u95dc\u958b\u59cb<a href=\"https:\/\/www.gao.gov\/new.items\/ai00181t.pdf\">\u6539\u5584<\/a>\u5f7c\u6b64\u4e4b\u9593\u7684\u5354\u8abf\uff0c\u800c\u4f01\u696d\u4e5f\u958b\u59cb<a href=\"https:\/\/www.computerweekly.com\/opinion\/How-we-allowed-the-I-Love-You-virus-to-happen\">\u5f37\u5316<\/a>\u81ea\u5df1\u7684\u8cc7\u5b89\u9632\u79a6\u3002<strong><br \/>\n<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>2001 \u5e74<br \/>\n<a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2001.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-55327 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2001.jpg\" alt=\"\" width=\"301\" height=\"170\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2001.jpg 534w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2001-300x169.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2001-30x17.jpg 30w\" sizes=\"(max-width: 301px) 100vw, 301px\" \/><\/a><\/strong>\u8a72\u5e74\u53ef\u8aaa\u662f\u6f0f\u6d1e\u653b\u64ca\u8815\u87f2<a href=\"https:\/\/resources.sei.cmu.edu\/asset_files\/WhitePaper\/2001_019_001_496192.pdf\">\u5d1b\u8d77\u4e4b\u5e74<\/a>\uff0c\u5305\u62ec\uff1aCode Red I\u3001Code Red II\u3001Klez\u3001Nimda\u3001<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/threat-encyclopedia\/vulnerability\/1271\/sun-solaris-sadmind-buffer-overflow-vulnerability\">Sadmind<\/a> \u4ee5\u53ca Sircam\u3002\u4ed6\u5011\u5c08\u9580\u653b\u64ca Solaris \u548c Microsoft Internet Information Services (IIS) \u4f3a\u670d\u5668\u7684\u6f0f\u6d1e\u3002\u5c24\u5176 Code Red \u53ef\u8aaa\u662f\u7d66\u4e86\u5168\u7403\u4f01\u696d\u6a5f\u69cb\u4e00\u8a18\u97ff\u4eae\u7684<a href=\"https:\/\/www.sans.org\/reading-room\/whitepapers\/malicious\/code-red-worm-45\">\u8b66\u9418<\/a>\uff0c\u9020\u6210\u4e86 <a href=\"https:\/\/www.sans.org\/reading-room\/whitepapers\/dlp\/mechanisms-effects-code-red-worm-87\">26 \u5104\u7f8e\u5143<\/a>\u7684\u751f\u7522\u529b\u640d\u5931\u8207\u4f3a\u670d\u5668\u6e05\u9664\u6210\u672c\u3002\u540c\u6642\uff0c\u9019\u4e9b\u8815\u87f2\u4e5f\u7a81\u986f\u4e86\u7db2\u8def\u4fee\u88dc\u8207\u9632\u8b77\u5c0d\u4f01\u696d\u6a5f\u69cb\u7684\u91cd\u8981\uff0c\u5c24\u5176\u90a3\u4e9b\u4e0d\u5b89\u5168\u7684\u7db2\u8def\u5171\u7528\u78c1\u789f\u66f4\u662f\u5a01\u8105\u9396\u5b9a\u7684\u76ee\u6a19\u3002<\/p>\n<p><strong>2002 \u5e74<br \/>\n<a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2002.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-55328 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2002.jpg\" alt=\"\" width=\"316\" height=\"177\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2002.jpg 535w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2002-300x168.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2002-30x17.jpg 30w\" sizes=\"(max-width: 316px) 100vw, 316px\" \/><\/a><\/strong><\/p>\n<p>Beast (\u91ce\u7378) \u60e1\u610f\u7a0b\u5f0f<a href=\"https:\/\/sites.psu.edu\/trojanblog\/2014\/04\/22\/beast\/\">\u73fe\u8eab<\/a>\uff0c\u9019\u539f\u672c\u662f\u4e00\u500b\u9060\u7aef\u5b58\u53d6\u5de5\u5177\uff0c\u662f\u7387\u5148<a href=\"https:\/\/www.scmagazine.com\/ten-years-of-evolving-threats-a-look-back-at-the-impact-of-notable-malicious-wares-of-the-past-decade\/article\/558364\/\">\u5c0e\u5165<\/a>\u6240\u8b02<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/backdoor\">\u5f8c\u9580\u7a0b\u5f0f<\/a>\u6280\u5de7\u7684\u60e1\u610f\u7a0b\u5f0f\u4e4b\u4e00\uff0c \u4f8b\u5982\u5167\u5efa\u53ef\u8eb2\u907f\u9632\u706b\u7246\u4e26\u505c\u7528\u9632\u6bd2\u8edf\u9ad4\u7684\u529f\u80fd\u3002\u9019\u4e9b\u8eb2\u907f\u6280\u5de7\u53ef\u7528\u7db2\u8def\u6d41\u91cf\u6aa2\u67e5\u548c\u901a\u8a0a\u5354\u5b9a\u5206\u6790\u4f86\u52a0\u4ee5<a href=\"https:\/\/cgi.di.uoa.gr\/~ad\/Publications\/SPE-08.pdf\">\u53cd\u5236<\/a>\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>2003 \u5e74<br \/>\n<a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2003.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-55329 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2003.jpg\" alt=\"\" width=\"342\" height=\"190\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2003.jpg 540w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2003-300x167.