{"id":68032,"date":"2021-05-13T09:00:00","date_gmt":"2021-05-13T01:00:00","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=68032"},"modified":"2021-05-14T18:48:31","modified_gmt":"2021-05-14T10:48:31","slug":"%e4%bf%ae%e8%a3%9c%e6%9b%b4%e6%96%b0%e7%ae%a1%e7%90%86%e7%9a%84%e6%83%a1%e5%a4%a2%ef%bc%9a%e7%8f%be%e6%b3%81%e5%8f%8a%e6%9c%aa%e4%be%86","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=68032","title":{"rendered":"\u4fee\u88dc\u66f4\u65b0\u7ba1\u7406\u7684\u60e1\u5922\uff1a\u73fe\u6cc1\u53ca\u672a\u4f86"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\"><\/h1>\n\n\n\n<p>\u96a8\u8457\u8cc7\u6599\u7684\u50f9\u503c\u53ca\u7528\u9014\u4e0d\u65b7\u88ab\u4eba\u5011&nbsp;<a href=\"https:\/\/www.cutimes.com\/2020\/07\/17\/big-data-the-new-oil-fields\/?slreturn=20210020003351\">\u767c\u73fe<\/a>\uff0c\u4e00\u4e9b\u5c08\u9580\u5229\u7528\u7cfb\u7d71\u6f0f\u6d1e\u7684<a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/20\/i\/boosting-impact-for-profit-evolving-ransomware-techniques-for-targeted-attacks.html\">\u76ee\u6a19\u5f0f\u653b\u64ca<\/a>&nbsp;&nbsp;\u548c<a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/20\/l\/overview-of-recent-sunburst-targeted-attacks.html\">\u5a01\u8105<\/a>\u4e5f\u8d8a\u4f86\u8d8a\u591a\u3002\u5ee0\u5546\u8207\u4f01\u696d\u90fd\u5df2\u6ce8\u610f\u5230\u9019\u9805\u8da8\u52e2\uff0c\u4e5f\u4e00\u76f4\u8a66\u5716\u52aa\u529b\u8ddf\u4e0a\u8da8\u52e2\u7684\u8b8a\u5316\uff0c\u4f46\u76ee\u524d\u60c5\u6cc1\u5c0d IT \u5718\u968a\u4f86\u8aaa\u537b\u4ecd\u662f\u6182\u559c\u53c3\u534a\u3002<br><br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/figure%201_patch%20mgt%20CVEs%202001-2020.png\" alt=\"fig1-CVEs-2001-2020-the-nightmares-of-patch-management\"\/><figcaption>\u5716 1\uff1a\u6bcf\u5e74\u6709 &nbsp;CVE \u7de8\u865f\u7684\u8edf\u9ad4\u6f0f\u6d1e\u6578\u91cf\u3002<\/figcaption><\/figure>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>\u70ba\u4e86\u964d\u4f4e\u8cc7\u5b89\u98a8\u96aa\uff0c\u4fee\u88dc\u66f4\u65b0\u7684\u8ffd\u8e64\u53ca\u7ba1\u7406\u5df2\u7d93\u6210\u70ba\u7cfb\u7d71\u7ba1\u7406\u54e1\u548c IT \u5718\u968a\u7684\u60e1\u5922\uff0c\u66f4\u4f55\u6cc1\u9019\u9084\u53ea\u662f\u4ed6\u5011\u6bcf\u5929\u65e5\u5e38\u5de5\u4f5c\u7684<a href=\"https:\/\/www.ivanti.com\/blog\/survey-it-professionals-data-sources\">\u4e00\u5c0f\u90e8\u5206<\/a>\uff0c\u800c\u4e14\u4ed6\u5011\u7684\u4eba\u529b\u8d8a\u4f86\u8d8a\u96f6\u6563\u3002\u5728\u7406\u60f3\u7684\u72c0\u6cc1\u4e0b\uff0c\u4f01\u696d\u6bcf\u5e7e\u5e74\u5c31\u6703\u91cd\u65b0\u6aa2\u8a0e\u4e00\u6b21\u4f01\u696d\u7684\u5404\u9805\u653f\u7b56\uff0c\u5305\u62ec\u8cc7\u5b89\u653f\u7b56\u548c\u76ee\u6a19\uff0c\u4e26\u900f\u904e\u4e00\u4e9b\u53ef\u6301\u7e8c\u9054\u6210\u7684\u76ee\u6a19\u4f86\u78ba\u4fdd\u6c38\u7e8c\u6027\u3001\u6548\u7387\u53ca\u884c\u52d5\u6027\u3002\u503c\u5f97\u6ce8\u610f\u7684\u4e00\u9ede\u662f\uff0c\u4e2d\u5c0f\u4f01\u696d (SMB) \u4e00\u76f4\u5728\u52aa\u529b&nbsp;<a href=\"https:\/\/www.darkreading.com\/perimeter\/smb-security-catches-up-to-large-companies-data-shows\/d\/d-id\/1337725\">\u8fce\u982d\u8d95\u4e0a<\/a>\u5927\u578b\u4f01\u696d\uff0c\u800c\u4e14\u5728\u7cfb\u7d71\u7684\u5b9a\u671f\u4fee\u88dc\u8207\u7ba1\u7406\u65b9\u9762\u6709\u4e9b\u6642\u5019\u751a\u81f3\u6bd4\u5927\u578b\u4f01\u696d\u505a\u5f97\u66f4\u597d\uff0c\u4f46\u6574\u9ad4\u800c\u8a00\uff0c\u96a8\u8457\u6280\u8853\u8207\u7db2\u8def\u8cc7\u5b89\u9818\u57df\u7684\u4e0d\u65b7\u767c\u5c55\uff0c\u4f01\u696d\u7684\u4fee\u88dc\u66f4\u65b0\u7ba1\u7406\u653f\u7b56\u4ecd\u6709\u8a31\u591a\u6539\u9032\u7a7a\u9593\u3002<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>[\u5ef6\u4f38\u95b1\u8b80\uff1a<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/cybercrime-and-exploits-attacks-on-unpatched-systems\">Cybercrime and exploits:Attacks on unpatched systems<\/a>]<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">\u4fee\u88dc\u66f4\u65b0\u7ba1\u7406\u8fd1\u5e74\u4f86\u7684\u767c\u5c55<\/h2>\n\n\n\n<p><br>\u5728\u75ab\u60c5\u7206\u767c\u4e4b\u524d\uff0c<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/iot-devices-in-the-workplace-security-risks-and-threats-to-byod-environments\">\u8490\u96c6<\/a>\u548c\u8ffd\u8e64\u6240\u6709\u54e1\u5de5\u7684\u500b\u4eba\u53ca\u4f01\u696d\u914d\u767c<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/iot-devices-in-the-workplace-security-risks-and-threats-to-byod-environments\">\u88dd\u7f6e<\/a> (\u5305\u62ec\u6bcf\u5929\u5de5\u4f5c\u73fe\u5834\u4f7f\u7528\u7684\u7cfb\u7d71)\uff0c\u662f\u4e00\u4ef6\u8b93\u7cfb\u7d71\u7ba1\u7406\u54e1\u4e0d\u6562\u60f3\u50cf\u7684\u4e8b\u3002\u4f46\u96a8\u8457\u99ed\u5ba2\u653b\u64ca\u8207\u5165\u4fb5\u4e8b\u4ef6\u983b\u50b3\uff0c\u518d\u52a0\u4e0a\u4f01\u696d\u6c7a\u7b56\u8005\u958b\u59cb\u611f\u53d7\u5230\u8cc7\u5b89\u4e8b\u4ef6\u7684\u9023\u5e36<a