{"id":59925,"date":"2019-04-02T09:00:46","date_gmt":"2019-04-02T01:00:46","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=59925"},"modified":"2019-03-19T18:30:45","modified_gmt":"2019-03-19T10:30:45","slug":"59925","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=59925","title":{"rendered":"\u8da8\u52e2\u79d1\u6280 2018 \u5e74 Cloud App Security \u5831\u544a\uff1a  \u91dd\u5c0d\u9032\u968e\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105\u7684\u9032\u968e\u9632\u79a6"},"content":{"rendered":"\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><strong>\u70ba\u4e86\u8b93\u4f01\u696d\u5b8c\u6574\u638c\u63e1\u4eca\u65e5\u7684\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105\u60c5\u52e2\uff0c\u6211\u5011\u8a73\u7d30\u7814\u7a76\u4e86\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u6240\u4f7f\u7528\u7684\u4e3b\u8981\u9032\u968e\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105\uff0c\u4e26\u4e14\u91dd\u5c0d\u9019\u4e9b\u5a01\u8105\u63d0\u4f9b\u6709\u6548\u7684\u9032\u968e\u9632\u79a6\u6280\u5de7\u3002<\/strong><\/p><\/blockquote>\n\n\n\n<p>\u5728\u6240\u6709\u7684\u611f\u67d3\u9014\u5f91\u7576\u4e2d\uff0c\u96fb\u5b50\u90f5\u4ef6\u4f9d\u7136\u662f\u7db2\u8def\u72af\u7f6a\u6700\u5e38\u7528\u7684\u7ba1\u9053\uff0c\u56e0\u70ba\u5b83\u975e\u5e38\u5bb9\u6613\u4e0b\u624b\u3002\u96fb\u5b50\u90f5\u4ef6\u9664\u4e86\u662f\u4eca\u65e5\u4eba\u5011\u6e9d\u901a\u5408\u4f5c\u7684\u6a19\u6e96\u5de5\u5177\u4e4b\u5916\uff0c\u5927\u91cf\u6563\u767c\u96fb\u5b50\u90f5\u4ef6\u66f4\u662f\u5e7e\u4e4e\u4e0d\u8cbb\u529b\u6c23\u6216\u6210\u672c (\u5118\u7ba1\u4e26\u975e\u5b8c\u5168\u514d\u8cbb)\u3002\u96fb\u5b50\u90f5\u4ef6\u5c0d\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u7684\u65b9\u4fbf\u6027\uff0c\u8b93\u4f7f\u7528\u96fb\u5b50\u90f5\u4ef6\u7684\u4f01\u696d\u74b0\u5883\u9762\u81e8\u5c64\u51fa\u4e0d\u7aae\u7684\u98a8\u96aa\uff1a\u8a50\u9a19\u3001\u9593\u8adc\u6d3b\u52d5\u3001\u8cc7\u8a0a\u7aca\u76dc\u3001\u5047\u5192\u90f5\u4ef6\u4ee5\u53ca\u5176\u4ed6\u653b\u64ca\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"535\" height=\"310\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2013.jpg\" alt=\"\" class=\"wp-image-55340\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2013.jpg 535w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2013-300x174.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2018\/04\/2013-30x17.jpg 30w\" sizes=\"(max-width: 535px) 100vw, 535px\" \/><\/figure>\n\n\n\n<p>2018 \u5e74\uff0c\u8da8\u52e2\u79d1\u6280 Smart Protection Network&#x2122; \u5168\u7403\u5a01\u8105\u60c5\u5831\u7db2\u5075\u6e2c\u4e26\u6514\u622a\u4e86<strong> 410 \u5104\u6b21\u4ee5\u4e0a\u7684\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105<\/strong>\u3002\u7db2\u8def\u91e3\u9b5a\u653b\u64ca\u8207\u5783\u573e\u90f5\u4ef6\u6578\u91cf\u7684<a rel=\"noreferrer noopener\" href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/unraveling-the-tangle-of-old-and-new-threats\" target=\"_blank\">\u66b4\u589e<\/a>\uff0c\u4ee5\u53ca\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u7121\u6642\u7121\u523b\u4e0d\u5728\u5229\u7528\u96fb\u5b50\u90f5\u4ef6\u6563\u5e03\u5404\u7a2e\u60e1\u610f\u7a0b\u5f0f\uff0c\u90fd\u662f\u9019\u9805\u6578\u5b57\u5982\u6b64\u9f90\u5927\u7684\u539f\u56e0\u3002\u9019\u4e9b\u5a01\u8105\u4e0d\u4f46\u6301\u7e8c\u7e41\u884d\uff0c\u800c\u4e14\u96e3\u4ee5\u6839\u9664\uff0c\u6240\u4ee5\u4f01\u696d\u61c9\u6df1\u5165\u4e86\u89e3\u8a72\u63a1\u53d6\u4f55\u7a2e\u63aa\u65bd\u4f86\u4fdd\u8b77\u81ea\u5df1\u7684\u7cfb\u7d71\u8207\u7db2\u8def\uff0c\u624d\u80fd\u6709\u6548\u7387\u5730\u9632\u7bc4\u9019\u4e9b\u5a01\u8105\u3002<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u9ad8\u98a8\u96aa\u7684\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105\u9700\u8981\u4e00\u9053\u984d\u5916\u7684\u8cc7\u5b89\u9632\u8b77<\/h2>\n\n\n\n<p>\u8da8\u52e2\u79d1\u6280<a href=\"https:\/\/www.trendmicro.com\/zh_tw\/business\/products\/user-protection\/sps\/email-and-collaboration\/cloud-app-security.html\">\u8da8\u52e2\u79d1\u6280 Cloud App Security&#x2122;<\/a> \u89e3\u6c7a\u65b9\u6848\u80fd\u63d0\u4f9b\u9032\u968e\u9632\u8b77\u4f86\u4fdd\u8b77\u96f2\u7aef\u96fb\u5b50\u90f5\u4ef6\u8207\u6a94\u6848\u5206\u4eab\u61c9\u7528\u7a0b\u5f0f\uff0c\u5982 Microsoft<sup>\u00ae<\/sup>\u00a0Office 365&#x2122; Exchange&#x2122; Online\u3001Google Drive&#x2122;\u3001OneDrive<sup>\u00ae<\/sup>\u00a0for Business \u4ee5\u53ca SharePoint<sup>\u00ae<\/sup>\u00a0Online \u7b49\u5e73\u53f0\uff0c\u78ba\u4fdd\u4f01\u696d\u8cc7\u7522 (\u5c24\u5176\u662f\u8cc7\u6599) \u7684\u5b89\u5168\u8207\u4fbf\u5229\u6027\u3002\u9019\u5957\u89e3\u6c7a\u65b9\u6848\u53ef\u5728\u96fb\u5b50\u90f5\u4ef6\u548c\u6a94\u6848\u901a\u904e\u96f2\u7aef\u61c9\u7528\u7a0b\u5f0f\u5167\u5efa\u7684\u5b89\u5168\u6a5f\u5236\u904e\u6ffe\u4e4b\u5f8c\uff0c\u63d0\u4f9b\u4e00\u9053\u984d\u5916\u7684\u9632\u8b77\u3002\u5b83\u63a1\u7528<ins><a href=\"https:\/\/blog.trendmicro.com.tw\/?p=55169\"><ins>\u6a5f\u5668\u5b78\u7fd2(Machine learning,ML)<\/ins><\/a><\/ins>\u3001\u6c99\u76d2\u6a21\u64ec\u60e1\u610f\u7a0b\u5f0f\u5206\u6790\u4ee5\u53ca\u5176\u4ed6\u7db2\u8def\u8cc7\u5b89\u6280\u8853\u4f86\u4fdd\u8b77\u7cfb\u7d71\uff0c\u9632\u7bc4<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=16295\">\u8b8a\u81c9\u8a50\u9a19\u653b\u64ca\u6216\u7a31\u70ba\u5546\u52d9\u96fb\u5b50\u90f5\u4ef6\u5165\u4fb5 (Business Email CompromiseHYPERLINK \uff0c\u7c21\u7a31BEC)<\/a>\u3001<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=136\">\u7db2\u8def\u91e3\u9b5a(Phishing)<\/a>\u3001<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=15888\">\u9b5a\u53c9\u5f0f\u91e3\u9b5a\uff08spear phishing\uff09<\/a>\u3001\u7db2\u8def\u6355\u9be8 (whaling)\u3001<a href=\"\u52d2\u7d22\u75c5\u6bd2%20\">\u52d2\u7d22\u75c5\u6bd2 <\/a>\uff0c\u4ee5\u53ca\u5176\u4ed6\u9032\u968e\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105\u3002<\/p>\n\n\n\n<p>2018 \u5e74\uff0cCloud\nApp Security \u6240\u6514\u622a\u7684\u5a01\u8105\u6578\u91cf\u751a\u81f3\u53c8\u8d85\u8d8a\u524d\u4e00\u5e74\uff0c\u7e3d\u5171\u5075\u6e2c\u4e26\u6514\u622a\u4e86 <strong>&nbsp;8,920,792 \u6b21\u9ad8\u98a8\u96aa\u7684\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105<\/strong>\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/Figure-1-01-CAS-2018.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<p>\u6709\u4e9b\u4f7f\u7528\nOffice 365 \u96fb\u5b50\u90f5\u4ef6\u670d\u52d9\u7684\u4f01\u696d\u55ae\u7d14\u50c5\u4f7f\u7528\u5167\u5efa\u7684\u8cc7\u5b89\u904e\u6ffe\u529f\u80fd\uff0c\u6709\u4e9b\u5247\u6703\u518d\u642d\u914d\u4e00\u5957\u6216\u591a\u5957\u7b2c\u4e09\u65b9\u8cc7\u5b89\u89e3\u6c7a\u65b9\u6848\u4f86\u63d0\u4f9b\u984d\u5916\u7684\u5a01\u8105\u9632\u8b77\u3002\u6839\u64da 2018 \u5e74\u7684\u5a01\u8105\u8cc7\u6599\u986f\u793a\uff0cCloud\nApp Security \u78ba\u5be6\u6709\u52a9\u65bc\u5f37\u5316\u4f01\u696d\u7684\u73fe\u6709\u96fb\u5b50\u90f5\u4ef6\u9632\u8b77 (\u4e0d\u8ad6\u662f\u5167\u5efa\u9632\u8b77\u6216\u7368\u7acb\u7522\u54c1)\uff0c\u5e6b\u4f01\u696d\u5075\u6e2c\u53ca\u6514\u622a\u73fe\u6709\u9632\u8b77\u6f0f\u6389\u7684\u9ad8\u98a8\u96aa\u5a01\u8105\u3002<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>\u67d0\u5bb6\u64c1\u6709 8 \u842c\u540d\nOffice 365 \u4f7f\u7528\u8005\u7684\u5927\u578b\u7269\u6d41\u516c\u53f8\u5c31\u662f\u4e00\u500b\u4f8b\u5b50\u3002Cloud App Security \u70ba\u8a72\u516c\u53f8\u984d\u5916\u5075\u6e2c\u4e26\u6514\u622a\u4e86 50 \u842c\u6b21\u4ee5\u4e0a\u7684\u7db2\u8def\u91e3\u9b5a\u548c\u5176\u4ed6\u5a01\u8105 (\u8a73\u7d30\u6578\u5b57\u8acb\u53c3\u95b1\u4e0b\u5716)\u3002\u9019\u4e9b\u9ad8\u98a8\u96aa\u7684\u5a01\u8105\u662f\u5728\u7d93\u904e\nOffice 365 \u5167\u5efa\u8cc7\u5b89\u6a5f\u5236\u8207 Office 365 \u9032\u968e\u5a01\u8105\u9632\u8b77 (ATP) \u9644\u52a0\u670d\u52d9\u7684\u904e\u6ffe\u4e4b\u5f8c\u624d\u5075\u6e2c\u5230\u3002\u53e6\u4e00\u500b\u6848\u4f8b\u5247\u662f\u4e00\u5bb6\u64c1\u6709 12 \u842c\u540d\nOffice 365 \u4f7f\u7528\u8005\u7684\u5927\u578b\u91ab\u7642\u6a5f\u69cb\u3002\u8a72\u6a5f\u69cb\u5df2\u90e8\u7f72\u4e86\u4e00\u5957\u7b2c\u4e09\u65b9\u96fb\u5b50\u90f5\u4ef6\u5b89\u5168\u9598\u9053\uff0c\u4f46 Cloud App Security \u4ecd\u984d\u5916\u6514\u622a\u4e86\u6578\u5341\u842c\u6b21\u7684\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105\n(\u8a73\u7d30\u6578\u5b57\u8acb\u53c3\u95b1\u4e0b\u5716)\u3002<\/p>\n\n\n\n<p>\u5c31\u7b97\u5149\u63a1\u7528\nCloud App Security \u4f86\u63d0\u4f9b\u4e00\u9053\u984d\u5916\u9632\u8b77\u7684\u4f01\u696d\uff0c\u540c\u6a23\u4e5f\u80fd\u63d0\u5347\u96fb\u5b50\u90f5\u4ef6\u5b89\u5168\u3002\u4e00\u5bb6\u64c1\u6709 1 \u842c\u540d Office 365 \u4f7f\u7528\u8005\u7684\u7db2\u969b\u7db2\u8def\u516c\u53f8\uff0c\u4ee5\u53ca\u4e00\u5bb6\u53ea\u6709\n115 \u540d Office 365 \u4f7f\u7528\u8005\u7684\u5c0f\u8cc7\u8a0a\u516c\u53f8\uff0c\u90fd\u984d\u5916\u5075\u6e2c\u5230\u4e0d\u5c11\u5a01\u8105 (\u8a73\u7d30\u6578\u5b57\u8acb\u53c3\u95b1\u4e0b\u5716)\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"288\" height=\"287\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/o3651-1.jpg\" alt=\"\" class=\"wp-image-59928\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/o3651-1.jpg 288w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/o3651-1-150x150.jpg 150w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/o3651-1-30x30.jpg 30w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/o3651-1-60x60.jpg 60w\" sizes=\"(max-width: 288px) 100vw, 288px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/Flipcard_Logistics-Flipped.jpg?v1\" alt=\"\" width=\"282\" height=\"282\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"287\" height=\"293\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/o3652.jpg\" alt=\"\" class=\"wp-image-59929\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/o3652.jpg 287w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/o3652-30x30.jpg 30w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/o3652-60x60.jpg 60w\" sizes=\"(max-width: 287px) 100vw, 287px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/Flipcard_Hospitality-Flipped.jpg?v1.0\" alt=\"\" width=\"287\" height=\"287\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"285\" height=\"292\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/o3654.jpg\" alt=\"\" class=\"wp-image-59931\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/o3654.jpg 285w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/o3654-30x30.jpg 30w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/o3654-60x60.jpg 60w\" sizes=\"(max-width: 285px) 100vw, 285px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/Flipcard_Internet-Flipped.jpg?v1\" alt=\"\" width=\"281\" height=\"281\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"285\" height=\"292\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/o3654.jpg\" alt=\"\" class=\"wp-image-59931\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/o3654.jpg 