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2003-30x17.jpg 30w\" sizes=\"(max-width: 342px) 100vw, 342px\" \/><\/a><\/strong><\/p>\n<p>\u96a8\u8457\u8d8a\u4f86\u8d8a\u591a\u8cc7\u5b89\u6f0f\u6d1e\u88ab\u63ed\u9732\uff0c\u5f8c\u9580\u7a0b\u5f0f\u548c\u8815\u87f2\u4e5f\u56e0\u800c\u66f4\u52a0\u6d41\u884c\u3002DoS \u963b\u65b7\u670d\u52d9\u653b\u64ca\u5927\u884c\u5176\u9053\uff0c\u5176\u4e2d\u66f4\u6709\u4e00\u500b\u540d\u70ba\u300cSQL Slammer\u300d\u7684\u8815\u87f2\u5728\u77ed\u77ed\u7684 10 \u5206\u9418\u5167\u5c31\u5f71\u97ff\u4e86 <a href=\"https:\/\/www.uky.edu\/~dsianita\/695ec\/sobig.html\">75,000<\/a> \u53f0\u96fb\u8166\u3002\u6b64\u5916 Blaster \u8815\u87f2\u4e5f\u767b\u4e0a\u5a92\u9ad4\u7248\u9762\uff0c\u9020\u6210\u7f8e\u570b\u99ac\u5229\u862d\u5dde\u4e00\u4e9b\u653f\u5e9c\u6a5f\u69cb<a href=\"https:\/\/www.washingtonpost.com\/archive\/politics\/2003\/08\/13\/mds-mva-offices-forced-to-shut-down\/8eaeed02-0d8f-4287-bd98-3ec8c1b7b8a9\/?utm_term=.2daf80a295a4\">\u66ab\u505c\u8fa6\u516c<\/a>\u3002SoBig.F \u5247\u662f\u7576\u6642<a href=\"https:\/\/edition.cnn.com\/2003\/TECH\/internet\/08\/21\/sobig.virus\/\">\u6563\u5e03\u6700\u5feb<\/a>\u7684\u75c5\u6bd2\u3002\u9019\u4e9b\u6848\u4f8b\u4e5f<a href=\"https:\/\/www.techrepublic.com\/article\/sql-slammer-sapphire-admins-blame-admins\/\">\u4fc3\u4f7f<\/a>\u7cfb\u7d71\u8207\u7db2\u8def\u7ba1\u7406\u54e1\u5728\u5efa\u7acb\u7db2\u8def\u60e1\u610f\u7a0b\u5f0f\u61c9\u8b8a\u80fd\u529b\u65b9\u9762\u66f4\u6709\u9060\u898b\u3002<\/p>\n<p><strong>2004 \u5e74<br \/>\n<a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2004.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-55330 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2004.jpg\" alt=\"\" width=\"309\" height=\"172\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2004.jpg 537w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2004-300x167.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2004-30x17.jpg 30w\" sizes=\"(max-width: 309px) 100vw, 309px\" \/><\/a><\/strong><\/p>\n<p>Mydoom \u75c5\u6bd2 (\u4ea6\u7a31\u300cShimg\u300d\u6216\u300cNovarg\u300d) \u53c8<a href=\"https:\/\/www.giac.org\/paper\/gcih\/568\/mydoom-dom-anlysis-mydoom-virus\/106069\">\u518d\u6b21<\/a>\u5e6b\u5927\u5bb6\u4e0a\u4e86\u4e00\u8ab2\uff0c\u8b93\u4eba\u5011\u5c0d\u7db2\u8def\u5b89\u5168\u6709\u66f4\u6df1\u523b\u7684\u4e00\u5c64\u9ad4\u6703\u3002\u8a72\u75c5\u6bd2\u662f\u7d93\u7531\u96fb\u5b50\u90f5\u4ef6\u548c\u6a94\u6848\u5206\u4eab\u61c9\u7528\u7a0b\u5f0f\u50b3\u67d3\uff0c\u662f\u6709\u53f2\u4ee5\u4f86\u6563\u5e03<a href=\"https:\/\/edition.cnn.com\/2004\/TECH\/internet\/01\/28\/mydoom.spreadwed\/\">\u6700\u5feb<\/a>\u7684\u75c5\u6bd2\u3002Mydoom \u7684\u5f71\u97ff\u76f8\u7576\u6df1\u9060\uff1a\u6bcf 49 \u5c01\u96fb\u5b50\u90f5\u4ef6\u5c31\u6709<a href=\"https:\/\/searchwindowsserver.techtarget.com\/news\/947146\/A-week-of-gloom-and-Mydoom\">\u4e00\u5c01<\/a>\u593e\u5e36 Mydoom \u75c5\u6bd2\uff0c\u56e0\u800c\u4f7f\u5f97\u641c\u5c0b\u5f15\u64ce<a href=\"https:\/\/edition.cnn.com\/2004\/TECH\/internet\/07\/26\/google.down\/index.html\">\u8b8a\u6162<\/a>\uff0c\u9020\u6210\u4e0d\u53ea\u4e00\u5bb6\u516c\u53f8\u5fc5\u9808<a href=\"https:\/\/www.networkcomputing.com\/careers\/mydoom-shows-vulnerability-web\/1720417802\">\u642c\u79fb<\/a>\u5230\u65b0\u7684\u7db2\u57df\u3002\u5728\u5dd4\u5cf0\u6642\u671f\uff0cMydoom \u5927\u7d04<a href=\"https:\/\/nypost.com\/2004\/01\/30\/microsoft-doubles-bounty-for-mydoom-virus-author\/\">\u5360\u64da\u4e86<\/a> 20% \u81f3 30% \u7684\u5168\u7403\u7db2\u969b\u7db2\u8def\u6d41\u91cf\u3002\u8cc7\u5b89\u5c08\u5bb6\u4e5f<a href=\"https:\/\/www.computerworld.com\/article\/2574355\/security0\/how-to-take-the-sting-out-of-mydoom.html\">\u958b\u767c\u51fa<\/a>\u4e00\u4e9b\u5c08\u9580\u7528\u4f86\u6514\u622a Mydoom \u7684\u5de5\u5177\u7d66\u7cfb\u7d71\u7ba1\u7406\u54e1\u3002\u6b64\u5916\uff0c\u4e8b\u4ef6\u61c9\u8b8a\u4eba\u54e1\u4e5f\u63a1\u53d6\u4e86\u4e00\u4e9b<a href=\"https:\/\/resources.sei.cmu.edu\/asset_files\/whitepaper\/2004_019_001_496563.pdf\">\u53cd\u5236<\/a>\u63aa\u65bd\uff0c\u85c9\u7531\u7db2\u8def\u6d41\u91cf\u904e\u6ffe\u898f\u5247\u548c<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/security-technology\/best-practices-deploying-an-effective-firewall\">\u9632\u706b\u7246<\/a>\u4f86<a href=\"https:\/\/www.giac.org\/paper\/gcih\/619\/mydoom-backdoor\/106503\">\u6514\u622a<\/a> Mydoom \u7684\u5f8c\u9580\u884c\u70ba\u3002<\/p>\n<p><strong>2005 \u5e74<br \/>\n<a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2005.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-55331 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2005.jpg\" alt=\"\" width=\"301\" height=\"168\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2005.jpg 534w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2005-300x168.