{"id":1480,"date":"2016-08-21T08:13:01","date_gmt":"2016-08-21T00:13:01","guid":{"rendered":"http:\/\/localhost\/portal\/2016\/08\/21\/cisco-fortinet-firewall-equationgroup-nsa\/"},"modified":"2016-08-21T08:13:01","modified_gmt":"2016-08-21T00:13:01","slug":"cisco-fortinet-firewall-equationgroup-nsa","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=1480","title":{"rendered":"\u99ed\u5ba2\u653b\u7834 Cisco \u548c Fortinet \u9632\u706b\u7246\uff01\u537b\u662f\u7f8e\u570b\u653f\u5e9c\u7684\u5bc6\u8b00\uff1f"},"content":{"rendered":"<p><span style=\"font-size: medium;\"><span style=\"font-family: Arial;\">&nbsp;<\/span><\/span><a href=\"http:\/\/3c.ltn.com.tw\/news\/25848\"><span style=\"font-size: medium;\"><span style=\"font-family: Arial;\">\u81ea\u7531\u6642\u5831<\/span><\/span><\/a><span style=\"font-size: medium;\"><span style=\"font-family: Arial;\"> \u6587\uff0f\u8a18\u8005\u8b5a\u5049\u665f\uff0f 2016-08-19 12:19<br \/>\n<\/span><\/span><\/p>\n<p><span style=\"font-size: medium;\"><span style=\"font-family: Arial;\">\u63d0\u4f9b\u5927\u91cf\u4f01\u696d\u5ba2\u6236\u9632\u706b\u7246\u670d\u52d9\u7684 Cisco \u548c Fortinet \u5169\u5bb6\u516c\u53f8\uff0c\u73fe\u5728\u90fd\u50b3\u51fa\u65d7\u4e0b\u9632\u706b\u7246\u7522\u54c1\u88ab\u99ed\u5ba2\u6ef2\u900f\u3002\u5169\u5bb6\u516c\u53f8\u7acb\u5373\u767c\u51fa\u8b66\u544a\u3001\u8981\u5ba2\u6236\u5fc5\u9808\u76e1\u5feb\u5347\u7d1a\u7522\u54c1\u78ba\u4fdd\u5b89\u5168\u3002\u800c\u9019\u6b21\u7522\u751f\u5a01\u8105\u7684\u99ed\u5ba2\u5de5\u5177\u300cEquation Group\u300d\uff0c\u537b\u5728\u6b64\u6642\u50b3\u51fa\u8207\u7f8e\u570b\u570b\u5b89\u5c40 NSA \u6709\u8457\u7279\u5225\u95dc\u4fc2\uff01<\/span><\/span><\/p>\n<p><span style=\"font-size: medium;\"><span style=\"font-family: Arial;\"><br \/>\n<\/span><\/span><\/p>\n<p><span style=\"font-size: medium;\"><span style=\"font-family: Arial;\">\u6839\u64da\u300aFortune\u300b\u7684\u5831\u5c0e\uff0cThe Shadow Brokers \u5ba3\u5e03\u5df2\u7d93\u516c\u958b\u8ca9\u552e\u540d\u70ba\u300cEquation Group\u300d\u7684\u99ed\u5ba2\u5de5\u5177\uff0c Cisco \u548c Fortinet \u90fd\u5df2\u7d93\u78ba\u8a8d\u8a72\u5de5\u5177\u53ef\u4ee5\u653b\u7834\u90e8\u5206\u81ea\u5bb6\u7684\u9632\u706b\u7246\u7522\u54c1\uff0c\u4e26\u4e14\u8981\u5ba2\u6236\u591a\u52a0\u7559\u610f\u7cfb\u7d71\u5b89\u5168\u72c0\u6cc1\u3002<\/span><\/span><\/p>\n<p><span style=\"font-size: medium;\"><span style=\"font-family: Arial;\"><br \/>\n<\/span><\/span><\/p>\n<p><span style=\"font-size: medium;\"><span style=\"font-family: Arial;\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/img.ltn.com.tw\/Upload\/3c\/page\/2016\/08\/19\/160819-25848-2.jpg\" width=\"400\" height=\"262\" alt=\"\" \/><br \/>\n<\/span><\/span><\/p>\n<p><span style=\"font-size: medium;\"><span style=\"font-family: Arial;\">\u9019\u500b\u99ed\u5ba2\u5de5\u5177\u7684\u51fa\u73fe\uff0c\u7591\u4f3c\u8207\u7f8e\u570b\u570b\u5b89\u5c40\u6709\u95dc\uff08\u5716\uff0f\u7f8e\u806f\u793e\uff09<\/span><\/span><\/p>\n<p><span style=\"font-size: medium;\"><span style=\"font-family: Arial;\"><br \/>\n<\/span><\/span><\/p>\n<p><span style=\"font-size: medium;\"><span style=\"font-family: Arial;\">\u5176\u4e2d Equation Group \u9019\u500b\u5de5\u5177\u7684\u51fa\u73fe\uff0c\u88ab\u8a8d\u70ba\u8207\u7f8e\u570b\u570b\u5b89\u5c40 NSA \u6709\u8457\u76f8\u7576\u5927\u7684\u95dc\u806f\u3002\u56e0\u70ba Equation \u9019\u500b\u99ed\u5ba2\u7d44\u7e54\uff0c\u50b3\u51fa\u5c31\u662f NSA \u65d7\u4e0b\u7684\u79d8\u5bc6\u7db2\u8def\u653b\u64ca\u90e8\u968a\u3002\u9019\u6b21 Equation Group \u5de5\u5177\u7684\u6d29\u6f0f\uff0c\u5247\u662f\u56e0\u70ba The Shadow Brokers \u99ed\u9032\u4e86 Equation \u5167\u90e8\u800c\u53d6\u5f97\uff0c\u6b64\u5916\u8a72\u5de5\u5177\u88ab\u767c\u73fe\u5df2\u7d93\u7814\u767c 3 \u5e74\u4e4b\u4e45\u3002<\/span><\/span><\/p>\n<p><span style=\"font-size: medium;\"><span style=\"font-family: Arial;\"><br \/>\n<\/span><\/span><\/p>\n<p><span style=\"font-size: medium;\"><span style=\"font-family: Arial;\">Cisco \u6307\u51fa\uff0c\u85c9\u7531\u9019\u9805\u99ed\u5ba2\u5de5\u5177\u653b\u7834\u9632\u706b\u7246\uff0c\u6703\u5c0e\u81f4\u99ed\u5ba2\u5168\u9762\u6574\u63a7\u7cfb\u7d71\uff0c\u4f46\u76ee\u524d Cisco \u9084\u6c92\u6709\u63a8\u51fa\u5b89\u5168\u6027\u4fee\u6b63\u66f4\u65b0\u3002\u800c Fortinet \u5247\u662f\u8b66\u544a\u5ba2\u6236\u76e1\u5feb\u5347\u7d1a\u7522\u54c1\uff0c\u4f86\u89e3\u6c7a\u5b89\u5168\u6027\u554f\u984c\uff0c\u7279\u5225\u662f 2012 \u5e74 8 \u6708\u524d\u7248\u672c\u7684\u7522\u54c1\uff0c\u5c07\u6709\u76f8\u7576\u5927\u7684\u6a5f\u6703\u88ab\u99ed\u5ba2\u5165\u4fb5\u3002<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;\u81ea\u7531\u6642\u5831 \u6587\uff0f\u8a18\u8005\u8b5a\u5049\u665f\uff0f 2016-08-19 12:19 \u63d0\u4f9b\u5927\u91cf\u4f01\u696d\u5ba2\u6236\u9632\u706b\u7246\u670d\u52d9\u7684 Cis [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-1480","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1480"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1480\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}