285w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/o3654-30x30.jpg 30w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/o3654-60x60.jpg 60w\" sizes=\"(max-width: 285px) 100vw, 285px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/Flipcard_Information-Flipped.jpg?v1\" alt=\"\" width=\"283\" height=\"283\"\/><\/figure>\n\n\n\n<p>\u5728\u9023\u7db2\u7684\u6642\u4ee3\uff0c\u591a\u5c64\u5f0f\u7db2\u8def\u8cc7\u5b89\u9632\u8b77\u78ba\u5be6\u975e\u5e38\u91cd\u8981\uff0c\u56e0\u70ba\uff0c\u4e0d\u8ad6\u4f01\u696d\u898f\u6a21\u5982\u4f55\uff0c\u90fd\u6709\u5f88\u9ad8\u7684\u6a5f\u7387\u9047\u5230\u4e00\u4e9b\u57f7\u610f\u7a81\u7834\u4f01\u696d\u8cc7\u5b89\u9632\u79a6\u7684\u5a01\u8105\u30022018\n\u5e74\uff0c\u6211\u5011\u898b\u5230\u7684\u65b0\u5f0f\u96fb\u5b50\u90f5\u4ef6\u653b\u64ca\u6280\u5de7\u548c\u767c\u5c55\u8da8\u52e2\u7686\u662f\u671d\u8457\u9019\u6a23\u7684\u76ee\u6a19\u9081\u9032\u3002\u4e0d\u4f46\u5982\u6b64\uff0c\u9280\u884c\u6728\u99ac\u7a0b\u5f0f\u3001\u5f8c\u9580\u7a0b\u5f0f\u3001\u52d2\u7d22\u75c5\u6bd2\u7b49\u9019\u985e\u719f\u6089\u4e14\u60e1\u540d\u662d\u5f70\u7684\u60e1\u610f\u7a0b\u5f0f\uff0c\u540c\u6a23\u4e5f\u6301\u7e8c\u5229\u7528\u96fb\u5b50\u90f5\u4ef6\u4f86\u6563\u5e03\u3002\u70ba\u4e86\u8b93\u4f01\u696d\u5b8c\u6574\u638c\u63e1\u4eca\u65e5\u7684\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105\u60c5\u52e2\uff0c\u6211\u5011\u8a73\u7d30\u7814\u7a76\u4e86\u9019\u4e9b\u91cd\u8981\u7684\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105\uff0c\u4e26\u63d0\u51fa\u4e00\u4e9b\u80fd\u5920\u9632\u7bc4\u9019\u4e9b\u9032\u968e\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105\u7684\u5efa\u8b70\u63aa\u65bd\u3002<\/p>\n\n\n\n<p><strong>&#8230;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u767b\u5165\u6191\u8b49\u7db2\u8def\u91e3\u9b5a\u624b\u6cd5\u9010\u6f38\u76ef\u4e0a\nOffice 365 \u4f7f\u7528\u8005<\/h2>\n\n\n\n<p>\u767b\u5165\u6191\u8b49\u7db2\u8def\u91e3\u9b5a\u8d8a\u4f86\u8d8a\u84ec\u52c3\u767c\u5c55\uff0c\u56e0\u70ba\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u7684\u653b\u64ca\u4f0e\u5006\u6b63\u4e0d\u65b7\u767c\u5c55\u51fa\u65b0\u7684\u8b8a\u5316\u3002\u6839\u64da\nCloud App Security \u7684\u8cc7\u6599\u986f\u793a\uff0c\u767b\u5165\u6191\u8b49\u7db2\u8def\u91e3\u9b5a\u653b\u64ca\u4ecd\u975e\u5e38\u666e\u904d\uff0c\u5728 2018 \u5e74\u6240\u6709\u5075\u6e2c\u5230\u7684\u9ad8\u98a8\u96aa\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105\u7576\u4e2d\u5360 40%\u3002<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"438\" height=\"415\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/Malware.jpg\" alt=\"\" class=\"wp-image-59939\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/Malware.jpg 438w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/Malware-300x284.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/Malware-30x28.jpg 30w\" sizes=\"(max-width: 438px) 100vw, 438px\" \/><\/figure>\n\n\n\n<p>\u767b\u5165\u6191\u8b49\u7db2\u8def\u91e3\u9b5a &#8211;\u00a0<strong>40% (\u5075\u6e2c\u6578\u91cf\uff1a3,530,495)<\/strong><\/p>\n\n\n\n<p>\u767b\u5165\u6191\u8b49\u7db2\u8def\u91e3\u9b5a\u5728 Cloud\nApp Security 2018 \u5e74\u5075\u6e2c\u5230\u7684 890 \u842c\u6b21\u9ad8\u98a8\u96aa\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105\u7576\u4e2d\u5360 40%\u3002<\/p>\n\n\n\n<p>\u53bb\u5e74\u51fa\u73fe\u4e86\u65b0\u7684\u767b\u5165\u6191\u8b49\u7db2\u8def\u91e3\u9b5a\u653b\u64ca\u624b\u6cd5\u5c08\u9580\u653b\u64ca\nOffice 365 \u4f7f\u7528\u8005\uff0c\u4e26\u4e14\u767b\u4e0a\u4e86<a href=\"https:\/\/www.csoonline.com\/article\/3225469\/security\/office-365-phishing-attacks-create-a-sustained-insider-nightmare-for-it.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u5a92\u9ad4\u7248\u9762<\/a>\u3002Cloud App Security \u80fd\u5075\u6e2c\u9019\u4e9b\u8a66\u5716\u900f\u904e\u985e\u4f3c\u624b\u6cd5\u9a19\u53d6\nOffice 365 \u4f7f\u7528\u8005\u5e33\u865f\u767b\u5165\u6191\u8b49\u7684\u7db2\u8def\u91e3\u9b5a\u90f5\u4ef6\u3002<\/p>\n\n\n\n<p>\u4e0b\u5716\u986f\u793a\u4e00\u5c01 10 \u6708\u4efd\u5075\u6e2c\u5230\u7684\u96fb\u5b50\u90f5\u4ef6\uff0c\u5b83\u5047\u5192\u6210 Office 365 \u7684\u5e33\u865f\u95dc\u9589\u901a\u77e5\u3002\u5728\u9019\u5834\u9a19\u5c40\u7576\u4e2d\uff0c\u6b79\u5f92\u8b0a\u7a31\u4f7f\u7528\u8005\u8981\u6c42\u95dc\u9589\u81ea\u5df1\u7684\u4f01\u696d\u96fb\u5b50\u90f5\u4ef6\u5e33\u865f\uff0c\u56e0\u800c\u767c\u9001\u9019\u5c01\u96fb\u5b50\u90f5\u4ef6\u4f86\u544a\u77e5\u4f7f\u7528\u8005\u3002\u96fb\u5b50\u90f5\u4ef6\u5167\u5bb9\u9084\u5efa\u8b70\u4f7f\u7528\u8005\uff0c\u5982\u679c\u9019\u9805\u901a\u77e5\u6709\u8aa4\u7684\u8a71\uff0c\u53ef\u9ede\u9078\u90f5\u4ef6\u4e0b\u65b9\u7684\u9023\u7d50\u4f86\u53d6\u6d88\u9019\u9805\u52d5\u4f5c\u3002\u4f7f\u7528\u8005\u82e5\u9ede\u9078\u4e86\u9023\u7d50\uff0c\u5c31\u6703\u88ab\u5e36\u5f80\u4e00\u500b\u5047\u5192\u6210 Office 365 \u767b\u5165\u756b\u9762\u7684\u7db2\u8def\u91e3\u9b5a\u7db2\u9801\u3002\u4f7f\u7528\u8005\u88ab\u9a19\u5728\u6b64\u8f38\u5165\u4e86\u81ea\u5df1\u7684 Office 365 \u5e33\u865f\u767b\u5165\u6191\u8b49\uff0c\u90a3\u5c31\u7b49\u65bc\u81ea\u5df1\u5c07\u8cc7\u6599\u5949\u9001\u7d66\u6b79\u5f92\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/screenshot-office365-CAS-2018.jpg?v1\" alt=\"\u00e9\u0080\u0099\u00e5\u00bc\u00b5\u00e5\u009c\u0096\u00e7\u0089\u0087\u00e7\u009a\u0084 alt \u00e5\u00b1\u00ac\u00e6\u0080\u00a7\u00e5\u0080\u00bc\u00e7\u0082\u00ba\u00e7\u00a9\u00ba\u00ef\u00bc\u008c\u00e5\u00ae\u0083\u00e7\u009a\u0084\u00e6\u00aa\u0094\u00e6\u00a1\u0088\u00e5\u0090\u008d\u00e7\u00a8\u00b1\u00e7\u0082\u00ba