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2005-30x17.jpg 30w\" sizes=\"(max-width: 301px) 100vw, 301px\" \/><\/a><\/strong><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/mobile-safety\/mobile-malware-10-terrible-years\">\u884c\u52d5\u60e1\u610f\u7a0b\u5f0f<\/a>\u958b\u59cb\u5728 Symbian \u88dd\u7f6e\u4e0a\u51fa\u73fe\u3002\u7d55\u5927\u591a\u6578\u90fd\u662f\u5f9e\u524d\u4e00\u5e74\u767c\u8868\u7684 Cabir \u6982\u5ff5\u9a57\u8b49\u653b\u64ca\u884d\u751f\u800c\u4f86\u3002\u800c\u7b2c\u4e00\u500b\u7d93\u7531\u591a\u5a92\u9ad4\u7c21\u8a0a (MMS) \u6563\u5e03\u7684\u624b\u6a5f\u75c5\u6bd2\u5247\u662f\u300cCommwarrior\u300d\u3002\u4e0d\u904e\uff0c\u60e1\u610f\u7a0b\u5f0f\u7684\u4f5c\u8005\u4e00\u76f4\u5230 2010 \u5e74\u667a\u6167\u578b\u624b\u6a5f\u554f\u4e16\u4e4b\u5f8c\u624d\u958b\u59cb\u6709\u5229\u53ef\u5716\u3002<\/p>\n<p>&nbsp;<\/p>\n<p><strong>2006 \u5e74<br \/>\n<a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2006.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-55332 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2006.jpg\" alt=\"\" width=\"309\" height=\"174\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2006.jpg 534w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2006-300x169.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2006-30x17.jpg 30w\" sizes=\"(max-width: 309px) 100vw, 309px\" \/><\/a><\/strong><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/threat-encyclopedia\/archive\/malware\/OSX_LEAP.A\">Leap<\/a> \u60e1\u610f\u7a0b\u5f0f (\u4ea6\u7a31\u70ba\u300c<a href=\"https:\/\/www.macworld.com\/article\/1049459\/leapafaq.html\">Oompa-Loompa<\/a>\u300d) \u73fe\u8eab\uff0c\u6210\u70ba\u7b2c\u4e00\u500b\u91dd\u5c0d Mac OS X \u4f5c\u696d\u7cfb\u7d71\u7684\u60e1\u610f\u7a0b\u5f0f\u3002Leap \u96d6\u7136\u6c92\u6709\u592a\u5927\u5371\u5bb3\uff0c\u4f46\u537b\u518d\u6b21\u8b49\u660e\u6c92\u6709\u4efb\u4f55\u5e73\u53f0\u53ef\u4ee5\u5016\u514d\u65bc\u7db2\u8def\u5a01\u8105\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>2007 \u5e74<br \/>\n<a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2007.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-55333 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2007.jpg\" alt=\"\" width=\"309\" height=\"173\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2007.jpg 538w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2007-300x168.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2007-30x17.jpg 30w\" sizes=\"(max-width: 309px) 100vw, 309px\" \/><\/a><\/strong><\/p>\n<p><a href=\"https:\/\/www.schneier.com\/blog\/archives\/2007\/10\/the_storm_worm.html\">Storm \u8815\u87f2<\/a>\u51fa\u73fe\uff0c\u96c6\u5408\u4e86\u8815\u87f2\u3001\u6728\u99ac\u7a0b\u5f0f\u8207\u6bad\u5c4d\u7db2\u8def (Botnet) \u7684\u6280\u5de7\u65bc\u4e00\u8eab\u3002\u5176\u5dd4\u5cf0\u6642\u671f\u7d04\u5360\u4e86\u6240\u6709\u60e1\u610f\u7a0b\u5f0f\u611f\u67d3\u6848\u4f8b\u7684 <a href=\"https:\/\/ieet.org\/index.php\/IEET2\/more\/dvorsky20070927\/\">8%<\/a>\uff0c\u6210\u70ba 2007 \u548c 2008 \u5e74<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/?s=storm+worm\">\u7e41\u884d\u6578\u91cf\u6700\u591a\u7684\u5a01\u8105<\/a>\u4e4b\u4e00\u3002Storm \u8815\u87f2\u958b\u555f\u4e86\u5404\u9805\u6709\u95dc\u5982\u4f55<a href=\"https:\/\/pdfs.semanticscholar.org\/85a6\/afcc62cf5af37ea2f407946a8495bf860695.pdf\">\u9632\u7bc4<\/a>\u9ede\u5c0d\u9ede (P2P) \u6bad\u5c4d\u7db2\u8def\u7684<a href=\"https:\/\/www.itu.int\/ITU-D\/cyb\/cybersecurity\/docs\/itu-botnet-mitigation-toolkit-background.pdf\">\u7814\u7a76<\/a>\u3002\u800c\u60e1\u540d\u662d\u5f70\u7684 <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/threat-encyclopedia\/malware\/zeus\">ZeuS<\/a>\/<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/threat-encyclopedia\/web-attack\/16\/the-zeus-zbot-and-kneber-connection\">ZBOT<\/a> \u6728\u99ac\u7a0b\u5f0f\u4e5f\u5728\u9019\u500b\u6642\u671f\u51fa\u73fe\uff0c\u8a31\u591a\u4f01\u696d\u6a5f\u69cb\u7684\u8cc7\u6599\u90fd\u906d\u5230\u7aca\u53d6\uff0c\u53d7\u5bb3\u8005\u904d\u53ca\u773e\u591a\u7522\u696d\u3002<\/p>\n<p><strong>2008 \u5e74 7 \u6708<br \/>\n<a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2008.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-55334 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2008.jpg\" alt=\"\" width=\"283\" height=\"158\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2008.jpg 536w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2008-300x167.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2008-30x17.jpg 30w\" sizes=\"(max-width: 283px) 100vw, 283px\" \/><\/a><\/strong><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/threat-encyclopedia\/malware\/koobface\">Koobface \u8815\u87f2<\/a>\u73fe\u8eab\uff0c\u5305\u62ec Windows\u3001Mac OS X \u548c Linux \u5e73\u53f0\u90fd\u53d7\u5230\u5f71\u97ff\uff0c\u751a\u81f3\u6ce2\u53ca<a href=\"https:\/\/www.trendmicro.de\/cloud-content\/us\/pdfs\/security-intelligence\/white-papers\/wp_the-real-face-of-koobface.pdf\">\u793e\u7fa4\u7db2\u7ad9<\/a>\u3002\u5982\u540c ZeuS\/ZBOT \u4e00\u6a23\uff0cKoobface \u53ef\u8aaa\u662f\u70ba\u7db2\u8def\u72af\u7f6a\u5e36\u4f86\u4e86<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/the-koobface-saga\/\">\u5178\u7bc4\u8f49\u79fb<\/a>\uff0c\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u96a8\u6642\u90fd\u8ddf\u96a8\u8457\u79d1\u6280\u7684\u767c\u5c55\u8173\u6b65\uff0c\u5c0b\u627e\u5176\u4e2d\u7684\u5b89\u5168\u6f0f\u6d1e\u3002Koobface \u4e5f\u53cd\u6620\u51fa\u53ef\u63a1\u53d6\u884c\u52d5\u7684\u5a01\u8105\u60c5\u5831\u5c0d\u4f01\u696d\u548c\u57f7\u6cd5\u6a5f\u95dc\u5728\u904f\u6b62\u7db2\u8def\u72af\u7f6a\u6642\u7684\u91cd\u8981\u6027\u3002<\/p>\n<p><strong>2008 \u5e74 11 \u6708<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com.tw\/?p=53757\">Confic<\/a><a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2008-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-55335 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2008-2.jpg\" alt=\"\" width=\"294\" height=\"164\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2008-2.jpg 534w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2008-2-300x167.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2008-2-30x17.jpg 30w\" sizes=\"(max-width: 294px) 100vw, 294px\" \/><\/a>ker \u8815\u87f2 (\u4ea6\u7a31\u70ba\u300cDownad\u300d) \u611f\u67d3\u4e86\u9ad8\u9054 900 \u842c\u53f0\u96fb\u8166\uff0c\u4e26\u884d\u751f\u51fa\u591a\u500b\u8b8a\u7a2e\u548c\u4e00\u4e9b\u65b0\u7684\u6280\u5de7\u3002\u5168\u7403\u8cc7\u5b89\u5c08\u5bb6\u3001\u57f7\u6cd5\u6a5f\u95dc\u3001\u300c\u7db2\u969b\u7db2\u8def\u540d\u7a31\u8207\u865f\u78bc\u6307\u914d\u6a5f\u69cb\u300d(ICANN) \u53ca\u7db2\u57df\u540d\u7a31\u8a3b\u518a\u6a5f\u69cb<a href=\"https:\/\/www.icann.org\/en\/system\/files\/files\/conficker-summary-review-07may10-en.pdf\">\u5171\u540c<\/a>\u904f\u6b62\u4e86 Conficker \u7d93\u7531\u6f14\u7b97\u6cd5\u6bcf\u5929\u7522\u751f\u7684\u6578\u5343\u500b\u7db2\u57df\u4f86\u548c\u5176\u5e55\u5f8c\u901a\u8a0a (C&amp;C) \u4f3a\u670d\u5668\u901a\u8a0a\u3002\u7136\u800c\uff0cConficker \u4ecd\u5c07<a href=\"https:\/\/threatpost.com\/conficker-used-in-new-wave-of-hospital-iot-device-attacks\/118985\/\">\u7e7c\u7e8c<\/a>\u6210\u70ba\u4f01\u696d\u4e00\u9805\u6c38\u9060\u7684\u554f\u984c\u3002<\/p>\n<p><strong><strong>2010 \u5e74<\/strong><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2010-.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-55336 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2010-.jpg\" alt=\"\" width=\"295\" height=\"167\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2010-.jpg 535w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2010--300x170.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2010--30x17.jpg 30w\" sizes=\"(max-width: 295px) 100vw, 295px\" \/><\/a><\/strong>Stuxnet \u51fa\u73fe\uff0c\u9019\u662f\u7b2c\u4e00\u500b\u653b\u64ca\u300c\u76e3\u63a7\u8207\u8cc7\u6599\u64f7\u53d6\u300d(SCADA) \u7cfb\u7d71\u7684\u8815\u87f2\uff0c\u4e5f\u6fc0\u8d77\u4e86\u6709\u95dc\u5de5\u696d\u57fa\u790e\u67b6\u69cb\u5b89\u5168\u6027\u7684<a href=\"https:\/\/blog.trendmicro.com\/understanding-the-attack-surface-for-critical-infrastructure\/\">\u8a0e\u8ad6<\/a>\u3002\u300c\u5de5\u696d\u63a7\u5236\u7cfb\u7d71\u7db2\u8def\u7dca\u6025\u61c9\u8b8a\u5c0f\u7d44\u300d(Industrial Control Systems Cyber Emergency Response Team\uff0c\u7c21\u7a31 ICS-CERT) \u5be6\u5730\u524d\u5f80\u611f\u67d3 Stuxnet \u7684\u5ee0\u623f<a href=\"https:\/\/ics-cert.us-cert.gov\/sites\/default\/files\/documents\/ICS-CERT%20Incident%20Response%20Summary%20Report%20%282009-2011%29_S508C.pdf\">\u9032\u884c\u4e86<\/a>\u4e00\u9805\u8a55\u4f30\u548c\u9451\u8b58\u5206\u6790\u3002\u6b64\u5916\uff0c\u8edf\u9ad4\u5ee0\u5546\u4e5f<a href=\"https:\/\/krebsonsecurity.com\/2015\/03\/microsoft-fixes-stuxnet-bug-again\/\">\u91cb\u51fa\u4e86<\/a>\u591a\u9805\u4fee\u88dc\u66f4\u65b0\u4f86\u89e3\u6c7a Stuxnet \u7684\u8cc7\u5b89\u6f0f\u6d1e\u3002<\/p>\n<p><strong>2011 \u5e74<br \/>\n<a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2011.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-55337 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2011.jpg\" alt=\"\" width=\"316\" height=\"177\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2011.jpg 535w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2011-300x168.