href=\"https:\/\/www.techrepublic.com\/article\/research-finds-2019-increase-in-breaches-and-cybersecurity-spending\/\">\u640d\u5931<\/a>\uff0c\u800c\u4e14\u6700\u8fd1\u5e7e\u500b\u6708\u4f01\u696d\u66f4<a href=\"https:\/\/community.spiceworks.com\/topic\/2263827-poll-how-will-coronavirus-affect-it-spending-at-your-company-in-2020\">\u88ab\u8feb<\/a>\u5fc5\u9808\u63d0\u51fa\u4e00\u4e9b\u89e3\u6c7a\u65b9\u6848\u4f86\u81e8\u6642\u61c9\u4ed8\u7a81\u7136\u5176\u4f86\u7684\u9060\u8ddd\u4e0a\u73ed\u9700\u6c42\uff0c\u4e0d\u53ef\u5426\u8a8d\u5730\uff0c\u8981\u5b9a\u671f\u8ffd\u8e64\u4e26\u66f4\u65b0\u9019\u4e9b\u7cfb\u7d71\uff0c\u771f\u662f<a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/vulnerability-management\/patching-poses-security-problems-with-move-to-more-remote-work\/d\/d-id\/1337451\">\u96e3\u4e0a\u52a0\u96e3<\/a>\u4e14<a href=\"https:\/\/www.syxsense.com\/wp-content\/uploads\/2019\/05\/Patching_Fatigue___Whitepaper___Cloud_Management_Suite.pdf\">\u52a0\u500d\u8017\u8cbb\u5fc3\u529b<\/a>\u3002<\/p>\n\n\n\n<p>\u6574\u9ad4\u800c\u8a00\uff0c\u73fe\u5728\u7684\u7aef\u9ede\u88dd\u7f6e\u4fee\u88dc\u66f4\u65b0\u65b9\u5f0f\u5df2\u6bd4\u904e\u53bb\u66f4\u52a0\u7c21\u55ae\u3001\u81ea\u52d5\u5316\uff0c\u4e5f\u66f4\u6d41\u66a2\u3002\u4f46\u4f3a\u670d\u5668\u7684\u4fee\u88dc\u66f4\u65b0\u537b\u53c8\u662f\u53e6\u4e00\u56de\u4e8b\uff0c\u5176\u6311\u6230\u622a\u7136\u4e0d\u540c\u3002\u7576\u4f3a\u670d\u5668\u5fc5\u9808\u7acb\u5373\u4fee\u88dc\u66f4\u65b0\u6642\uff0c\u4f01\u696d\u7e3d\u662f\u8e8a\u8e87\u4e0d\u524d\u7684\u4e3b\u8981\u539f\u56e0\u5728\u65bc&nbsp;<a href=\"https:\/\/www.makeuseof.com\/windows-10-slow-after-update-fix\/\">\u505c\u6a5f<\/a>\u6210\u672c\uff1a\u56e0\u70ba\u5957\u7528\u4fee\u88dc\u66f4\u65b0\u6709\u53ef\u80fd\u9020\u6210&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/skype-blames-patch-tuesday-pc-reboots-for-outage\/\">\u73fe\u6709\u529f\u80fd<\/a>\u505c\u64fa\u3002\u4ee4\u4f01\u64d4\u5fc3\u7684\u554f\u984c\u62ec\uff1a&nbsp;<a href=\"https:\/\/github.com\/dotnet\/announcements\/issues\/74\">\u4fee\u88dc\u66f4\u65b0\u672c\u8eab\u6709\u554f\u984c<\/a>&nbsp;\u3001&nbsp;<a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/20\/l\/overview-of-recent-sunburst-targeted-attacks.html\">\u66f4\u65b0\u90e8\u7f72\u4e4b\u5f8c\u53cd\u800c\u9020\u6210\u65b0\u7684\u6f0f\u6d1e<\/a>&nbsp;\uff0c\u6216\u662f<a href=\"https:\/\/www.computerworld.com\/article\/3133845\/bugs-in-latest-windowsoffice-patch-bundles-create-confusion.html\">\u66f4\u65b0\u5f8c\u4e26\u6c92\u6709\u6539\u5584\u539f\u672c\u7684\u554f\u984c<\/a>\u3002\u9664\u6b64\u4e4b\u5916\uff0c\u5ee0\u5546\u9084\u53ef\u80fd\u5728\u4fee\u88dc\u66f4\u65b0\u7576\u4e2d\u52a0\u5165<a href=\"https:\/\/www.computerworld.com\/article\/3216425\/microsoft-patch-alert-october-2020.html\">\u984d\u5916<\/a>\u7684\u5167\u5bb9\uff0c\u7d50\u679c\u9019\u4e9b\u5167\u5bb9\u537b\u4e0d\u5b89\u5168\uff0c\u6216\u8005\u4fee\u88dc\u5f8c\u7cfb\u7d71\u5fc5\u9808\u91cd\u65b0\u958b\u6a5f\u3002\u4fee\u88dc\u4e4b\u5f8c\u7684\u91cd\u65b0\u958b\u6a5f\uff0c\u5c0d<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=67721\">\u5de5\u696d\u63a7\u5236\u7cfb\u7d71<\/a> (ICS) \u4f86\u8aaa\u5c24\u5176\u4e0d\u53ef\u884c\uff0c\u56e0\u70ba\u6703&nbsp;<a href=\"https:\/\/www.tripwire.com\/state-of-security\/ics-security\/to-patch-or-not-to-patch-in-ot-that-is-the-real-challenge\/\">\u5f71\u97ff<\/a>\u6240\u6709\u5f7c\u6b64\u6574\u5408\u7684\u7cfb\u7d71\u3002<\/p>\n\n\n\n<p>\u6709\u8da3\u7684\u662f\uff0c\u96a8\u8457\u66f4\u591a\u4f7f\u7528\u8005\u9023\u4e0a\u7db2\u8def\u4e26\u4ea4\u66ff\u4f7f\u7528\u4e0d\u540c\u88dd\u7f6e\u4f86\u4e0a\u7db2\uff0c\u4ed6\u5011\u5c0d\u9019\u4e9b\u88dd\u7f6e\u7684\u8cc7\u5b89\u610f\u8b58\u4e5f\u8d8a\u4f86\u8d8a\u9ad8\uff0c\u518d\u52a0\u4e0a&nbsp;<a href=\"https:\/\/unctad.org\/page\/cybercrime-legislation-worldwide\">\u5168\u7403<\/a>\u5c0d\u7db2\u8def\u8cc7\u5b89\u7684\u7acb\u6cd5\u8207\u5be6\u52d9\u8981\u6c42\u66f4\u9ad8\uff0c\u9019\u4e9b\u56e0\u7d20\u52a0\u8d77\u4f86\uff0c\u4f7f\u5f97\u5ee0\u5546\u5fc5\u9808\u66f4\u983b\u7e41\u91cb\u51fa\u66f4\u65b0\u3002\u70ba\u4e86\u7c21\u5316\u4fee\u88dc\u66f4\u65b0\uff0cMicrosoft \u6c7a\u5b9a\u4e0d\u518d\u8b93\u7cfb\u7d71\u7ba1\u7406\u54e1\u6216\u4f7f\u7528\u8005\u6c7a\u5b9a\u54ea\u4e9b\u66f4\u65b0\u53ef\u4ee5\u5206\u958b\u5957\u7528\u3002\u6bcf\u4e00\u53f0\u96fb\u8166\uff0c\u4e0d\u8ad6\u4f3a\u670d\u5668\u6216\u7aef\u9ede\u88dd\u7f6e\uff0c\u90fd\u8981\u5957\u7528\u7d2f\u7a4d\u66f4\u65b0\u3002\u4f46\u9019\u6a23\u7684\u8abf\u6574\u537b\u4e5f\u9020\u6210\u4e86 IT \u5718\u968a\u7684\u5176\u4ed6\u64d4\u6182\u3002<\/p>\n\n\n\n<p>\u5982\u540c\u524d\u5e7e\u5e74\u6240\u898b\uff0c\u5404\u5bb6\u8edf\u9ad4\u5ee0\u5546\u90fd\u76e1\u91cf\u5c07\u5176\u4fee\u88dc\u66f4\u65b0\u7684\u9031\u671f\u8207 Microsoft \u6bcf\u500b\u6708\u7684 Patch