screenshot-office365-CAS-2018.jpg\"\/><\/figure>\n\n\n\n<p>Office 365 \u9010\u6f38\u53d7\u5230\u9752\u775e\uff0c\u8b93\u8a72\u670d\u52d9\u6210\u70ba\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u773c\u4e2d\u7684\u80a5\u7f8a\u3002\u524d\u9762\u9019\u5c01 Cloud App\nSecurity \u6240\u5075\u6e2c\u5230\u7684\u767b\u5165\u6191\u8b49\u7db2\u8def\u91e3\u9b5a\u90f5\u4ef6\uff0c\u6b63\u662f\u5047\u5192\u6210 Office 365 \u7684\u901a\u77e5\u90f5\u4ef6\u3002<\/p>\n\n\n\n<p>\u9664\u4e86\u9019\u985e\u5e33\u865f\u95dc\u9589\u901a\u77e5\u8a50\u9a19\u4e4b\u5916\uff0c\u9084\u6709\u8a31\u591a\u5176\u4ed6\u5c08\u9580\u91dd\u5c0d\nOffice 365 \u4f7f\u7528\u8005\u7684\u7db2\u8def\u91e3\u9b5a\u624b\u6cd5\u30022018 \u5e74 12 \u6708\uff0c\u6211\u5011\u5075\u6e2c\u5230\u4e00\u4e9b\u5047\u5192\u6210\u90f5\u4ef6\u905e\u9001\u5931\u6557\u901a\u77e5 (<a href=\"https:\/\/www.techopedia.com\/definition\/1695\/non-delivery-report-ndr\" target=\"_blank\" rel=\"noreferrer noopener\">NDR<\/a>) \u7684\u96fb\u5b50\u90f5\u4ef6\uff0c\u540c\u6a23\u4e5f\u662f\u8a66\u5716\u9a19\u53d6\nOffice 365 \u4f7f\u7528\u8005\u7684\u767b\u5165\u6191\u8b49\u3002\u9019\u4e9b\u7531 Internet Storm Center (ISC) \u8cc7\u6df1\u7814\u7a76\u4eba\u54e1 Xavier Mertens \u6240\u767c\u73fe\u7684 <a href=\"https:\/\/isc.sans.edu\/diary\/rss\/24412\" target=\"_blank\" rel=\"noreferrer noopener\">NDR \u96fb\u5b50\u90f5\u4ef6<\/a>\u7576\u4e2d\uff0c\u5305\u542b\u4e86\u4e00\u500b\u60e1\u610f\u9023\u7d50\u4f86\u8b93\u5c07\u4f7f\u7528\u8005\u5e36\u5f80\u4e00\u500b\u5047\u5192\u7684 Office 365 \u767b\u5165\u756b\u9762\u3002<\/p>\n\n\n\n<p>2019 \u5e74 1 \u6708\uff0c\u7f8e\u570b\u7279\u52e4\u5c40 (U.S.\nSecret Service) \u4e5f\u516c\u5e03\u4e86\u4e00\u4e9b\u5c08\u9580\u91dd\u5c0d Office 365 \u7684\u7db2\u8def\u91e3\u9b5a\u653b\u64ca\u8cc7\u8a0a\u3002\u8a72\u5c40\u63d0\u4f9b\u7684\u8cc7\u8a0a\u7576\u4e2d\u63d0\u5230\u4e86\u4e00\u4e9b\u5c08\u9580\u6563\u5e03\u67d0\u500b\u52a0\u5bc6\u6587\u4ef6\u7684\u9b5a\u53c9\u5f0f\u7db2\u8def\u91e3\u9b5a\u90f5\u4ef6\u3002\u7576\u4f7f\u7528\u8005\u9ede\u9078\u4e86\u90f5\u4ef6\u4e2d\u7684\u9023\u7d50\u4e4b\u5f8c\uff0c\u5c31\u6703\u51fa\u73fe\u4e00\u500b\u5e7e\u53ef\u4e82\u771f\u7684\nOffice 365 \u767b\u5165\u756b\u9762\u8981\u6c42\u4f7f\u7528\u8005\u8f38\u5165\u81ea\u5df1\u7684\u767b\u5165\u6191\u8b49\u3002\u4f7f\u7528\u8005\u82e5\u4e0d\u5c0f\u5fc3\u53d7\u9a19\u4e0a\u7576\uff0c\u5c31\u7b49\u65bc\u5c07\u81ea\u5df1\u7684\u96fb\u5b50\u90f5\u4ef6\u5e33\u865f\u62f1\u624b\u8b93\u7d66\u6b79\u5f92\u3002<\/p>\n\n\n\n<p><strong>&#8230;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u8b8a\u81c9\u8a50\u9a19\u4f9d\u7136\u4e0d\u6e1b\uff0c\u65b0\u7684\u5a01\u8105\u537b\u4e0d\u65b7\u51fa\u73fe<\/h2>\n\n\n\n<p>\u8b8a\u81c9\u8a50\u9a19 (BEC) \u5617\u8a66\u653b\u64ca\u7d04\u5360\u6574\u9ad4\u5075\u6e2c\u6578\u91cf\u7684 1%\u3002\u82e5\u8207\u5176\u4ed6 Cloud App Security \u5075\u6e2c\u5230\u7684\u5a01\u8105\u76f8\u6bd4\uff0c\u9019\u9805\u6578\u5b57\u4f3c\u4e4e\u4e0d\u9ad8\u3002\u7136\u800c\u8b8a\u81c9\u8a50\u9a19\u537b\u4e0d\u5bb9\u5c0f\u89b7\uff1a\u6839\u64da\u7f8e\u570b\u806f\u90a6\u8abf\u67e5\u5c40 (FBI) \u5728 2018 \u5e74 7 \u6708\u767c\u5e03\u7684\u8b8a\u81c9\u8a50\u9a19<a rel=\"noreferrer noopener\" href=\"https:\/\/www.ic3.gov\/media\/2018\/180712.aspx\" target=\"_blank\">\u516c\u544a<\/a>\uff0c\u8b8a\u81c9\u8a50\u9a19\u5728\u5168\u7403\u5df2\u7d2f\u7a4d\u9020\u6210 125 \u5104\u7f8e\u5143\u7684\u640d\u5931\uff0c\u5e73\u5747\u6bcf\u4e00\u8d77\u8b8a\u81c9\u8a50\u9a19\u7684\u5e73\u5747\u53d7\u5bb3\u91d1\u984d\u70ba 159,000 \u7f8e\u5143\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/BEC1.jpg\" alt=\"\u00e9\u0080\u0099\u00e5\u00bc\u00b5\u00e5\u009c\u0096\u00e7\u0089\u0087\u00e7\u009a\u0084 alt \u00e5\u00b1\u00ac\u00e6\u0080\u00a7\u00e5\u0080\u00bc\u00e7\u0082\u00ba\u00e7\u00a9\u00ba\u00ef\u00bc\u008c\u00e5\u00ae\u0083\u00e7\u009a\u0084\u00e6\u00aa\u0094\u00e6\u00a1\u0088\u00e5\u0090\u008d\u00e7\u00a8\u00b1\u00e7\u0082\u00ba BEC1.jpg\"\/><\/figure>\n\n\n\n<p>\u8b8a\u81c9\u8a50\u9a19\u5617\u8a66 &#8211;\u00a0<strong>1% (\u5075\u6e2c\u6578\u91cf\uff1a103,955)<\/strong><\/p>\n\n\n\n<p>\u8b8a\u81c9\u8a50\u9a19 (BEC) \u5728 Cloud App Security 2018 \u5e74\u5075\u6e2c\u5230\u7684\u6240\u6709\u9ad8\u98a8\u96aa\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105\u7576\u4e2d\u5360 1%\u3002<\/p>\n\n\n\n<p>\u6839\u64da FBI \u7684\u8cc7\u6599\uff0c\u5f9e 2013 \u5e74\u8d77\u81f3 2018 \u5e74\uff0c\u8b8a\u81c9\u8a50\u9a19\u5df2\u7d2f\u7a4d\u9020\u6210 125 \u5104\u7f8e\u5143\u7684\u5168\u7403\u640d\u5931\uff0c\u8f03 2017 \u5e74\u7684\u6578\u5b57\u6210\u9577 136.4%\u3002<\/p>\n\n\n\n<p>\u9664\u4e86\u524d\u8ff0\u7684\u5168\u7403\u640d\u5931\u4e4b\u5916\uff0c\u540c\u4e00\u4efd\u516c\u544a\u66f4\u6307\u51fa\u623f\u5730\u7522\u696d\u6b63\u9010\u6f38\u6210\u70ba\u8b8a\u81c9\u8a50\u9a19\u72af\u7f6a\u96c6\u5718\u7684\u9396\u5b9a\u76ee\u6a19\u30022018 \u5e74 5 \u6708\u662f\u623f\u5730\u7522\u696d\u81ea 2015 \u5e74\u4ee5\u4f86\u8b8a\u81c9\u8a50\u9a19\u53d7\u5bb3\u8005\u6700\u591a\u7684\u4e00\u6b21\u3002FBI \u6307\u51fa\uff0c\u5176\u53d7\u5bb3\u8005\u904d\u53ca\u623f\u5730\u7522\u4ea4\u6613\u7684\u6240\u6709\u74b0\u7bc0\uff0c\u5f9e\u7522\u6b0a\u516c\u53f8\u3001\u6cd5\u5f8b\u4e8b\u52d9\u6240\u3001\u623f\u5730\u7522\u4ef2\u4ecb\u5230\u8cb7\u65b9\u8207\u8ce3\u65b9\u7686\u53ef\u80fd\u53d7\u5bb3\u3002\u6240\u6709\u53d7\u5bb3\u8005\u90fd\u662f\u6536\u5230\u5047\u5192\u7684\u96fb\u5b50\u90f5\u4ef6\u8a98\u9a19\u4ed6\u5011\u8b8a\u66f4\u4ed8\u6b3e\u65b9\u5f0f\u6216\u76ee\u7684\u5730\uff0c\u5c0e\u81f4\u4ed6\u5011\u5c07\u6b3e\u9805\u532f\u5230\u8b8a\u81c9\u8a50\u9a19\u96c6\u5718\u7684\u5e33\u6236\u3002\u5f9e\u8b8a\u81c9\u8a50\u9a19\u7684\u5404\u7a2e\u6848\u4f8b\u5c31\u80fd\u770b\u51fa\uff0c\u8b8a\u66f4\u6536\u6b3e\u5e33\u6236\u662f\u8b8a\u81c9\u8a50\u9a19\u96c6\u5718\u7684\u4e00\u8cab\u4f0e\u5006\uff0c\u800c\u975e\u7279\u5225\u91dd\u5c0d\u623f\u5730\u7522\u696d\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"590\" height=\"408\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/BEC2.jpg\" alt=\"\" class=\"wp-image-59938\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/BEC2.jpg 590w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/BEC2-300x207.jpg 300w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2019\/04\/BEC2-30x21.jpg 30w\" sizes=\"(max-width: 590px) 100vw, 590px\" \/><\/figure>\n\n\n\n<p>\u9019\u5c01\u4f86\u81ea\u67d0\u500b\u53ef\u7591\u7db2\u57df\u7684\u8b8a\u81c9\u8a50\u9a19\u90f5\u4ef6\u5047\u5192\u516c\u53f8\u7684\u9ad8\u5c64\u4e3b\u7ba1\u8981\u6c42\u8b8a\u66f4\u9280\u884c\u5e33\u6236\u8cc7\u6599\u3002<\/p>\n\n\n\n<p>\u8b8a\u81c9\u8a50\u9a19\u96c6\u5718\u7684\u793e\u4ea4\u5de5\u7a0b\u4f0e\u5006\u9084\u4e0d\u53ea\u5982\u6b64\uff0c\u4ed6\u5011\u5728\u623f\u5730\u7522\u8a50\u9a19\u7576\u4e2d\u9084\u6703\u5229\u7528\u7576\u5730\u7684\u8eca\u624b\n(money mule) \u4f86\u6536\u6b3e\uff0c\u800c\u9019\u4e9b\u8eca\u624b\u5247\u662f\u4ed6\u5011\u5229\u7528<a href=\"https:\/\/www.forbes.com\/sites\/dianahembree\/2017\/06\/20\/romance-scam-crimes-on-the-rise\/#1710d1605ec1\" target=\"_blank\" rel=\"noreferrer noopener\">\u91d1\u5149\u9ee8\u6216\u5a5a\u59fb\u8a50\u9a19\u624b\u6cd5<\/a>\u6240\u9a19\u4f86\u7684\u53d7\u5bb3\u8005\u3002\u8a50\u9a19\u96c6\u5718\u6703\u8a98\u9a19\u9019\u4e9b\u53d7\u5bb3\u8005\u958b\u8a2d\u77ed\u671f\u4f7f\u7528\u7684\u9280\u884c\u5e33\u6236\u4f86\u6536\u6b3e\uff0c\u4ee5\u8eb2\u907f\u57f7\u6cd5\u6a5f\u95dc\u7684\u67e5\u7ddd\u3002<\/p>\n\n\n\n<p>2018 \u5e74 10 \u6708\uff0cFBI\n\u53c8\u767c\u5e03\u4e86\u4e00\u9805<a href=\"https:\/\/www.ic3.gov\/media\/2018\/181024.aspx\" target=\"_blank\" rel=\"noreferrer noopener\">\u516c\u544a<\/a>\u6307\u51fa\u4e00\u7a2e\u53d7\u5bb3\u8005\u88ab\u9a19\u8cfc\u8cb7\u79ae\u7269\u5361\u7684\u8b8a\u81c9\u8a50\u9a19\u6848\u4f8b\u6b63\u5728\u9010\u6f38\u589e\u52a0\u3002\u5728\u9019\u7a2e\u8a50\u9a19\u7576\u4e2d\uff0c\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u6703\u5047\u5192\u516c\u53f8\u4e3b\u7ba1\u900f\u904e\u5047\u5192\u7684\u90f5\u4ef6\u3001\u96fb\u8a71\u6216\u7c21\u8a0a\u8981\u6c42\u53d7\u5bb3\u8005\u5e6b\u5176\u500b\u4eba\u6216\u516c\u53f8\u8cfc\u8cb7\u79ae\u7269\u5361\u3002\u5728\u67d0\u4e9b\u6848\u4f8b\u7576\u4e2d\uff0c\u751a\u81f3\u9084\u6703\u984d\u5916\u8981\u6c42\u532f\u6b3e\u3002<\/p>\n\n\n\n<p>\u8a72\u5c40\u5f9e 2017 \u5e74\n1 \u6708\u81f3 2018 \u5e74 8 \u6708\uff0c\u7e3d\u5171\u63a5\u7372\u4e86 1,164 \u8d77\u79ae\u7269\u5361\u8b8a\u81c9\u8a50\u9a19\u901a\u5831\uff0c\u640d\u5931\u91d1\u984d\u5171 1,021,919 \u7f8e\u5143\u3002\u503c\u5f97\u6ce8\u610f\u7684\u662f\uff0c2017 \u5e74 1 \u6708\u81f3\n2018 \u5e74 8 \u6708\u9593\u6240\u63a5\u7372\u901a\u5831\u7684\u6848\u4ef6\u524d\u5f8c\u5171\u6210\u9577\u4e86 1,240% \u4ee5\u4e0a\uff0c\u986f\u793a\u79ae\u7269\u5361\u8b8a\u81c9\u8a50\u9a19\u6b63\u9010\u6f38\u8208\u8d77\u3002<\/p>\n\n\n\n<p><strong>&#8230;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u5229\u7528\u66f4\u591a\u6a94\u6848\u985e\u578b\u4f86\u8eb2\u907f\u5075\u6e2c<\/h2>\n\n\n\n<p>\u96a8\u8457\u8cc7\u5b89\u5ee0\u5546\u7684\u5075\u6e2c\u6280\u8853\u4e0d\u65b7\u9032\u6b65\uff0c\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u4e5f\u6301\u7e8c\u958b\u767c\u65b0\u7684\u8eb2\u907f\u6280\u5de7\u4f86\u56e0\u61c9\uff0c\u6709\u4e9b\u6280\u5de7\u751a\u81f3\u975e\u5e38\u8907\u96dc\uff0c\u4f8b\u5982\uff0c<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/security-technology\/security-101-defending-against-fileless-malware#documentexploits\" target=\"_blank\" rel=\"noreferrer noopener\">\u7121\u6a94\u6848\u5f0f\u5a01\u8105<\/a>\u6703\u5c07\u5de8\u96c6\u7a0b\u5f0f\u78bc\u5167\u5d4c\u5728\u770b\u4f3c\u6b63\u5e38\u7684\u9644\u4ef6\u6a94\u6848\u5167\uff0c\u7136\u5f8c\u900f\u904e\nPowerShell \u4e4b\u985e\u7684\u6b63\u5e38\u7cfb\u7d71\u5de5\u5177\u4f86\u555f\u52d5\u3002\u9084\u6709\u4e9b\u65b9\u6cd5\u5247\u55ae\u7d14\u5229\u7528\u4e00\u4e9b\u7f55\u898b\u7684\u6a94\u6848\u683c\u5f0f\u3002<\/p>\n\n\n\n<p>\u6211\u5011\u7684\u7814\u7a76\u4eba\u54e1\u66fe\u7d93\u770b\u904e\u4e00\u4e9b\u5783\u573e\u90f5\u4ef6\u5c07\u60e1\u610f\u7a0b\u5f0f\u9644\u4ef6\u6a94\u6848\u507d\u88dd\u6210\u8001\u820a\u3001\u7f55\u898b\u7684<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/same-old-yet-brand-new-new-file-types-emerge-in-malware-spam-attachments\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u6a94\u6848\u985e\u578b<\/a>\u3002\u5176\u76ee\u7684\u662f\u70ba\u4e86\u85c9\u7531\u5176\u6a94\u6848\u7d50\u69cb\u4f86\u8eb2\u907f\u67d0\u4e9b\u8cc7\u5b89\u5075\u6e2c\u6280\u5de7\n(\u4f8b\u5982<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/iqy-and-powershell-abused-by-spam-campaign-to-infect-users-in-japan-with-bebloh-and-ursnif\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u75c5\u6bd2\u78bc\u5075\u6e2c<\/a>) \u6216\u662f\u4e00\u4e9b\u904e\u6642\u4e14\u7f3a\u4e4f\u64f4\u5145\u5f48\u6027\u7684\u8cc7\u5b89\u904e\u6ffe\u6280\u8853\u3002<\/p>\n\n\n\n<p>\u4e00\u500b\u4f8b\u5b50\u5c31\u662f .ARJ \u58d3\u7e2e\u6a94\u683c\u5f0f\uff0c\u8da8\u52e2\u79d1\u6280\nSmart Protection Network \u5728\u53bb\u5e74\u5075\u6e2c\u5230\u6578\u5343\u500b\u4f7f\u7528\u6b64\u683c\u5f0f\u7684\u60e1\u610f\u6a94\u6848\u3002\u6211\u5011\u7814\u7a76\u4eba\u54e1\u5728\u6df1\u5165\u8ffd\u67e5\u67d0\u500b\u4f7f\u7528 .ARJ \u58d3\u7e2e\u6a94\u70ba\u9644\u4ef6\u7684\u5783\u573e\u90f5\u4ef6\u6a23\u672c\u6642\u767c\u73fe\u8a72\u6a94\u6848\u4e00\u65e6\u4e0b\u8f09\u5230\u88dd\u7f6e\u4e0a\uff0c\u5c31\u6703\u5728\u7cfb\u7d71\u690d\u5165\u4e26\u57f7\u884c\u67d0\u500b\u57f7\u884c\u6a94\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/screenshot-BEC-suspicious-domain-CAS-1-2018.