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2011-30x17.jpg 30w\" sizes=\"(max-width: 316px) 100vw, 316px\" \/><\/a><\/strong><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/data-breach\">\u8cc7\u6599\u5916\u6d29<\/a>\u4e8b\u4ef6\u66f4\u52a0\u983b\u7e41\uff0c\u5305\u62ec <a href=\"https:\/\/www.theregister.co.uk\/2011\/04\/04\/rsa_hack_howdunnit\/\">RSA<\/a> \u548c <a href=\"https:\/\/arstechnica.com\/gaming\/2011\/04\/sony-admits-utter-psn-failure-your-personal-data-has-been-stolen\/\">Sony<\/a> \u90fd\u50b3\u51fa\u8cc7\u6599\u5916\u6d29\u3002\u800c\u96a8\u8457\u9019\u4e9b\u5931\u7aca\u8cc7\u6599\u88ab\u6b79\u5f92<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/2011-the-year-of-data-breaches\/\">\u8b8a\u73fe<\/a>\u4e4b\u5f8c\uff0c\u7db2\u8def\u72af\u7f6a\u6d3b\u52d5\u4e5f\u65e5\u76ca\u58ef\u5927\u3002\u9664\u6b64\u4e4b\u5916\uff0c\u6211\u5011\u4e5f\u767c\u73fe\u4e00\u4e9b<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cyber-attacks\/web-defacements-exploring-the-methods-of-hacktivists\">\u61f7\u6709\u653f\u6cbb\u610f\u5716\u7684\u653b\u64ca\u884c\u52d5<\/a>\u3002<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/spyeye-using-cybercriminal-arrested-in-britain\/\">SpyEye<\/a> \u9280\u884c\u6728\u99ac\u7a0b\u5f0f\u5728\u8a72\u5e74\u4e0a\u534a\u5e74\u5c31\u641c\u522e\u4e86<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/threat-morphosis\/\">320 \u842c\u7f8e\u5143<\/a>\u7684\u4e0d\u6cd5\u7372\u5229\u3002\u5e73\u5747<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/the-shifting-motivations-behind-digital-threats-infographic\/\">\u6bcf\u79d2\u53ef\u5075\u6e2c\u5230 3.5 \u6b21\u5a01\u8105<\/a> (\u7b49\u65bc\u4e00\u5c0f\u6642 12,600 \u6b21)\u3002<\/p>\n<p><strong><br \/>\n2012 \u5e74<br \/>\n<a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2012-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-55339 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2012-1.jpg\" alt=\"\" width=\"334\" height=\"185\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2012-1.jpg 536w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2012-1-300x166.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2012-1-30x17.jpg 30w\" sizes=\"(max-width: 334px) 100vw, 334px\" \/><\/a><\/strong><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/the-trends-in-targeted-attacks-of-2012\/\">\u91dd\u5c0d\u6027\u653b\u64ca<\/a>\u8207\u8cc7\u6599\u5916\u6d29\u8d8a\u4f86\u8d8a\u5e38\u898b\u3002\u5728\u4e2d\u6771\u5730\u5340\u6d3b\u52d5\u7684 <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/update-on-flame\/\">Flame<\/a> \u8cc7\u6599\u7aca\u53d6\u548c\u6e05\u9664\u7a0b\u5f0f\u73fe\u8eab\uff0c\u624b\u6cd5\u985e\u4f3c Stuxnet\u3002<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/disttrack-malware-overwrites-files-infects-mbr\/\">Disttrack<\/a> (\u4ea6\u7a31\u70ba\u300c<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/the-middle-eastern-and-north-african-underground-where-culture-and-cybercrime-meet\">Shamoon<\/a>\u300d) \u5c08\u9580<a href=\"https:\/\/www.theverge.com\/2012\/8\/27\/3271039\/saudi-aramco-shamoon-networks-restored\">\u611f\u67d3<\/a>\u77f3\u6cb9\u516c\u53f8\u7684\u5de5\u4f5c\u7ad9\u3002\u6b64\u6642\uff0c\u5f71\u97ff Android \u88dd\u7f6e\u7684\u60e1\u610f\u7a0b\u5f0f\u6578\u91cf\u5df2\u9ad8\u9054 <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/2012-annual-security-roundup\/\">350,000<\/a> \u500b\u3002\u81f3\u65bc<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/Exploit-Kit\">\u6f0f\u6d1e\u653b\u64ca\u5957\u4ef6<\/a>\u96d6\u7136\u5f9e 2006 \u5e74\u5c31\u5df2\u51fa\u73fe\uff0c\u4f46\u76f4\u5230 <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/blackhole-2-0-beta-tests-in-the-wild\/\">Blackhole 2.0<\/a> \u51fa\u73fe\u624d\u958b\u59cb\u771f\u6b63\u8d77\u98db\u3002<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/ransomware\">\u52d2\u7d22\u75c5\u6bd2<\/a>\u6210\u4e86\u6700\u71b1\u9580\u7684\u8a71\u984c\uff0c\u9019\u985e\u60e1\u610f\u7a0b\u5f0f\u5f88\u986f\u7136\u627f\u8972\u4e86 <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/fake-antivirus-trojans-ramping-up\/\">FAKEAV \u5047\u9632\u6bd2\u8edf\u9ad4<\/a>\u548c Reveton<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/trojan-on-the-loose-an-in-depth-analysis-of-police-trojan\/\">\u8b66\u5bdf\u6728\u99ac\u7a0b\u5f0f<\/a>\u7684\u52d2\u8d16\u624b\u6cd5\u3002<\/p>\n<p>&nbsp;<\/p>\n<p><strong>2013 \u5e74<\/strong><br \/>\n<strong><strong><a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2013.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-55340 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2013.jpg\" alt=\"\" width=\"331\" height=\"192\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2013.jpg 535w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2013-300x174.