Tuesday\u5b9a\u671f\u66f4\u65b0<a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/vulnerability-management\/patch-a-palooza-more-than-560-flaws-fixed-in-a-single-day\/d\/d-id\/1337564\">\u540c\u6b65<\/a>&nbsp;\u3002\u96d6\u7136\u6709\u6642\u5ee0\u5546\u6703<a href=\"https:\/\/techcrunch.com\/2020\/03\/17\/android-app-reviews-may-slow-to-over-a-week-due-to-covid-19-impacts-google-warns-developers\/amp\/?guccounter=1\">\u5ef6\u5f8c<\/a>\u5176\u767c\u5e03\u6642\u9593\uff0c\u4f46\u9019\u7d42\u7a76\u6703\u96a8\u8457\u6642\u9593\u7d2f\u7a4d\uff0c\u800c\u4e14\u53ef\u80fd\u9084\u6703\u9020\u6210&nbsp;<a href=\"https:\/\/www.riskbasedsecurity.com\/2020\/04\/08\/a-familiar-storm-approaches-april-14ths-vulnerability-fujiwhara-event\/\">\u66f4\u591a\u554f\u984c<\/a>\u3002\u4e0d\u50c5\u5982\u6b64\uff0cIT \u5718\u968a\u9084\u6709\u5bb6\u7528\u7db2\u8def\u53ca\u5404\u5f0f\u5404\u6a23\u500b\u4eba\u7269\u806f\u7db2 (IoT) \u88dd\u7f6e\u5fc5\u9808\u61c9\u4ed8\uff0c\u9019\u4e9b\u7cfb\u7d71\u8207\u7db2\u8def\u7684\u5b89\u5168\u6027\u4ee4\u4eba\u8cea\u7591\u3002\u96a8\u8457\u8fd1\u5e74\u4f86\u60e1\u610f\u7a0b\u5f0f\u5a01\u8105\u53ca\u653b\u64ca\u7684\u6578\u91cf\u5c62\u5275\u65b0\u9ad8\uff0c\u518d\u52a0\u4e0a\u75ab\u60c5\u671f\u9593\uff0c\u99ed\u5ba2\u7684\u793e\u4ea4\u5de5\u7a0b\u6280\u5de7\u7279\u5225\u5bb9\u6613\u594f\u6548\uff0c\u56e0\u6b64\u5ef6\u5f8c\u5957\u7528\u4fee\u88dc\u66f4\u65b0\u5c0d\u8a31\u591a\u4f01\u696d\u6a5f\u69cb\u4f86\u8aaa\uff0c\u5176\u5be6\u53ea\u6703\u62db\u81f4\u66f4\u591a<a href=\"https:\/\/www.reuters.com\/article\/us-usa-crime-internet-idUSTRE52T6ET20090330\">\u9ebb\u7169<\/a>\u3002<\/p>\n\n\n\n<p>\u59d1\u4e14\u4e0d\u8ad6\u512a\u7f3a\u9ede\u5982\u4f55\uff0c\u96f2\u7aef\u986f\u7136\u5df2\u7d93\u8d8a\u4f86\u8d8a\u666e\u53ca\uff0c\u800c\u4e5f\u56e0\u70ba\u96f2\u7aef\u670d\u52d9\u4f9b\u61c9\u5546 (CSP) \u7684\u670d\u52d9\u505a\u5f97\u975e\u5e38&nbsp;<a href=\"..\/..\/..\/..\/..\/Temp\/temp\/cameron\/work\/Link%20to%20AWS%20systems%20manager:%20https:\/docs.aws.amazon.com\/systems-manager\/latest\/userguide\/systems-manager-patch.html\">\u4fbf\u5229<\/a>\uff0c\u6240\u4ee5\u4fee\u88dc\u66f4\u65b0\u4e5f\u958b\u59cb\u6f38\u6f38\u4e0d\u662f\u554f\u984c\u3002\u4f46\u53e6\u4e00\u65b9\u9762\uff0c\u96f2\u7aef\u7684\u84ec\u52c3\u767c\u5c55\u537b\u8b93\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u958b\u59cb\u89ac\u89a6\u96f2\u7aef\u7684\u300c\u7372\u5229\u300d\u6f5b\u529b\u3002\u7576\u4f01\u696d\u5c07\u4e00\u4e9b\u539f\u672c\u5728\u4f01\u696d\u5167\u90e8\u7684\u61c9\u7528\u7a0b\u5f0f\u548c\u4f3a\u670d\u5668\u79fb\u8f49\u5230\u96f2\u7aef\u5bb9\u5668\u548c\u5e73\u53f0\uff0c\u4f01\u696d\u5f88\u53ef\u80fd\u6703\u5ffd\u7565\u4e86\u4ed6\u5011\u9700\u8981\u5c0d\u61c9\u7684\u8cc7\u5b89\u9632\u8b77\u4f86\u61c9\u4ed8\u67b6\u69cb\u4e0a\u7684\u5dee\u7570\u3002\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u5df2\u7d93\u8ddf\u4e0a\u9019\u6ce2\u8da8\u52e2\u4e26\u4e14\u627e\u5230\u4e86\u6700<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/virtualization-and-cloud\/supply-chain-attacks-cloud-computing\">\u8cfa\u9322\u7684\u65b9\u6cd5<\/a>\uff0c\u6bba\u5f97\u4f01\u696d<a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/20\/l\/overview-of-recent-sunburst-targeted-attacks.html\">\u63aa\u624b\u4e0d\u53ca<\/a>\uff1a\u4f01\u696d\u56e0\u7d44\u614b\u8a2d\u5b9a\u932f\u8aa4\u8207\u5bb9\u5668\u7684\u5f31\u9ede\u53cd\u800c\u9020\u6210\u4e86\u5927\u91cf\u7834\u53e3\u3002\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u6703\u8a66\u5716\u5229\u7528\u9019\u4e9b\u7834\u53e3\u4f86\u5165\u4fb5\u5bb9\u5668\uff0c\u7136\u5f8c\u9577\u671f\u6f5b\u4f0f\u5728\u7db2\u8def\u5167\u90e8\u800c\u4e0d\u88ab\u767c\u73fe\u3002<\/p>\n\n\n\n<p>\u4f01\u696d\u89e3\u6c7a\u50b3\u7d71\u4fee\u88dc\u66f4\u65b0\u554f\u984c\u7684\u65b9\u6cd5\u4e4b\u4e00\uff0c\u5c31\u662f\u8a02\u95b1\u4fee\u88dc\u66f4\u65b0\u670d\u52d9 (Patching-as-a-Service)\uff0c\u8b93\u670d\u52d9\u4f9b\u61c9\u5546\u4f86\u5e6b\u4f01\u696d\u57f7\u884c\u6bcf\u6708\u7684\u5b9a\u671f\u66f4\u65b0\u3002\u6b64\u5916\u9084\u6709\u96f2\u7aef\u5f0f\u89e3\u6c7a\u65b9\u6848\uff0c\u4e5f\u53ef\u70ba\u4f01\u696d\u5e36\u4f86\u884c\u52d5\u6027\u8207\u901f\u5ea6\uff0c\u6240\u4ee5\u4e5f\u76f8\u7576\u53d7\u5230\u6b61\u8fce\u3002\u4eca\u65e5\uff0c\u9664\u4e86\u4f01\u696d\u5728\u56de\u61c9\u5ba2\u6236\u6709\u95dc\u8cc7\u5b89\u8207\u96b1\u79c1\u6b0a\u4fdd\u969c\u554f\u984c\u6642\u505a\u5f97\u66f4\u597d\u4e4b\u5916\uff0c\u7814\u7a76\u4eba\u54e1\u7684\u901a\u5831\u53ca\u63ed\u9732\uff0c\u4ee5\u53ca\u5ee0\u5546\u5c0d\u554f\u984c\u7684\u56de\u61c9\u548c\u4fee\u6b63\u4e5f\u5728<a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2020\/8\/19\/15-years-of-the-zero-day-initiative\">\u6301\u7e8c<\/a>&nbsp;\u6539\u9032\u3002\u5efa\u7acb\u4e00\u5957\u6709\u6548\u7684\u4fee\u88dc\u66f4\u65b0\u7ba1\u7406\u653f\u7b56\u56fa\u7136\u4e0d\u662f\u4e00\u4ef6\u5bb9\u6613\u7684\u4e8b\uff0c\u4f46\u900f\u904e\u6301\u7e8c\u7684\u958b\u767c\u3001\u5b78\u7fd2\u3001\u8abf\u6574\uff0c\u4e26\u4e14\u6df1\u5165\u4e86\u89e3\u6280\u8853\u53ca\u7b56\u7565\u7684\u6f14\u8b8a\uff0c\u9084\u662f\u80fd\u8b93\u4f01\u696d\u7684\u7db2\u8def\u8cc7\u5b89\u6301\u7e8c\u6539\u5584\u3002<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">\u6311\u6230\u8207\u6700\u4f73\u5be6\u52d9\u539f\u5247<\/h2>\n\n\n\n<p><br>\u82e5\u4f7f\u7528\u8005\u80fd\u610f\u8b58\u5230\u4f5c\u696d\u7cfb\u7d71\u5fc5\u9808\u7d93\u5e38\u4fee\u88dc\u66f4\u65b0\uff0c\u4f01\u696d\u5c31\u6bd4\u8f03\u5bb9\u6613<a