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>\u4e00\u5c01\u4f7f\u7528 .ARJ \u58d3\u7e2e\u683c\u5f0f\u9644\u4ef6\u4e26\u507d\u88dd\u6210\u8a02\u55ae\u7684\u5783\u573e\u90f5\u4ef6\u3002<\/p>\n\n\n\n<p>\u9664\u6b64\u4e4b\u5916\uff0c\u6211\u5011\u4e5f\u767c\u73fe\u4e00\u6ce2\u4f7f\u7528 .IQY \u683c\u5f0f\u7684\u5783\u573e\u90f5\u4ef6\u653b\u64ca\n(\u6b64\u683c\u5f0f\u70ba Excel \u7684 Web \u67e5\u8a62\u8a2d\u5b9a\u6a94)\u3002\u5728\u9019\u6ce2\u653b\u64ca\u7576\u4e2d\uff0c\u6211\u5011\u5927\u7d04\u5075\u6e2c\u5230 50 \u842c\u5c01\u5783\u573e\u90f5\u4ef6\u3002\u503c\u5f97\u6ce8\u610f\u7684\u662f\uff0c\u9019\u6ce2\u653b\u64ca\u9664\u4e86\u4f7f\u7528 .IQY \u6a94\u6848\u4e4b\u5916\uff0c\u9084\u904b\u7528\u4e86\u4e00\u4e9b\u5176\u4ed6\u6280\u5de7\u3002\u6b64\u5916\uff0c\u9019\u500b\n.IQY \u6a94\u6848\u4e00\u65e6\u88ab\u958b\u555f\uff0c\u5c31\u6703\u900f\u904e\u52d5\u614b\u8cc7\u6599\u4ea4\u63db (DDE) \u6a5f\u5236\u548c PowerShell \u5728\u7cfb\u7d71\u690d\u5165\u5f8c\u9580\u7a0b\u5f0f\u6216\u6728\u99ac\u7a0b\u5f0f\u3002\u7531\u6b64\u53ef\u8b49\u660e\uff0c\u66f4\u63db\u6a94\u6848\u683c\u5f0f\u7684\u4f5c\u6cd5\u6216\u8a31\u770b\u4f3c\u55ae\u7d14\uff0c\u4f46\u82e5\u518d\u642d\u914d\u5176\u4ed6\u6280\u5de7\uff0c\u5c31\u80fd\u884d\u751f\u51fa\u66f4\u8907\u96dc\u7684\u653b\u64ca\uff0c\u8b93\u4f7f\u7528\u8005\u6216\u4f01\u696d\u611f\u67d3\u66f4\u5371\u96aa\u7684\u60e1\u610f\u7a0b\u5f0f\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/screenshot-spam-sample-arj-file-CAS-2018.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<p>\u4e00\u5c01\u4f7f\u7528 .IQY \u6a94\u6848\u70ba\u9644\u4ef6\u7684\u5783\u573e\u90f5\u4ef6\u3002\u5176\u65e5\u6587\u7684\u4e3b\u65e8\u5927\u610f\u662f\u300c\u96a8\u4fe1\u9644\u4e0a\u7167\u7247\u300d\uff0c\u90f5\u4ef6\u5167\u6587\u5247\u662f\u300c\u6c38\u9060\u611f\u8b1d\u60a8\u7684\u5354\u52a9\u3002\u6211\u6703\u4ee5\nXLS \u7248\u672c\u9001\u51fa\u3002\u8acb\u67e5\u770b\u9644\u4ef6\u6a94\u6848\uff0c\u8b1d\u8b1d\u3002\u5728\u6b64\u5148\u8ddf\u60a8\u8aaa\u8072\u8b1d\u8b1d\u3002\u300d<\/p>\n\n\n\n<p>\u9664\u4e86 .ARJ \u548c .IQY \u4e4b\u5916\uff0c\u6211\u5011\u4e5f\u770b\u5230\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u5617\u8a66\u4f7f\u7528\u5176\u4ed6\u6a94\u6848\u985e\u578b\uff0c\u5982\uff1a.Z\u3001.PUB\n\u53ca <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/spam-campaign-abusing-settingcontent-ms-found-dropping-same-flawedammy-rat-distributed-by-necurs\/\" target=\"_blank\" rel=\"noreferrer noopener\">SettingContent-ms<\/a>\u3002<\/p>\n\n\n\n<p><strong>&#8230;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u4f9d\u7136\u504f\u611b\u4f7f\u7528\u96fb\u5b50\u90f5\u4ef6\u4f86\u6563\u5e03\u77e5\u540d\u60e1\u610f\u7a0b\u5f0f\u8b8a\u7a2e<\/h2>\n\n\n\n<p>\u6839\u64da Cloud\nApp Security \u7684\u8cc7\u6599\u986f\u793a\uff0c\u60e1\u610f\u7a0b\u5f0f\u5360 2018 \u5e74\u9ad8\u98a8\u96aa\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105\u7e3d\u6578\u7684 12%\u3002\u5118\u7ba1\u6563\u5e03\u60e1\u610f\u7a0b\u5f0f\u7684\u65b9\u6cd5\u6709\u5f88\u591a\uff1a\u5f9e\u7d93\u7531\u7269\u806f\u7db2 (IoT) \u88dd\u7f6e\u3001\u61c9\u7528\u7a0b\u5f0f\u5e02\u96c6\u3001\u8edf\u9ad4\u6f0f\u6d1e\uff0c\u5230\u4f7f\u7528\u6f0f\u6d1e\u653b\u64ca\u5957\u4ef6\u548c\u60e1\u610f\u7db2\u7ad9\u3002\u7136\u800c\uff0c\u96fb\u5b50\u90f5\u4ef6\u4f9d\u7136\u662f\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u6563\u5e03\u77e5\u540d\u60e1\u610f\u7a0b\u5f0f\u5bb6\u65cf\u6700\u5e38\u4f7f\u7528\u7684\u7ba1\u9053\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/screenshot-spam-sample-IQY-file-CAS-2018.jpg?v1\" alt=\"\"\/><\/figure>\n\n\n\n<p>\u60e1\u610f\u7a0b\u5f0f &#8211;&nbsp;<strong>12% (\u5075\u6e2c\u6578\u91cf\uff1a1,080,022)<\/strong><\/p>\n\n\n\n<p>\u60e1\u610f\u7a0b\u5f0f\u5728 Cloud App Security 2018 \u5e74\u5075\u6e2c\u5230\u7684\u6240\u6709\u9ad8\u98a8\u96aa\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105\u7576\u4e2d\u5360\n12%\u3002<\/p>\n\n\n\n<p>\u4e00\u500b\u6700\u597d\u7684\u4f8b\u5b50\u5c31\u662f\nEmotet\uff0c\u9019\u662f\u4e00\u500b\u81f3\u4eca\u5df2\u6709 5 \u5e74\u6b77\u53f2\u7684\u60e1\u610f\u7a0b\u5f0f\uff0c\u6839\u64da\u7f8e\u570b\u96fb\u8166\u7dca\u6025\u61c9\u8b8a\u5c0f\u7d44 (United States Computer Emergency\nReadiness Team\uff0c\u7c21\u7a31 US-CERT) \u7684<a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA18-201A\" target=\"_blank\" rel=\"noreferrer