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2013-30x17.jpg 30w\" sizes=\"(max-width: 331px) 100vw, 331px\" \/><\/a><\/strong><\/strong><\/p>\n<p>\u4e00\u9023\u4e32\u7684\u5783\u573e\u90f5\u4ef6\u653b\u64ca\u958b\u59cb\u6563\u5e03 <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/defending-against-cryptolocker\/\">CryptoLocker \u52d2\u7d22\u75c5\u6bd2<\/a>\uff0c\u9019\u662f\u7b2c\u4e00\u500b\u6703\u5c07\u611f\u67d3\u7cfb\u7d71\u7684\u6a94\u6848\u52a0\u5bc6\u4ee5\u52d2\u7d22\u8d16\u91d1\u7684\u52d2\u7d22\u75c5\u6bd2\u4e4b\u4e00\u3002\u6839\u64da\u5831\u5c0e\uff0cCryptoLocker \u7684\u5e55\u5f8c\u96c6\u5718\u7372\u5229<a href=\"https:\/\/www.zdnet.com\/article\/cryptolockers-crimewave-a-trail-of-millions-in-laundered-bitcoin\/\">\u6578\u767e\u842c\u7f8e\u5143<\/a>\u3002\u9019\u7a2e\u986f\u7136\u76f8\u7576\u6709\u5229\u53ef\u5716\u7684\u8cfa\u9322\u6a21\u5f0f\uff0c\u4e5f\u4fc3\u4f7f\u4e86\u52d2\u7d22\u75c5\u6bd2\u65e5\u6f38\u6210\u719f\u3002\u6b64\u5916\uff0c\u6f0f\u6d1e\u653b\u64ca\u5957\u4ef6\u4f5c\u8005\u548c\u52d2\u7d22\u75c5\u6bd2\u4f5c\u8005\u4e5f<a href=\"https:\/\/www.trendmicro.de\/cloud-content\/us\/pdfs\/security-intelligence\/reports\/rpt-zero-days-hit-users-hard-at-the-start-of-the-year.pdf\">\u958b\u59cb<\/a>\u7d50\u76df\u3002CryptoLocker \u53ca\u985e\u4f3c\u75c5\u6bd2\u7684\u51fa\u73fe\uff0c\u7a81\u986f\u51fa<a href=\"https:\/\/www.sans.org\/reading-room\/whitepapers\/incident\/enterprise-survival-guide-ransomware-attacks-36962\">\u7e31\u6df1\u9632\u79a6<\/a>\u5c0d\u4f01\u696d\u6a5f\u69cb\u7684\u91cd\u8981\u6027\uff0c\u5c24\u5176\u5c0d\u7cfb\u7d71\u7ba1\u7406\u54e1\u3002<\/p>\n<p><strong>2014 \u5e74<\/strong><br \/>\n<strong><strong><a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2014.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-55341 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2014.jpg\" alt=\"\" width=\"309\" height=\"173\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2014.jpg 524w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2014-300x168.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2014-30x17.jpg 30w\" sizes=\"(max-width: 309px) 100vw, 309px\" \/><\/a><\/strong><\/strong><\/p>\n<p>Sony Pictures <a href=\"https:\/\/www.reuters.com\/article\/us-sony-cybersecurity-malware\/exclusive-fbi-warns-of-destructive-malware-in-wake-of-sony-attack-idUSKCN0JF3FE20141202\">\u767c\u751f\u4e86<\/a>\u4e00\u8d77\u91cd\u5927\u7684\u7db2\u8def\u8cc7\u5b89\u4e8b\u4ef6\uff0c\u9020\u6210\u54e1\u5de5\u500b\u4eba\u8eab\u5206\u8b58\u5225\u8cc7\u8a0a\u5916\u6d29\uff0c\u4ee5\u53ca\u90e8\u4efd\u7684\u7dda\u4e0a\u57fa\u790e\u67b6\u69cb\u906d\u5230<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/an-analysis-of-the-destructive-malware-behind-fbi-warnings\/\">\u7834\u58de<\/a>\u3002<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/PoS-(point-of-sale)-malware\">\u92b7\u552e\u6ac3\u53f0\u7cfb\u7d71 (POS) \u52d2\u7d22\u75c5\u6bd2<\/a>\u4e5f\u958b\u59cb<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/the-evolution-of-point-of-sale-pos-malware\">\u84ec\u52c3\u767c\u5c55<\/a>\uff0c\u9020\u6210\u7f8e\u570b Target \u9023\u9396\u8d85\u5e02\u767c\u751f<a href=\"https:\/\/blog.trendmicro.com\/target-breach-shows-need-create-secure-payment-systems\">\u8cc7\u6599\u5916\u6d29<\/a>\uff0c\u640d\u5931\u9ad8\u9054 <a href=\"https:\/\/www.usatoday.com\/story\/money\/2017\/05\/23\/target-pay-185m-2013-data-breach-affected-consumers\/102063932\/\">1,850 \u842c\u7f8e\u5143<\/a>\u3002Sony \u8207 Target \u6240\u767c\u751f\u7684\u4e8b\u4ef6\u4e5f\u5f15\u8d77\u4e86\u4f01\u696d\u63a1\u53d6<a href=\"https:\/\/www.sans.org\/reading-room\/whitepapers\/casestudies\/case-study-critical-controls-sony-implemented-36022\">\u9810\u9632\u8207\u77ef\u6b63\u6027\u7b56\u7565<\/a>\u4f86\u5c0d\u7db2\u8def\u653b\u64ca\u4e8b\u5148\u505a\u597d\u842c\u5168\u6e96\u5099\u7684\u76f8\u95dc<a href=\"https:\/\/www.csoonline.com\/article\/2859473\/microsoft-subnet\/sony-hacked-in-feb-knew-about-huge-security-flaws-before-cybersecurity-train-wreck.html\">\u63a2\u8a0e<\/a>\u3002<\/p>\n<p><strong>2015 \u5e74<\/strong><br \/>\n<strong><strong><a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2015.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-55342 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2015.jpg\" alt=\"\" width=\"298\" height=\"170\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2015.jpg 532w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2015-300x171.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2015-30x17.jpg 30w\" sizes=\"(max-width: 298px) 100vw, 298px\" \/><\/a><\/strong><\/strong><\/p>\n<p>\u8cc7\u6599\u5916\u6d29\u66f4\u52a0<a href=\"https:\/\/blog.trendmicro.com\/impact-team-to-ashley-madison-shut-down-or-else\/\">\u7316\u7357<\/a>\uff0c\u91ab\u7642\u7522\u696d<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cyber-attacks\/follow-the-data\">\u53d7\u5bb3<\/a>\u6700\u6df1\uff0c\u8d85\u904e 9000 \u842c\u7b46\u7684\u75c5\u60a3\u8cc7\u6599\u906d\u5230\u5916\u6d29\u3002\u4e00\u6574\u6279\u7684<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/zero-day-vulnerability\">\u96f6\u6642\u5dee\u6f0f\u6d1e<\/a>\u906d\u5230\u66dd\u5149\uff0c\u6b79\u5f92\u4e5f\u5c07\u9019\u4e9b\u6f0f\u6d1e<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cyber-attacks\/operation-pawn-storm-fast-facts\">\u8f49\u63db\u6210<\/a>\u7db2\u8def\u9593\u8adc\u884c\u52d5\u7684\u6b66\u5668\u3002\u540c\u6642\uff0c<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/special-report\/cybercrime-and-the-deep-web\/global-cybercrime-map\/\">\u7db2\u8def\u72af\u7f6a\u5730\u4e0b\u5e02\u5834<\/a>\u4e5f\u6210\u4e86\u72af\u7f6a\u6d3b\u52d5\u7684\u6eab\u5e8a\u3002\u7269\u806f\u7db2 (IoT) \u88dd\u7f6e\u548c\u667a\u6167\u79d1\u6280<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/the-gaspot-experiment-hackers-target-gas-tanks\/\">\u4e5f\u6dea\u9677<\/a>\uff0c\u6210\u4e86\u99ed\u5ba2\u7684\u653b\u64ca\u76ee\u6a19\u3002\u5230\u4e86\u8a72\u5e74\u5e74\u5e95\uff0c<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/exploit-kits-2015-scale-distribution\/\">Angler<\/a> \u53ef\u8aaa\u4e3b\u5bb0\u4e86\u6574\u500b\u6f0f\u6d1e\u653b\u64ca\u5957\u4ef6\u7248\u5716\uff0c\u5c0d\u7121\u8f9c\u7684\u4f7f\u7528\u8005\u6563\u767c\u5927\u91cf\u5a01\u8105\u3002<\/p>\n<p><strong>2016 \u5e74<\/strong><br \/>\n<strong><strong><a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2016.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-55343 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2016.jpg\" alt=\"\" width=\"292\" height=\"165\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2016.jpg 534w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2016-300x170.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2016-30x17.jpg 30w\" sizes=\"(max-width: 292px) 100vw, 292px\" \/><\/a><\/strong><\/strong><\/p>\n<p>\u52d2\u7d22\u75c5\u6bd2\u5bb6\u65cf\u6578\u91cf\u5728 2016 \u5e74<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/2016-roundup-record-year-enterprise-threats\">\u5927\u5e45\u6500\u5347<\/a>\uff0c\u6b64\u5916\u4e5f\u767c\u5c55\u51fa\u5404\u7a2e\u578b\u614b\u548c<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/ransomware-as-a-service-what-this-means-for-enterprises\">\u7372\u5229\u6a21\u5f0f<\/a>\u4ee5\u53ca\u5404\u7a2e\u4e0d\u540c\u7684\u529f\u80fd\u3002\u6b64\u6642\uff0c<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/delving-into-the-world-of-business-email-compromise-bec\">\u8b8a\u81c9\u8a50\u9a19 (BEC)<\/a> \u4e5f\u5728\u5168\u7403\u9020\u6210\u8d85\u904e 30 \u5104\u7f8e\u5143\u7684\u640d\u5931\u3002\u6b64\u5916\uff0c\u9084\u6709\u66f4\u591a\u7684\u96f6\u6642\u5dee\u6f0f\u6d1e\u88ab\u767c\u73fe\u548c\u63ed\u9732\u3002<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/internet-things-ecosystem-broken-fix\/\">Mirai IoT \u6bad\u5c4d\u7db2\u8def<\/a>\u9020\u6210\u4e86\u8a31\u591a\u77e5\u540d\u7db2\u7ad9\u505c\u64fa\uff0c\u540c\u6642\u4e5f\u6380\u8d77\u4e86\u4e00\u80a1\u6709\u95dc IoT \u5b89\u5168\u7684\u8a0e\u8ad6\u3002Yahoo <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cyber-attacks\/yahoo-discloses-2013-breach-exposed-over-1billion-accounts\">\u5766\u627f<\/a>\u5176 2013 \u5e74\u767c\u751f\u7684\u8cc7\u6599\u5916\u6d29\u4e8b\u4ef6\uff0c\u4e8b\u5be6\u4e0a\u6709 <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/yahoo-all-three-billion-user-accounts-affected-in-2013-data-breach\">30 \u5104<\/a>\u500b\u7528\u6236\u5e33\u865f\u906d\u5230\u5916\u6d29\u3002<\/p>\n<p><strong>2017 \u5e74<br \/>\n<\/strong><\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2017.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-55344 alignleft\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2017.jpg\" alt=\"\" width=\"298\" height=\"165\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2017.jpg 539w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2017-300x166.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2017-30x17.jpg 30w\" sizes=\"(max-width: 298px) 100vw, 298px\" \/><\/a><\/strong><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/security-101-the-impact-of-cryptocurrency-mining-malware\">\u52a0\u5bc6\u865b\u64ec\u8ca8\u5e63\u6316\u7926<\/a>\u6210\u4e86<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/a-look-into-the-most-noteworthy-home-network-security-threats-of-2017\">\u5bb6\u7528\u8def\u7531\u5668<\/a>\u5e95\u4e0b\u7684\u9023\u7db2\u88dd\u7f6e\u6700\u983b\u7e41\u7684\u7db2\u8def\u6d3b\u52d5\u3002<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/trend-micro-cloud-app-security-2017-report-boosting-the-security-of-office-365-by-blocking-3-4-million-high-risk-threats\">\u96fb\u5b50\u90f5\u4ef6<\/a>\u4f9d\u820a\u662f\u60e1\u610f\u7a0b\u5f0f\u548c\u5176\u4ed6\u5a01\u8105\u6700\u666e\u904d\u7684\u611f\u67d3\u9014\u5f91\uff0c\u800c\u8b8a\u81c9\u8a50\u9a19\u5168\u7403\u640d\u5931\u4e5f\u4f86\u5230 <a href=\"https:\/\/documents.trendmicro.com\/assets\/rpt\/rpt-2017-Annual-Security-Roundup-The-Paradox-of-Cyberthreats.pdf\">50 \u5104\u7f8e\u5143<\/a>\u4e4b\u8b5c\u3002\u52d2\u7d22\u75c5\u6bd2\u7684\u6210\u9577\u5230\u9054\u9ad8\u539f\u671f\uff0c\u4f46 