href=\"https:\/\/themanifest.com\/mobile-apps\/data-safety-small-businesses-2020-cybersecurity-statistics\">\u57f9\u990a<\/a><a href=\"https:\/\/www.securitymagazine.com\/articles\/91324-the-case-for-automated-patch-management-for-smbs\">\u8cc7\u5b89\u610f\u8b58<\/a>\uff0c\u5982\u6b64\u4e00\u4f86\uff0c\u7e31\u4f7f\u4fee\u88dc\u66f4\u65b0\u7ba1\u7406\u4e0d\u6613\uff0c\u4f01\u696d\u9084\u662f\u80fd\u5920\u6539\u5584\u81ea\u8eab\u7684\u8cc7\u5b89\u60c5\u6cc1\u3002\u96a8\u8457\u6d88\u8cbb\u8005\u5c0d\u65bc\u7dda\u4e0a\u5b89\u5168\u3001\u8cc7\u6599\u96b1\u79c1\u6b0a\u8207\u5132\u5b58\u7684\u9700\u6c42\u8d8a\u4f86\u8d8a\u9ad8\uff0c\u4f01\u696d\u5fc5\u9808\u63d0\u9ad8\u4fee\u88dc\u66f4\u65b0\u7684\u81ea\u52d5\u5316\uff0c\u800c\u786c\u9ad4\u88fd\u9020\u5546\u8207\u8edf\u9ad4<a href=\"https:\/\/www.csoonline.com\/article\/3540291\/android-security-patching-improves-but-fragmentation-challenges-remain.html\">\u5ee0\u5546<\/a>\u4e5f\u5728<a href=\"https:\/\/venturebeat.com\/2018\/02\/28\/apples-ios-update-frequency-has-increased-51-under-cooks-management\/\">\u52aa\u529b\u6eff\u8db3<\/a>\u9019\u6a23\u7684\u9700\u6c42\u3002\u6839\u64da\u89c0\u5bdf\uff0c\u76ee\u524d<a href=\"https:\/\/sourceforge.net\/software\/patch-management\/android\/\">\u6b63\u8208\u8d77<\/a>\u4e00\u7a2e\u5c08\u9580\u5354\u52a9\u4f01\u696d\u548c\u4f7f\u7528\u8005\u81ea\u52d5\u90e8\u7f72\u4fee\u88dc\u66f4\u65b0\u7684<a href=\"https:\/\/www.ittsystems.com\/patch-management-tools-and-software\/\">\u7522\u696d<\/a>\u3002<\/p>\n\n\n\n<p>\u4ee5\u4e0b\u662f\u4fee\u88dc\u66f4\u65b0\u7ba1\u7406\u5728\u5be6\u52d9\u4e0a\u7d93\u5e38\u88ab\u63d0\u53ca\u7684\u4e00\u4e9b\u6311\u6230\uff1a<\/p>\n\n\n\n<ul><li><strong>\u8cc7\u6e90\u3002<\/strong>\u57fa\u672c\u4e0a\uff0c\u4e26\u975e\u6240\u6709\u5ee0\u5546\u90fd\u6703\u5728 Microsoft Patch Tuesday \u7684\u540c\u4e00\u5929\u91cb\u51fa\u4fee\u88dc\u66f4\u65b0\u3002\u6240\u4ee5\uff0c\u7cfb\u7d71\u7ba1\u7406\u54e1\u5f88\u96e3\u8ffd\u8e64\u4f01\u696d\u6240\u6709\u9023\u7db2\u8207\u4f7f\u7528\u4e2d\u7cfb\u7d71\u5404\u81ea\u7684\u66f4\u65b0\u9031\u671f\u3002<\/li><\/ul>\n\n\n\n<p>\u9664\u6b64\u4e4b\u5916\uff0c\u4f01\u696d\u4e5f\u4e00\u76f4\u9762\u81e8\u7db2\u8def\u8cc7\u5b89\u4eba\u624d\u4e0d\u8db3\u7684\u554f\u984c\uff0c\u9019\u554f\u984c\u81f3\u4eca\u4ecd\u7136\u7121\u89e3\uff0c\u4e5f\u6210\u4e86\u4f01\u696d\u8cc7\u5b89\u7dad\u8b77\u7684\u4e00\u9805\u6311\u6230\u3002\u518d\u8005\uff0c\u7dda\u4e0a\u71df\u904b\u74b0\u5883\u7684\u5404\u7a2e\u6280\u8853\u548c\u7cfb\u7d71\u4e0d\u65b7\u6fc0\u589e\uff0c\u4f7f\u5f97\u7cfb\u7d71\u7684\u8ffd\u8e64\u7ba1\u7406\u8b8a\u5f97\u66f4\u52a0\u56f0\u96e3\u3002\u96d6\u7136 IT \u5718\u968a\u8207\u7cfb\u7d71\u7ba1\u7406\u54e1\u660e\u77e5\u9632\u5835\u6f0f\u6d1e\u7684\u6839\u672c\u4e4b\u9053\u5728\u65bc\u4fee\u88dc\u66f4\u65b0\uff0c\u4f46\u4ed6\u5011\u5728\u6f0f\u6d1e\u767c\u6398\u3001\u5206\u6790\u53ca\u7ba1\u7406\u4e0a\u7684\u4fe1\u5fc3\u548c\u8a13\u7df4\u4ecd\u986f\u5f97\u4e0d\u8db3\u3002<\/p>\n\n\n\n<p><strong>\u6700\u4f73\u5be6\u52d9\u539f\u5247<\/strong>\uff1a\u76ee\u524d\u696d\u754c\u4ecd\u7121\u4e00\u5957\u901a\u77e5\u6a19\u6e96\u53ef\u8b93 IT \u4eba\u54e1\u638c\u63e1\u66f4\u65b0\u9031\u671f\uff0c\u63db\u53e5\u8a71\u8aaa\uff0c\u4ed6\u5011\u4e0d\u66c9\u5f97\u5982\u4f55\u6392\u51fa\u5b9a\u671f\u66f4\u65b0\u6642\u7a0b\u3002\u5118\u7ba1\u4e26\u975e\u6240\u6709\u5ee0\u5546\u7684\u767c\u5e03\u6d41\u7a0b\u90fd\u5df2\u81ea\u52d5\u5316\uff0c\u4f46\u5ee0\u5546\u9084\u662f\u6703\u900f\u904e\u65b0\u805e\u6216\u90e8\u843d\u683c\u4e4b\u985e\u7684\u7db2\u7ad9\u4f86\u63d0\u4f9b\u76f8\u95dc\u8a0a\u606f\uff0c\u6709\u4e9b\u5ee0\u5546\u751a\u81f3\u6703\u900f\u904e\u96fb\u5b50\u90f5\u4ef6\u3001\u66f4\u65b0\u6d88\u606f\u3001RSS \u6458\u8981\u7b49\u7b49\u4f86\u767c\u9001\u901a\u77e5\u5230\u4f7f\u7528\u8005\u4fe1\u7bb1\u3002<\/p>\n\n\n\n<p>\u6b64\u5916\uff0c\u4fee\u88dc\u66f4\u65b0\u8207\u6f0f\u6d1e\u7684\u7ba1\u7406\u4e0d\u61c9\u88ab\u8996\u70ba\u5982\u540c\u50b3\u7d71\u7684 IT \u6216\u8cc7\u5b89\u4f5c\u696d\uff0c\u53cd\u800c\u61c9\u88ab\u8996\u70ba\u6574\u9ad4\u8cc7\u5b89\u7684\u6230\u7565\u4e00\u74b0\uff0c\u5c24\u5176\u662f DevOps \u548c\u71df\u904b\u7684\u5b89\u5168\u8981\u4ef6\u3002\u5168\u9762\u7684\u76e4\u9ede\u662f\u8cc7\u7522\u7ba1\u7406\u7684\u57fa\u790e\uff0c\u552f\u6709\u80fd\u5920\u8ffd\u8e64\u4f01\u696d\u7528\u5230\u7684\u6240\u6709\u8cc7\u7522\uff0c\u624d\u80fd\u76e3\u63a7\u9019\u4e9b\u8cc7\u7522\u4e26\u63d0\u4f9b\u6e96\u78ba\u5206\u6790\uff0c\u5305\u62ec\uff1a\u6d41\u91cf\u8207\u884c\u70ba\u6a21\u5f0f\u3001\u4f5c\u696d\u7cfb\u7d71\u7248\u672c\u3001\u7db2\u8def\u4f4d\u5740\u3001\u767b\u5165\u6191\u8b49\u3001\u6cd5\u898f\u9075\u5faa\u6aa2\u67e5\u7b49\u7b49\uff0c\u800c\u9019\u4e9b\u90fd\u9084\u53ea\u662f\u6e96\u78ba\u76e3\u63a7\u3001\u6578\u64da\u5206\u6790\u3001\u7570\u5e38\u5075\u6e2c\u6240\u9700\u7684\u57fa\u672c\u689d\u4ef6\u800c\u5df2\u3002\u8acb\u8a18\u4f4f\uff0c\u7d55\u5927\u591a\u6578\u5ee0\u5546\u90fd\u6703\u5728\u6f0f\u6d1e\u516c\u958b\u63ed\u9732\u7684\u5e7e\u500b\u5c0f\u6642\u5167\u91cb\u51fa\u4fee\u88dc\u66f4\u65b0\uff0c\u56e0\u6b64\uff0c\u82e5\u80fd\u900f\u904e\u81ea\u52d5\u5316\u6d41\u7a0b\u7acb\u5373\u5957\u7528\u5c0d\u61c9\u7684\u4fee\u88dc (\u5305\u62ec\u865b\u64ec\u4fee\u88dc\u6216\u5ee0\u5546\u91cb\u51fa\u7684\u66f4\u65b0)\uff0c\u5c31\u80fd\u5927\u5e45\u7e2e\u5c0f\u8cc7\u5b89\u7a7a\u7a97\u671f\u3002<\/p>\n\n\n\n<ul><li><strong>\u89e3\u6c7a\u65b9\u6848\u5404\u81ea\u70ba\u653f\u800c\u9020\u6210\u7684\u8aa4\u5224\u6216\u512a\u5148\u6b21\u5e8f\u932f\u4e82\u3002<\/strong>\u91dd\u5c0d\u55ae\u4e00\u7279\u5b9a\u74b0\u5883\u8a2d\u8a08\u7684\u9632\u8b77\u7522\u54c1 (\u5982\u96fb\u5b50\u90f5\u4ef6\u5a01\u8105\u9632\u8b77) \u6709\u6642\u6703\u8aa4\u5224\u4e00\u4e9b\u9700\u8981\u9760\u5176\u4ed6\u9632\u8b77\u7522\u54c1 (\u5982\u96f2\u7aef\u4f3a\u670d\u5668\u9632\u8b77) \u624d\u80fd\u5075\u6e2c\u7684\u6f0f\u6d1e\uff0c\u53cd\u4e4b\u4ea6\u7136\u3002\u6240\u4ee5\uff0c\u9632\u8b77\u7522\u54c1\u4e0d\u9023\u8cab\u53ef\u80fd\u5c0e\u81f4\u5206\u6790\u5e2b\u6216\u8cc7\u5b89\u5718\u968a\u5fd9\u8457\u8abf\u67e5\u8aa4\u5224\u6216\u4f4e\u98a8\u96aa\u7684\u6f0f\u6d1e\uff0c\u53cd\u800c\u8b93\u91cd\u5927\u6f0f\u6d1e\u9580\u6236\u6d1e\u958b\u3002\u8a31\u591a\u6f0f\u6d1e\u56e0\u800c\u672a\u88ab\u767c\u73fe\uff0c\u6240\u4ee5\u672a\u88ab\u4fee\u88dc\uff0c\u8b93\u7cfb\u7d71\u66b4\u9732\u65bc\u66f4\u9ad8\u7684\u6f0f\u6d1e\u653b\u64ca\u8207\u99ed\u5ba2\u5165\u4fb5\u98a8\u96aa\u3002<\/li><\/ul>\n\n\n\n<p><em><strong>\u6700\u4f73\u5be6\u52d9\u539f\u5247\uff1a<\/strong><\/em>\u4f01\u696d\u82e5\u80fd\u900f\u904e<a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/detection-response.html\">\u96c6\u4e2d\u6aa2\u8996<\/a>\u67e5\u770b\u6240\u6709\u7684\u9632\u8b77\u7522\u54c1\u8207\u8cc7\u5b89\u554f\u984c\uff0c\u5c31\u80fd\u638c\u63e1\u66f4\u9ad8\u7684\u53ef\u8996\u6027\u8207\u554f\u984c\u91cd\u9ede\uff0c\u4e0d\u8ad6\u662f\u4e8b\u4ef6\u767c\u751f\u7576\u4e0b\u7684\u61c9\u8b8a\uff0c\u6216\u662f\u4e8b\u5f8c\u8ffd\u8e64\u6f5b\u5728\u7684\u8cc7\u5b89\u7834\u53e3\u3002\u4e00\u4e9b\u50cf\u8cc7\u5b89\u4e8b\u4ef6\u7ba1\u7406 (SIEM)\u3001\u4eba\u5de5\u667a\u6167 (AI)\u3001\u6578\u64da\u5206\u6790\u3001\u5a01\u8105\u60c5\u5831\u7b49\u7b49\u7684\u7cfb\u7d71\uff0c\u90fd\u80fd\u70ba\u8cc7\u5b89\u71df\u904b (SOC) \u53ca IT \u5718\u968a\u63d0\u4f9b\u4ea4\u53c9\u95dc\u806f\u7684\u5075\u6e2c\u8cc7\u8a0a\uff0c\u6db5\u84cb\u4e0d\u540c\u74b0\u5883\uff0c\u63d0\u4f9b\u66f4\u8c50\u5bcc\u5b8c\u6574\u7684\u80cc\u666f\u8cc7\u8a0a\u4f86\u6539\u5584\u5a01\u8105\u7684\u8abf\u67e5\u53ca\u56de\u61c9\u3002\u6709\u4e86\u9019\u6a23\u7684\u53ef\u8996\u6027\uff0c\u4f01\u696d\u5c31\u80fd\u96c6\u4e2d\u3001\u4e3b\u52d5\u3001\u9023\u8cab\u5730\u76e3\u63a7\u3001\u8ffd\u8e64\u3001\u5206\u6790\u3001\u767c\u6398\u53ca\u5075\u6e2c\u6f0f\u6d1e\u4e26\u6e1b\u5c11\u8aa4\u5224\uff0c\u8b93\u56de\u61c9\u66f4\u6574\u5408\u4e5f\u66f4\u5feb\u3002<\/p>\n\n\n\n<ul><li><strong>\u8f49\u79fb\u81f3\u96f2\u7aef\u89e3\u6c7a\u65b9\u6848\u800c\u7522\u751f\u6216\u907a\u5fd8\u7684\u7834\u53e3\u3002<\/strong><strong>\u4eca\u65e5<\/strong>\u4f01\u696d\u96a8\u6642\u90fd\u5fd9\u8457\u63a8\u51fa\u65b0\u7684\u670d\u52d9\u548c\u7522\u54c1\uff0c\u4e26\u958b\u767c\u61c9\u7528\u7a0b\u5f0f\u4f86\u589e\u52a0\u8207\u5ba2\u6236\u7684\u4e92\u52d5\u3002\u4f46\u662f\u7576\u4f01\u696d\u5728\u79fb\u8f49\u81f3\u96f2\u7aef\u4f86\u6539\u5584\u6548\u7387\u6642\uff0c\u537b\u7d93\u5e38\u5ffd\u7565\u4e86\u4e00\u4e9b\u8cc7\u5b89\u7684\u7d30\u7bc0\u3002\u4f01\u696d\u79fb\u8f49\u81f3\u96f2\u7aef\u5f88\u91cd\u8981\u4e00\u9ede\u5c31\u662f\u8981\u554f\u554f\u81ea\u5df1\u4e00\u4e9b\u95dc\u9375\u554f\u984c\uff0c\u4f8b\u5982\uff1a\u61c9\u7528\u7a0b\u5f0f\u8a2d\u8a08\u662f\u5426\u5b89\u5168\uff1f\u61c9\u7528\u7a0b\u5f0f\u958b\u767c\u4ecb\u9762 (API) \u662f\u5426\u5b89\u5168\uff1f\u61c9\u7528\u7a0b\u5f0f\u7684\u554f\u984c\u662f\u5426\u5df2\u7d93\u4fee\u6b63\uff1f\u5bb9\u5668\u7684\u5ba2\u88fd\u5316\u662f\u5426\u6eff\u8db3\u81ea\u5df1\u7684\u9700\u6c42\u4ee5\u53ca\u7d44\u614b\u8a2d\u5b9a\u662f\u5426\u6b63\u78ba\uff1f\u8a8d\u8b49\u8207\u6388\u6b0a\u91d1\u9470\u7684\u914d\u767c\u8207\u7ba1\u7406\u662f\u5426\u59a5\u5584\uff1f<\/li><\/ul>\n\n\n\n<p><strong>\u6700\u4f73\u5be6\u52d9\u539f\u5247\uff1a<\/strong>\u4e0d\u8ad6\u5728\u96f2\u7aef\u6216\u4f01\u696d\u5167\uff0c\u4f01\u696d\u6700\u91cd\u8981\u7684\u5c31\u662f\u8981\u4ee5\u540c\u6a23\u56b4\u8b39\u7684\u614b\u5ea6\u4f86\u6e2c\u8a66\u61c9\u7528\u7a0b\u5f0f\u3002\u5f88\u91cd\u8981\u7684\u4e00\u9ede\u662f\u5728\u5bb9\u5668\u8207\u61c9\u7528\u7a0b\u5f0f\u5efa\u69cb\u521d\u671f\u4fbf\u5efa\u7acb\u4e00\u5957\u4f01\u696d\u6cbb\u7406\u8207\u653f\u7b56\u6aa2\u67e5\u6e05\u55ae\uff0c\u4ee5\u78ba\u4fdd\u5f8c\u7e8c\u8edf\u9ad4\u958b\u767c\u4f5c\u696d\u7684\u5b89\u5168\u8207\u6548\u7387\u3002\u958b\u767c\u4eba\u54e1\u8981\u78ba\u4fdd\u57fa\u790e\u6620\u50cf\u7576\u4e2d\u4e0d\u53ef\u542b\u6709\u6f0f\u6d1e\uff0c\u4e26\u4e14\u5728\u90e8\u7f72\u5230\u7dda\u4e0a\u71df\u904b\u74b0\u5883\u4e4b\u524d\u8981\u5148\u7d93\u904e\u5fb9\u5e95\u7684\u6383\u63cf\u3002\u540c\u6642\u4e5f\u5fc5\u9808\u78ba\u4fdd\u57fa\u790e\u6620\u50cf\u53ef\u4ee5\u7528\u65bc\u958b\u767c\u61c9\u7528\u7a0b\u5f0f\uff0c\u78ba\u5b9a\u6240\u6709\u7684\u5957\u4ef6\u3001\u4e8c\u9032\u4f4d\u6a94\u6848\u3001\u7a0b\u5f0f\u5eab\u4e00\u958b\u59cb\u5c31\u5b89\u5168\u7121\u865e\u3002<\/p>\n\n\n\n<p>\u4f01\u696d\u9084\u5fc5\u9808\u96a8\u6642\u638c\u63e1\u76f8\u95dc\u5df2\u77e5\u3001\u9ad8\u98a8\u96aa\u53ca\u5e38\u898b\u7684\u6f0f\u6d1e\uff0c\u78ba\u5be6\u5957\u7528\u5fc5\u8981\u7684\u66f4\u65b0\u8207\u89e3\u6c7a\u65b9\u6cd5\u3002\u81f3\u65bc\u4efb\u4f55\u8a02\u95b1\u524d\u7684\u8a55\u4f30\u5206\u6790\uff0c\u4f01\u696d\u61c9\u67e5\u770b\u96f2\u7aef\u5ee0\u5546\u4ee5\u5f80\u7684\u8a18\u9304\uff0c\u5305\u62ec\uff1a\u6f0f\u6d1e\u63ed\u9732\u81f3\u6f0f\u6d1e\u4fee\u88dc\u7684\u7a7a\u7a97\u671f\u3001\u8b8a\u66f4\u7ba1\u7406\u3001\u4fee\u88dc\u66f4\u65b0\u7684\u90e8\u7f72\u6210\u6548\uff0c\u4ee5\u53ca\u554f\u984c\u8207\u98a8\u96aa\u7ba1\u7406\u3002\u6b64\u5916\uff0c\u5b9a\u671f\u6383\u63cf\u5bb9\u5668\u4e2d\u662f\u5426\u542b\u6709\u91d1\u9470\u3001\u6cd5\u898f\u9075\u5faa\u554f\u984c\u3001\u60e1\u610f\u7a0b\u5f0f\u8b8a\u7a2e\u4ee5\u53ca\u7b2c\u4e09\u65b9\u8edf\u9ad4\u6f0f\u6d1e\u7b49\u7b49\u4e5f\u540c\u6a23\u91cd\u8981\u3002\u5ee0\u5546\u5728\u57fa\u790e\u67b6\u69cb\u7684\u7dad\u8b77\u8207\u7a3d\u6838\u65b9\u9762\u6216\u8a31\u5dee\u7570\u9817\u5927\uff0c\u4f46\u9577\u671f\u800c\u8a00\uff0c\u57fa\u672c\u7684\u6f0f\u6d1e<a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud\/cloud-one-workload-security.html\">\u6aa2\u67e5\u8207\u6383\u63cf<\/a>\u9084\u662f\u6709\u52a9\u65bc\u964d\u4f4e\u98a8\u96aa\u3002<\/p>\n\n\n\n<ul><li><strong>\u9060\u8ddd\u4e0a\u73ed\u8207\u6f0f\u6d1e\u7ba1\u7406\u7684\u7834\u53e3\u3002<\/strong>\u96d6\u7136\u9060\u8ddd\u4e0a\u73ed\u7531\u4f86\u5df2\u4e45\uff0c\u4f46\u4f01\u696d\u537b\u662f\u56e0\u70ba\u75ab\u60c5\u7684\u95dc\u4fc2\u624d\u88ab\u8feb\u5fc5\u9808\u5927\u898f\u6a21\u5730\u8b93\u6240\u6709\u54e1\u5de5\u53ca\u4ed6\u5011\u7684\u88dd\u7f6e\u90fd\u80fd\u5728\u9060\u7aef\u5de5\u4f5c\u3002\u7576\u6240\u6709\u7cfb\u7d71\u90fd\u5728\u4f01\u696d\u5167\u90e8\u6642\uff0c\u7cfb\u7d71\u7ba1\u7406\u54e1\u9762\u5c0d\u4fee\u88dc\u66f4\u65b0\u5c31\u5df2\u986f\u5f97\u6349\u895f\u898b\u8098\uff0c\u66f4\u4f55\u6cc1\u7576\u4f7f\u7528\u8005\u548c\u4ed6\u5011\u7684\u96fb\u8166\u56e0\u9060\u8ddd\u4e0a\u73ed\u7684\u95dc\u4fc2\u800c\u56db\u8655\u5206\u6563\u6642\uff0c\u4fee\u88dc\u66f4\u65b0\u5c07\u8b8a\u5f97\u96e3\u4e0a\u52a0\u96e3\u3002\u6709\u4e9b\u7cfb\u7d71\u9700\u8981\u7cfb\u7d71\u7ba1\u7406\u54e1\u5be6\u969b\u64cd\u4f5c\u624d\u6709\u8fa6\u6cd5\u66f4\u65b0\uff0c\u5982\u6b64\u4f01\u696d\u5c31\u7121\u6cd5\u78ba\u5b9a\u4f55\u6642\u624d\u80fd\u5fb9\u5e95\u66f4\u65b0\u5b8c\u6210\uff0c\u7121\u5f62\u4e2d\u589e\u52a0\u4e86\u4f01\u696d\u7684\u98a8\u96aa\u3002\u5c24\u5176\u662f\u4e00\u4e9b\u8001\u820a\u7684 ICS \u7cfb\u7d71\uff0c\u8981\u5728\u4e0d\u5be6\u969b\u64cd\u4f5c\u7684\u60c5\u6cc1\u4e0b\u5f9e\u9060\u7aef\u66f4\u65b0\uff0c\u5e7e\u4e4e\u662f\u4e0d\u592a\u53ef\u80fd\uff0c\u56e0\u70ba\u6709\u592a\u591a\u7cfb\u7d71\u6574\u5408\u5728\u4e00\u8d77\uff0c\u4e00\u66f4\u65b0\u5c31\u5f88\u53ef\u80fd\u6703\u9020\u6210\u4e00\u4e9b\u610f\u5916\u7684\u7d50\u679c\u3002<\/li><\/ul>\n\n\n\n<p><em><strong>\u6700\u4f73\u5be6\u52d9\u539f\u5247\uff1a<\/strong><\/em>\u4e26\u975e\u6240\u6709\u7684\u6f0f\u6d1e\u90fd\u540c\u6a23\u91cd\u8981\uff0c\u5728\u6240\u6709\u88ab\u63ed\u9732\u7684\u8cc7\u5b89\u6f0f\u6d1e\u7576\u4e2d\uff0c\u50c5\u6709\u5c11\u6578\u662f\u99ed\u5ba2\u771f\u6b63\u7d93\u5e38\u5229\u7528\u7684\u6f0f\u6d1e\uff0c\u5176\u4e2d\u80fd\u5920\u7528\u4f86\u6ef2\u900f\u4f01\u696d\u6a5f\u69cb\u7684\u6f0f\u6d1e\u751a\u81f3\u66f4\u5c11 (\u898b\u5716 