noopener\">\u63cf\u8ff0<\/a>\uff0c\u53ef\u8aaa\u662f\u7576\u4eca\u7834\u58de\u529b\u6700\u5f37\u3001\u9020\u6210\u6700\u591a\u640d\u5931\u7684\u60e1\u610f\u7a0b\u5f0f\uff0c\u53d7\u5bb3\u8005\u904d\u53ca\u516c\u5bb6\u6a5f\u95dc\u548c\u79c1\u4eba\u6a5f\u69cb\u3002Emotet\n\u6700\u91cd\u8981\u7684\u7279\u9ede\u5c31\u662f\u63a1\u7528<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/going-in-depth-with-emotet-multilayer-operating-mechanisms\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u591a\u91cd\u71df\u904b\u6a5f\u5236<\/a>\uff0c\u4e3b\u8981\u7d93\u7531\u96fb\u5b50\u90f5\u4ef6\u6563\u5e03\uff0c\u4e26\u4f7f\u7528\u8ca1\u7d93\u76f8\u95dc\u7684\u6a19\u984c\u4f86\u8a98\u9a19\u6536\u4ef6\u4eba\u4e0a\u7576\u3002\u6839\u64da\u8da8\u52e2\u79d1\u6280\nSmart Protection Network \u7684\u8cc7\u6599\uff0cEmotet \u662f 2018 \u5e74\u5168\u7403\u5075\u6e2c\u6578\u91cf\u6392\u884c\u7b2c\u4e03\u7684\u60e1\u610f\u7a0b\u5f0f\u3002<\/p>\n\n\n\n<p>\u9664\u6b64\u4e4b\u5916\uff0c\u9084\u6709\nGandCrab \u52d2\u7d22\u75c5\u6bd2\u5728\u53bb\u5e74 4 \u6708\u63a8\u51fa 2.1 \u7248\u8b8a\u7a2e\u4e26<a href=\"https:\/\/www.zdnet.com\/article\/ransomware-warning-this-phishing-campaign-delivers-new-malware-variants\/#ftag=RSSbaffb68\" target=\"_blank\" rel=\"noreferrer noopener\">\u767b\u4e0a\u65b0\u805e\u5a92\u9ad4<\/a>\u3002\u96a8\u5f8c\u53c8\u5728 8 \u6708\u4efd<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/-egg-files-in-spam-delivers-gandcrab-v4-3-ransomware-to-south-korean-users\" target=\"_blank\" rel=\"noreferrer noopener\">\u91cd\u65b0\u5fa9\u51fa<\/a>\uff0c\u63a8\u51fa 4.3 \u7248\u8b8a\u7a2e\uff0c\u4e26\u4ee5\u97d3\u6587\u64b0\u5beb\u7684\u7db2\u8def\u91e3\u9b5a\u96fb\u5b50\u90f5\u4ef6\u653b\u64ca\u5357\u97d3\u4f7f\u7528\u8005\u3002\u6839\u64da\u8da8\u52e2\u79d1\u6280\nSmart Protection Network \u7684\u8cc7\u6599\uff0cGrandCrab \u662f 2018 \u5e74\u9ad8\u5c45\u5168\u7403\u5075\u6e2c\u6578\u91cf\u6392\u884c\u699c\u7b2c\u4e8c\u7684\u60e1\u610f\u7a0b\u5f0f\u3002<\/p>\n\n\n\n<p>\u9664\u4e86\u4e0a\u8ff0\u60e1\u610f\u7a0b\u5f0f\u4e4b\u5916\uff0c\u9084\u6709\u5176\u4ed6\u4ee5\u96fb\u5b50\u90f5\u4ef6\u70ba\u4e3b\u8981\u611f\u67d3\u9014\u5f91\u7684\u77e5\u540d\u60e1\u610f\u7a0b\u5f0f\u5bb6\u65cf\u5728\u53bb\u5e74\u4e5f\u63a8\u51fa\u65b0\u7684\u7248\u672c\u3002Trickbot\n\u589e\u52a0\u4e86\u4e00\u9805\u65b0\u7684 <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/trickbots-bigger-bag-of-tricks\/\" target=\"_blank\" rel=\"noreferrer noopener\">PoS \u60e1\u610f\u7a0b\u5f0f\u529f\u80fd<\/a>\u4ee5\u53ca<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/trickbot-shows-off-new-trick-password-grabber-module\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u4e00\u500b\u5bc6\u78bc\u64f7\u53d6\u6a21\u7d44<\/a> (pwgrab32) \u53ef\u5f9e\u591a\u7a2e\u61c9\u7528\u7a0b\u5f0f\u548c\u700f\u89bd\u5668\u7aca\u53d6\u5e33\u865f\u5bc6\u78bc\uff0c\u5305\u62ec\uff1aMicrosoft\nOutlook\u3001Filezilla\u3001WinSCP\u3001Mozilla Firefox\u3001Microsoft Edge \u548c Google Chrome\u3002URSNIF \u5247\u662f\u51fa\u73fe\u5728\u4e00\u9805\u7cbe\u5fc3\u7b56\u756b\u7684\u653b\u64ca\u7576\u4e2d\uff0c\u6b79\u5f92\u99ed\u5165\u53d7\u5bb3\u8005\u7684\u96fb\u5b50\u90f5\u4ef6\u5e33\u865f\u4e26<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/phishing-campaign-uses-hijacked-emails-to-deliver-ursnif-by-replying-to-ongoing-threads\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u5229\u7528\u56de\u8986\u96fb\u5b50\u90f5\u4ef6\u8a0e\u8ad6\u4e32\u7684\u65b9\u5f0f<\/a>\u6563\u5e03\u6728\u99ac\u7a0b\u5f0f\u3002\u7531\u65bc\u99ed\u5ba2\u662f\u6697\u4e2d\u6f5b\u5165\u96fb\u5b50\u90f5\u4ef6\u8a0e\u8ad6\u4e32\u7576\u4e2d\uff0c\u8b93\u4f7f\u7528\u8005\u5f88\u96e3\u5bdf\u89ba\u6b79\u5f92\u7684\u8a6d\u8a08\u3002<\/p>\n\n\n\n<p><strong>&#8230;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u63a1\u7528\u96fb\u8166\u8996\u89ba\u3001\u5beb\u4f5c\u98a8\u683c\nDNA \u8207\u6a5f\u5668\u5b78\u7fd2\u4f86\u61c9\u4ed8\u9032\u968e\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105<\/h2>\n\n\n\n<p>\u96a8\u8457\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105\u4e0d\u65b7\u6210\u9577\u4e26\u65e5\u76ca\u8907\u96dc\uff0c\u4f01\u696d\u61c9\u5efa\u7f6e\u591a\u5c64\u5f0f\u7684\u8cc7\u5b89\u9632\u8b77\u4f86\u9632\u7bc4\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105\u6240\u5e36\u4f86\u7684\u98a8\u96aa\u3002<\/p>\n\n\n\n<p>Cloud App Security \u80fd\u88dc\u5f37\u96fb\u5b50\u90f5\u4ef6\u670d\u52d9\n(\u5982 Office 365) \u7684\u5167\u5efa\u5b89\u5168\u6a5f\u5236\uff0c\u904b\u7528\u6a5f\u5668\u5b78\u7fd2\u4f86\u5075\u6e2c\u53ef\u7591\u7684\u90f5\u4ef6\u5167\u6587\u8207\u9644\u4ef6\u6a94\u6848\uff0c\u6b64\u5916\uff0c\u9084\u6709\u6c99\u76d2\u6a21\u64ec\u60e1\u610f\u7a0b\u5f0f\u5206\u6790\u3001\u6587\u4ef6\u6f0f\u6d1e\u653b\u64ca\u5075\u6e2c\u3001\u4ee5\u53ca\u6a94\u6848\u3001\u96fb\u5b50\u90f5\u4ef6\u8207\u7db2\u7ad9\u4fe1\u8b7d\u8a55\u7b49\u6280\u8853\u3002\u9019\u5957\u89e3\u6c7a\u65b9\u6848\u53ef\u5075\u6e2c\nOffice 365 \u6216 PDF \u6587\u4ef6\u6697\u85cf\u7684\u9032\u968e\u60e1\u610f\u7a0b\u5f0f\uff0c\u85c9\u7531\u4fdd\u8b77 Microsoft Exchange \u548c SharePoint \u74b0\u5883\u591a\u5e74\u7684\u7d93\u9a57\u5927\u5e45\u63d0\u5347\u96f2\u7aef\u6548\u7387\uff0c\u4e26\u4e14\u6383\u7784\u9060\u7aef\u540c\u4e8b\u3001\u7528\u6236\u7aef\u53ca\u884c\u52d5\u88dd\u7f6e\u6240\u5206\u4eab\u7684\u6a94\u6848\uff0c\u78ba\u4fdd\u5a01\u8105\u4e0d\u6703\u7d93\u7531\nOneDrive \u6216 SharePoint \u64f4\u6563\u3002<\/p>\n\n\n\n<p>2018 \u5e74\uff0cCloud App Security \u53c8\u5c0e\u5165\u4e86\u5169\u9805\u65b0\u7684\u529f\u80fd\u4f86\u5354\u52a9\u4f01\u696d\u9632\u7bc4\u66f4\u591a\u9ad8\u98a8\u96aa\u7684\u96fb\u5b50\u90f5\u4ef6\u9032\u968e\u5a01\u8105\u3002<\/p>\n\n\n\n<p>\u9996\u5148\u662f <a