WannaCry\u3001Petya \u548c Bad Rabbit \u7b49\u52d2\u7d22\u75c5\u6bd2\u537b\u9020\u6210\u4e86\u524d\u6240\u672a\u6709\u7684<a href=\"https:\/\/www.cbsnews.com\/news\/wannacry-ransomware-attacks-wannacry-virus-losses\/\">\u5927\u7bc4\u570d<\/a>\u640d\u5bb3\u3002\u5f37\u5927\u7684\u6f0f\u6d1e\u653b\u64ca\u624b\u6cd5\u548c\u99ed\u5ba2\u5de5\u5177\u4f9d\u7136<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/shadow-brokers-leaks-hacking-tools-what-it-means-for-enterprises\">\u4e26\u672a\u6d88\u5931<\/a>\u3002\u884c\u52d5\u52d2\u7d22\u75c5\u6bd2\u8207\u9280\u884c\u6728\u99ac\u7a0b\u5f0f\u4e5f<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/2017-mobile-threat-landscape\">\u4f9d\u7136<\/a>\u84ec\u52c3\u767c\u5c55\u3002<\/p>\n<p>\u6b63\u5982\u5a01\u8105\u60c5\u52e2\u7684\u767c\u5c55\u6b77\u53f2\u6240\u793a\uff0c\u7db2\u8def\u8cc7\u5b89\u4e8b\u4ef6\u7684\u61c9\u8b8a\u4f3c\u4e4e\u90fd\u592a\u904e\u88ab\u52d5\uff0c\u9019\u6a23\u7684\u505a\u6cd5\u5f88\u96e3\u767c\u63ee\u6548\u679c\u3002\u5c24\u5176\uff0c\u4eca\u65e5\u7684\u7cfb\u7d71\u5df2\u8b8a\u5f97\u5982\u6b64\u8907\u96dc\uff0c\u800c\u60e1\u610f\u7a0b\u5f0f\u4e5f\u5982\u6b64\u7316\u7357\uff0c\u770b\u4f86\u8981\u96a8\u6642\u8ddf\u4e0a\u5a01\u8105\u7684\u8173\u6b65\u5e7e\u4e4e\u4e0d\u53ef\u80fd\u3002\u6709\u9451\u65bc\u8fd1\u671f\u3001\u7576\u524d\u53ca\u672a\u4f86\u65b0\u8208\u5a01\u8105\u7684\u898f\u6a21\u3001\u7bc4\u570d\u548c\u591a\u6a23\u6027\uff0c\u4f01\u696d\u8feb\u5207\u9700\u8981\u4e00\u5957\u4e3b\u52d5\u7684\u4e8b\u4ef6\u61c9\u8b8a\u7b56\u7565\u3002<\/p>\n<p><strong><a href=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2018.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-55345\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2018.jpg\" alt=\"\" width=\"535\" height=\"299\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2018.jpg 535w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2018-300x168.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2018-30x17.jpg 30w\" sizes=\"(max-width: 535px) 100vw, 535px\" \/><\/a><\/strong><\/p>\n<p>\u99ed\u5ba2\u52d5\u6a5f\u7684\u8f49\u8b8a\uff1a\u5f9e\u5e74\u5c11\u8f15\u72c2\u7684\u60e1\u4f5c\u5287\u548c\u55ae\u7d14\u53ea\u60f3\u6210\u540d\uff0c\u5230\u73fe\u5728\u767c\u5c55\u6210\u719f\u7684\u7db2\u8def\u72af\u7f6a\u8207\u7db2\u8def\u9593\u8adc\uff0c\u4e5f\u4fc3\u4f7f\u4f01\u696d\u6a5f\u69cb\u5fc5\u9808\u96a8\u6642\u56e0\u61c9\u4e0d\u65b7\u6210\u9577\u7684\u5a01\u8105\u800c\u8abf\u6574\uff0c\u4ee5\u4fdd\u969c\u81ea\u5df1\u7684\u71df\u904b\u3001\u7372\u5229\u53ca\u5546\u8b7d\u3002<\/p>\n<p>\u6b64\u5916\uff0c\u96a8\u8457<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/eu-general-data-protection-regulation-gdpr\">\u6b50\u76df\u901a\u7528\u8cc7\u6599\u4fdd\u8b77\u6cd5<\/a>\u7684\u4e0a\u8def\uff0c\u4f01\u696d\u6a5f\u69cb\u5728\u9762\u5c0d\u4eca\u65e5\u50b3\u7d71\u8cc7\u5b89\u9632\u8b77\u6240\u7121\u6cd5\u5075\u6e2c\u7684\u5a01\u8105\u6642\uff0c\u53ef\u80fd\u5c07\u4ed8\u51fa\u66f4\u6158\u75db\u7684\u4ee3\u50f9\u3002\u5c24\u5176\u5c0d\u90a3\u4e9b\u7f3a\u4e4f\u4eba\u529b\u3001\u6280\u8853\u6216\u6642\u9593\u4f86\u4e3b\u52d5\u76e3\u63a7\u7db2\u8def\u908a\u5883\u7684\u4f01\u696d\u6a5f\u69cb\u66f4\u662f\u5982\u6b64\u3002\u6240\u4ee5\uff0c\u63a1\u7528\u4e00\u5957\u4e3b\u52d5\u4e8b\u4ef6\u61c9\u8b8a\u7b56\u7565\u4f86\u642d\u914d\u7e31\u6df1\u9632\u79a6\uff0c\u5c31\u80fd\u8b93\u4f01\u696d\u638c\u63e1\u53ef\u63a1\u53d6\u884c\u52d5\u7684\u60c5\u5831\u548c\u5206\u6790\u8cc7\u8a0a\uff0c\u5354\u52a9\u4f01\u696d\u641c\u5c0b\u3001\u5075\u6e2c\u3001\u5206\u6790\u53ca\u56de\u61c9\u5404\u7a2e\u5a01\u8105\u548c\u60e1\u610f\u6d3b\u52d5\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/historical-overview-of-proactive-incident-response-strategies-and-what-they-mean-to-enterprises\">A Historical Overview of Proactive Incident Response Strategies and What They Mean to Enterprises<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u672c\u6587\u56de\u9867\u5a01\u8105\u60c5\u52e2\u767c\u5c55\u4e0a\u4e00\u4e9b\u4fc3\u4f7f\u4f01\u696d\u958b\u59cb\u63a1\u53d6\u4e3b\u52d5\u4e8b\u4ef6\u61c9\u8b8a\u7b56\u7565\u4ee5\u5f37\u5316\u5176\u7db2\u8def\u8cc7\u5b89\u9632\u79a6\u7684\u91cd\u5927\u4e8b\u4ef6\u3002 &nbsp; \u4eca\u65e5 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[1268,965],"tags":[2344,2434],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/55320"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=55320"}],"version-history":[{"count":0,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/55320\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=55320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=55320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=55320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}