1)\u3002\u9762\u5c0d\u9019\u6a23\u7684\u6578\u5b57\uff0c\u7cfb\u7d71\u7ba1\u7406\u54e1\u9084\u662f\u4e0d\u80fd\u6389\u4ee5\u8f15\u5fc3\uff0c\u4e0d\u904e\u537b\u53ef\u4ee5\u5b89\u6392\u4e00\u4e9b\u512a\u5148\u6b21\u5e8f\uff0c\u5148\u5217\u51fa\u9700\u8981\u512a\u5148\u8655\u7406\u7684\u6f0f\u6d1e\u7136\u5f8c\u7acb\u5373\u4fee\u88dc\u3002\u9664\u6b64\u4e4b\u5916\u9084\u6709\u4e00\u4e9b\u63aa\u65bd\u4e5f\u662f\u5fc5\u8981\u7684\uff0c\u4f8b\u5982\uff1a\u512a\u826f\u7684\u6f0f\u6d1e\u60c5\u5831\u4f86\u6e90\u3001\u5b8c\u6574\u7684\u7cfb\u7d71\u8207\u8edf\u9ad4\u76e4\u9ede\u3001\u6f0f\u6d1e\u8a55\u4f30\/\u6383\u63cf\/\u78ba\u8a8d\u5de5\u5177\u3001\u4fee\u88dc\u66f4\u65b0\u90e8\u7f72\u6a5f\u5236 (\u6709\/\u7121\u4ee3\u7406\u7a0b\u5f0f)\uff0c\u4ee5\u53ca\u6301\u7e8c\u7684\u98a8\u96aa\u9632\u7bc4\u8a08\u756b\u3002<\/p>\n\n\n\n<p>\u5c0d\u65bc\u90a3\u4e9b\u5fc5\u9808\u5be6\u969b\u64cd\u4f5c\u624d\u80fd\u4fee\u88dc\u7684\u7cfb\u7d71\uff0c\u5982\u679c\u80fd\u5920\u7cbe\u78ba\u5217\u51fa\u67d0\u4e9b\u74b0\u5883\u4e0b\u52d9\u5fc5\u4fee\u88dc\u7684\u6f0f\u6d1e (\u4e0d\u8ad6\u662f\u5be6\u969b\u4fee\u88dc\u6216\u865b\u64ec\u4fee\u88dc)\uff0c\u5c07\u6709\u52a9\u65bc\u7cfb\u7d71\u7ba1\u7406\u54e1\u5b89\u6392\u4fee\u88dc\u7684\u4fee\u5148\u6b21\u5e8f\u3002\u512a\u5148\u6b21\u5e8f\u7684\u5b89\u6392\u5c0d ICS \u5c24\u5176\u5fc5\u8981\uff0c\u7cfb\u7d71\u7ba1\u7406\u54e1\u53ca IT \u5718\u968a\u9700\u8981\u6839\u64da\u4e00\u5957<a href=\"https:\/\/www.linkedin.com\/pulse\/ics-patch-what-patch-when-dale-peterson\/\">\u7a0b\u5e8f\u548c\u6a21\u5f0f<\/a>\u4f86\u6c7a\u5b9a\u7cfb\u7d71\u662f\u5426\u8a72\u4fee\u88dc\u3002<br><br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/Image20210323120408.png\" alt=\"fig2-the-nightmares-of-patch-management\"\/><figcaption>\u5716 2\uff1a2019 \u5e74\u767c\u73fe\u4e26\u906d\u5230\u653b\u64ca\u7684 CVE \u6f0f\u6d1e\u3002<\/figcaption><\/figure>\n\n\n\n<p><br><br><br><br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/Image20210323120418.png\" alt=\"fig3-the-nightmares-of-patch-management\"\/><figcaption>\u5716 3\uff1a\u6839\u64da\u4f01\u696d\u74b0\u5883\u7576\u4e2d\u767c\u73fe\u7684\u6f0f\u6d1e\u4f86\u8abf\u6574\u7cfb\u7d71\u4fee\u88dc\u7684\u512a\u5148\u6b21\u5e8f\u3002(\u8cc7\u6599\u4f86\u6e90\uff1a<a href=\"https:\/\/www.gartner.com\/en\/documents\/3438517\/it-s-time-to-align-your-vulnerability-management-priorit\">Gartner<\/a>)<\/figcaption><\/figure>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>[\u5ef6\u4f38\u95b1\u8b80\uff1a<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/virtualization-and-cloud\/application-security-101\">Application security 101<\/a>]<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">\u865b\u64ec\u4fee\u88dc<\/h2>\n\n\n\n<p><br>\u865b\u64ec\u4fee\u88dc\u662f\u4fee\u88dc\u66f4\u65b0\u7ba1\u7406\u4e0d\u53ef\u6216\u7f3a\u7684\u4e00\u74b0\uff0c\u56e0\u70ba\u7576\u6f0f\u6d1e\u88ab\u767c\u73fe\u6642\uff0c\u8edf\u9ad4\u5ee0\u5546\u548c\u786c\u9ad4\u88fd\u9020\u5546\u6703\u9700\u8981\u4e00\u6bb5\u6642\u9593\u4f86\u88fd\u4f5c\u548c\u767c\u5e03\u5fc5\u8981\u7684\u4fee\u88dc\u66f4\u65b0\uff0c\u56e0\u6b64\u50cf\u865b\u64ec\u4fee\u88dc\u9019\u985e\u7684\u66ab\u6642\u6027\u624b\u6bb5\uff0c\u5c31\u80fd\u722d\u53d6\u4e00\u4e9b\u6642\u9593\u4f86\u7b49\u5f85\u6c38\u4e45\u6027\u66f4\u65b0\u51fa\u73fe\uff0c\u540c\u6642\u4e5f\u80fd\u907f\u514d\u4e0d\u5fc5\u8981\u7684\u505c\u6a5f\uff0c\u8b93\u4f01\u696d\u6309\u7167\u81ea\u5df1\u7684\u6642\u7a0b\u4f86\u5b89\u6392\u4fee\u88dc\u66f4\u65b0\u3002\u5c24\u5176\u662f\u96f6\u6642\u5dee\u6f0f\u6d1e\uff0c\u865b\u64ec\u4fee\u88dc\u53ef\u4ee5\u70ba\u7cfb\u7d71\u548c\u7db2\u8def\u63d0\u4f9b\u4e00\u5c64\u984d\u5916\u7684\u9632\u8b77\u4f86\u9632\u7bc4\u5df2\u77e5\u53ca\u672a\u77e5\u7684\u6f0f\u6d1e\u653b\u64ca\u3002<\/p>\n\n\n\n<p>\u4e00\u500b\u5f88\u597d\u7684\u4f8b\u5b50\u5c31\u662f <a href=\"https:\/\/www.thezdi.com\/blog\/2020\/2\/24\/cve-2020-0688-remote-code-execution-on-microsoft-exchange-server-through-fixed-cryptographic-keys\">CVE-2020-0688<\/a> \u9019\u500b Microsoft Exchange \u4f3a\u670d\u5668\u7684\u9060\u7aef\u7a0b\u5f0f\u78bc\u57f7\u884c (RCE) \u91cd\u5927\u6f0f\u6d1e\u3002\u6b64\u6f0f\u6d1e\u662f\u7d93\u7531\u8da8\u52e2\u79d1\u6280 Zero Day Initiative (ZDI) \u6f0f\u6d1e\u61f8\u8cde\u8a08\u756b\u65bc 2019 \u5e74 11 \u6708\u7684\u6700\u5f8c\u4e00\u9031\u901a\u5831\u7d66 Microsoft\uff0c\u6211\u5011\u5728 12 \u6708 7 \u65e5\u5c31\u5df2\u63d0\u4f9b\u4e86\u5c0d\u61c9\u7684\u865b\u64ec\u4fee\u88dc\uff0c\u4f46 Microsoft \u5728\u6211\u5011\u63d0\u4f9b\u865b\u64ec\u4fee\u88dc\u4e4b\u5f8c 66 \u5929\u624d\u91cb\u51fa\u6b63\u5f0f\u7684\u66f4\u65b0\uff0c\u96a8\u5373\u4e00\u500b\u6708\u5167\u5373\u767c\u73fe\u6709\u5be6\u969b\u653b\u64ca\u6848\u4f8b\uff0c\u6b64\u6642\u6211\u5011\u7684\u865b\u64ec\u4fee\u88dc\u5df2\u7d93\u4e0a\u7dda\u8d85\u904e\u4e09\u500b\u6708\u4e86\u3002<\/p>\n\n\n\n<p>\u5c0d\u65bc\u9084\u6709\u8a31\u591a\u8001\u820a\u7cfb\u7d71\u7684\u4f01\u696d\u6a5f\u69cb\u800c\u8a00\uff0c\u865b\u64ec\u4fee\u88dc\u9084\u80fd\u70ba\u4e00\u4e9b\u5ee0\u5546\u5df2\u7d93\u4e0d\u518d\u63d0\u4f9b\u5b89\u5168\u66f4\u65b0\u7684\u7cfb\u7d71\u63d0\u4f9b\u4e00\u9053\u984d\u5916\u9632\u8b77\uff0c\u540c\u6642\u4e5f\u8b93\u4f01\u696d\u5728\u8a55\u4f30\u4fee\u88dc\u66f4\u65b0\u7684\u512a\u5148\u6b21\u5e8f\u6642\u591a\u4e00\u4e9b\u5f48\u6027\u3002\u826f\u597d\u7684\u865b\u64ec\u4fee\u88dc\u89e3\u6c7a\u65b9\u6848\u61c9\u8a72\u662f\u591a\u5c64\u6b21\u7684\uff0c\u6db5\u84cb\u5be6\u9ad4\u3001\u865b\u64ec\u53ca\u96f2\u7aef\u74b0\u5883\u4ee5\u78ba\u4fdd\u4f01\u696d\u95dc\u9375\u6d41\u91cf\u3001\u901a\u8a0a\u548c\u71df\u904b\u7684\u6c38\u7e8c\u6027\u3002<\/p>\n\n\n\n<p>[\u5ef6\u4f38\u95b1\u8b80\uff1a<a