href=\"https:\/\/www.trendmicro.com\/vinfo\/ph\/security\/news\/cybercrime-and-digital-threats\/curbing-the-bec-problem-using-ai-and-machine-learning\" target=\"_blank\" rel=\"noreferrer noopener\">Writing Style DNA<\/a> (\u5beb\u4f5c\u98a8\u683c\nDNA)\uff0c\u9019\u662f\u4e00\u9805\u4ee5\u6a5f\u5668\u5b78\u7fd2 (ML) \u70ba\u57fa\u790e\u6240\u767c\u5c55\u51fa\u4f86\u7684\u6280\u8853\uff0c\u80fd\u5075\u6e2c\u8b8a\u81c9\u8a50\u9a19\u7576\u4e2d\u7684\u5047\u5192\u96fb\u5b50\u90f5\u4ef6\u3002\u5b83\u63a1\u7528\u6a5f\u5668\u5b78\u7fd2\u4f86\u6bd4\u8f03\u6536\u5230\u7684\u96fb\u5b50\u90f5\u4ef6\u8207\u540c\u4e00\u5bc4\u4ef6\u4eba\u904e\u53bb\u64b0\u5beb\u7684\u96fb\u5b50\u90f5\u4ef6\u662f\u5426\u98a8\u683c\u76f8\u540c\u3002\u8a72\u6280\u8853\u900f\u904e<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/security-technology\/rising-above-spam-and-other-threats-via-machine-learning\" target=\"_blank\" rel=\"noreferrer noopener\">\u6a5f\u5668\u5b78\u7fd2\u6a21\u578b<\/a>\u4f86\u5b78\u7fd2\u539f\u5bc4\u4ef6\u4eba\u904e\u53bb\u7684\u5beb\u4f5c\u98a8\u683c\u7279\u5fb5\uff0c\u9032\u800c\u6839\u64da\u9019\u4e9b\u7279\u5fb5\u4f86\u5224\u65b7\u65b0\u90f5\u4ef6\u7684\u771f\u507d\u3002<\/p>\n\n\n\n<p>\u5176\u6b21\u662f\u4e00\u9805\u7d50\u5408\u4e86\u4eba\u5de5\u667a\u6167 (AI) \u8207<a href=\"https:\/\/blog.trendmicro.com\/stop-office-365-credential-theft-with-an-artificial-eye\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u96fb\u8166\u8996\u89ba<\/a>\u6280\u8853\u7684\u529f\u80fd\uff0c\u53ef\u5373\u6642\u5075\u6e2c\u4e26\u6514\u622a\u767b\u5165\u6191\u8b49\u7db2\u8def\u91e3\u9b5a\u653b\u64ca\uff0c\u5c24\u5176\u4eca\u65e5\u6709\u8d8a\u4f86\u8d8a\u591a\u653b\u64ca\u90fd\u662f\u5229\u7528\u5e7e\u53ef\u4e82\u771f\u7684\u7db2\u7ad9\u767b\u5165\u9801\u9762\u4f86\u9a19\u53d6\u96fb\u5b50\u90f5\u4ef6\u4f7f\u7528\u8005\u7684\u767b\u5165\u8cc7\u8a0a\u3002\u5728\u7591\u4f3c\u7db2\u8def\u91e3\u9b5a\u7684\u90f5\u4ef6\u7d93\u904e\u5bc4\u4ef6\u4eba\u3001\u5167\u5bb9\u8207\u7db2\u5740\u4fe1\u8b7d\u8a55\u7b49\u5206\u6790\u4e4b\u5f8c\uff0c\u518d\u5229\u7528\u96fb\u8166\u8996\u89ba\u8207\nAI \u4f86\u5feb\u901f\u6aa2\u67e5\u5269\u9918\u7684\u7db2\u5740\uff0c\u770b\u770b\u767b\u5165\u9801\u9762\u7684\u54c1\u724c\u5143\u7d20\u3001\u8868\u55ae\u4ee5\u53ca\u5176\u4ed6\u7db2\u7ad9\u5143\u4ef6\u662f\u5426\u6709\u5047\u5192\u7684\u5acc\u7591\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/Cloud-App-Security-Solution-01.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<p><a href=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/Cloud-App-Security-Solution-01.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<p>\u9019\u4e9b\u6280\u8853\uff0c\u518d\u52a0\u4e0a\u5176\u4ed6\u529f\u80fd\uff0c\u4e0d\u50c5\u8c61\u5fb5\u8457 Cloud\nApp Security \u7684\u5148\u9032\uff0c\u66f4\u4ee3\u8868\u5b83\u5728\u9632\u7bc4\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105\u65b9\u9762\u7684\u9748\u6d3b\u8207\u5f48\u6027\uff0c\u4e0d\u8ad6\u5a01\u8105\u7684\u6578\u91cf\u8207\u7cbe\u5bc6\u5ea6\u5982\u4f55\uff0cCloud App Security \u90fd\u662f\u4e00\u5957\u80fd\u5920\u8207\u591a\u5c64\u5f0f\u7db2\u8def\u8cc7\u5b89\u9632\u79a6\u5bc6\u5207\u6574\u5408\u7684\u8070\u660e\u9078\u64c7\u3002<\/p>\n\n\n\n<p>\u7136\u800c\uff0c\u4e00\u5957\u6709\u6548\u7684\u7db2\u8def\u8cc7\u5b89\u7b56\u7565\u4e0d\u50c5\u9700\u8981\u591a\u5c64\u5f0f\u7684\u8cc7\u5b89\u9632\u8b77\u3002\u66f4\u9700\u8981\u4eba\u54e1\u7684\u8cc7\u5b89\u610f\u8b58\u914d\u5408\uff0c\u624d\u80fd\u907f\u514d\u610f\u5916\u51fa\u73fe\u8cc7\u5b89\u7f3a\u53e3\uff0c\u8b93\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u6709\u6a5f\u53ef\u4e58\u3002\u56e0\u6b64\uff0c\u9664\u4e86\u90e8\u7f72\u8cc7\u5b89\u89e3\u6c7a\u65b9\u6848\u4e4b\u5916\uff0c\u4f01\u696d\u66f4\u61c9\u6559\u5c0e\u54e1\u5de5\u9075\u5b88<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/infosec-guide-email-threats\" target=\"_blank\" rel=\"noreferrer noopener\">\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105\u9632\u7bc4\u6700\u4f73\u5be6\u52d9\u539f\u5247<\/a>\uff0c\u4e26\u5229\u7528\u6211\u5011<a href=\"https:\/\/phishinsight.trendmicro.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u514d\u8cbb\u7684\u7db2\u8def\u91e3\u9b5a\u6a21\u64ec\u8207\u4f7f\u7528\u8005\u8a13\u7df4<\/a>\u670d\u52d9\uff0c\u5354\u52a9\u54e1\u5de5\u63d0\u9ad8\u8b66\u6212\u3002<\/p>\n\n\n\n<p><strong>&#8230;<\/strong><\/p>\n\n\n\n<p>\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/advanced-defenses-for-advanced-email-threats\">Trend Micro Cloud\nApp Security Report 2018: Advanced Defenses for Advanced Email Threats<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u70ba\u4e86\u8b93\u4f01\u696d\u5b8c\u6574\u638c\u63e1\u4eca\u65e5\u7684\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105\u60c5\u52e2\uff0c\u6211\u5011\u8a73\u7d30\u7814\u7a76\u4e86\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u6240\u4f7f\u7528\u7684\u4e3b\u8981\u9032\u968e\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105\uff0c\u4e26\u4e14\u91dd\u5c0d\u9019\u4e9b [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[1268,2632],"tags":[2547],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/59925"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=59925"}],"version-history":[{"count":0,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/59925\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=59925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=59925"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=59925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}