href=\"https:\/\/www.trendmicro.com\/vinfo\/ph\/security\/news\/vulnerabilities-and-exploits\/security-101-zero-day-vulnerabilities-and-exploits\">Security 101:Zero-day vulnerabilities and exploits<\/a>]<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">\u7d50\u8ad6<\/h2>\n\n\n\n<p><br>\u6eff\u8166\u5b50\u60f3\u8457\u8cfa\u9322\u7684\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u8207\u5c45\u5fc3\u53f5\u6e2c\u7684\u99ed\u5ba2\u6703\u4e0d\u65b7\u767c\u6398\u65b0\u7684\u6280\u5de7\u8207\u53ef\u5229\u7528\u7684\u6f0f\u6d1e\u4f86\u653b\u64ca\u4f01\u696d\u548c\u500b\u4eba\u4f7f\u7528\u8005\u3002\u901a\u8a0a\u8207\u904b\u7b97\u6280\u8853\u7684\u4e0d\u65b7\u63d0\u5347\uff0c\u5e36\u4f86\u4e86\u66f4\u9ad8\u7684\u751f\u7522\u529b\u8207\u4fbf\u5229\u6027\uff0c\u4f46\u4e5f\u8b93\u72af\u7f6a\u96c6\u5718\u56e0\u6b64\u6709\u6a5f\u6703\u767c\u6398\u66f4\u591a\u6709\u5229\u65bc\u4ed6\u5011\u5f9e\u4e8b\u72af\u7f6a\u6d3b\u52d5\u7684\u6f0f\u6d1e\u3002\u6240\u4ee5\uff0c\u4f01\u696d\u6a5f\u69cb\u8981\u96a8\u6642\u638c\u63e1\u5167\u90e8\u8207\u5916\u90e8\u53ef\u80fd\u906d\u99ed\u5ba2\u975e\u6cd5\u5165\u4fb5\u7684\u74b0\u7bc0\u3002\u4fee\u88dc\u66f4\u65b0\u53ca\u4fee\u88dc\u66f4\u65b0\u7684\u7ba1\u7406\u7a0b\u5e8f\u548c\u65b9\u6cd5\u61c9\u8a72\u8207\u6642\u4ff1\u9032\uff0c\u96a8\u6642\u8ddf\u4e0a\u5e02\u5834\u3001\u670d\u52d9\u3001\u7522\u54c1\u63a8\u51fa\u7684\u901f\u5ea6\u548c\u9700\u6c42\u3002<\/p>\n\n\n\n<p>\u96d6\u7136\u9019\u4e0d\u662f\u4e00\u4ef6\u5bb9\u6613\u7684\u4e8b\uff0c\u4f46\u79d1\u6280\u7684\u9032\u6b65\u8207\u8b8a\u9769\u5fc5\u5c07\u903c\u8457\u4f7f\u7528\u8005\u3001\u5ee0\u5546\u53ca\u4f01\u696d\u5fc5\u9808\u4e0d\u65b7\u63d0\u5347\u7db2\u8def\u8cc7\u5b89\u610f\u8b58\u3002\u540c\u6642\u4e5f\u7763\u4fc3\u8edf\u9ad4\u5ee0\u5546\u8207\u786c\u9ad4\u88fd\u9020\u5546\u52d9\u5fc5\u78ba\u4fdd\u81ea\u5bb6\u7cfb\u7d71\u4e0d\u6703\u906d\u5230\u653b\u64ca\u3002\u770b\u5230\u773c\u524d\u5df2\u63ed\u9732\u7684\u6f0f\u6d1e\u6578\u91cf\uff0c\u4e0d\u7981\u4ee4\u4eba\u61f7\u7591\u5230\u5e95\u662f\u8cc7\u5b89\u7814\u7a76\u4eba\u54e1\u767c\u73fe\u6f0f\u6d1e\u7684\u80fd\u529b\u8b8a\u5f37\u4e86\uff0c\u9084\u662f\u5e02\u5834\u4e0a\u542b\u6709\u6f0f\u6d1e\u7684\u7cfb\u7d71\u8d8a\u4f86\u8d8a\u591a\u3002<\/p>\n\n\n\n<p>\u4e0d\u7ba1\u662f\u54ea\u4e00\u7a2e\u539f\u56e0\uff0c\u4f01\u696d\u7684\u7576\u52d9\u4e4b\u6025\u9084\u662f\u8981\u7e2e\u5c0f\u8cc7\u7684\u5b89\u7a7a\u7a97\u671f\uff0c\u624d\u80fd\u56e0\u61c9\u8cc7\u5b89\u60c5\u52e2\u7684\u767c\u5c55\u3002\u6b64\u5916\uff0c\u4f7f\u7528\u8005\u4e5f\u5fc5\u9808\u4e0d\u65b7\u63d0\u5347\u81ea\u5df1\u7684\u8cc7\u5b89\u610f\u8b58\uff0c\u96a8\u6642\u6ce8\u610f\u81ea\u5df1\u7684\u9632\u79a6\u662f\u5426\u904b\u4f5c\u3002\u96d6\u7136\u6211\u5011\u4ecd\u4e0d\u5f97\u4e0d\u4ef0\u8cf4\u4fee\u88dc\u66f4\u65b0\u4f86\u78ba\u4fdd\u5b89\u5168\uff0c\u4f46\u6d88\u8cbb\u8005\u9084\u662f\u671f\u5f85\u5ee0\u5546\u80fd\u5920\u63d0\u5347\u81ea\u5bb6\u7522\u54c1\u5b89\u5168\u6027\uff0c\u6240\u4ee5\u5ee0\u5546\u61c9\u8a72\u6230\u6230\u5162\u5162\uff0c\u96a8\u6642\u6212\u614e\u6050\u61fc\uff0c\u4ee5\u514d\u4e0d\u5c0f\u5fc3\u89f8\u6012\u4e86\u6d88\u8cbb\u8005\u3002<br><\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\n\n<p>\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/the-nightmares-of-patch-management-the-status-quo-and-beyond\">The Nightmares of Patch Management:The Status Quo and Beyond<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u96a8\u8457\u8cc7\u6599\u7684\u50f9\u503c\u53ca\u7528\u9014\u4e0d\u65b7\u88ab\u4eba\u5011&nbsp;\u767c\u73fe\uff0c\u4e00\u4e9b\u5c08\u9580\u5229\u7528\u7cfb\u7d71\u6f0f\u6d1e\u7684\u76ee\u6a19\u5f0f\u653b\u64ca&nbsp;&nbsp;\u548c\u5a01\u8105 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[3951,3654,156,4],"tags":[3830,452,2282],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/68032"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=68032"}],"version-history":[{"count":1,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/68032\/revisions"}],"predecessor-version":[{"id":68039,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/68032\/revisions\/68039"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=68032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=68032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=68032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}