ÃÀ¶à³ÇÖÒÑÔÒÆ¶¯ÍøÂç´¹ÂÚ¶ÌÐÅð³äÍ£³µÎ¥¹æ·£¿£¿£¿£¿£¿£¿îÕ©Æ
Ðû²¼Ê±¼ä 2025-03-101. ÃÀ¶à³ÇÖÒÑÔÒÆ¶¯ÍøÂç´¹ÂÚ¶ÌÐÅð³äÍ£³µÎ¥¹æ·£¿£¿£¿£¿£¿£¿îÕ©Æ
3ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬£¬ÃÀ¹ú¶à¸ö¶¼»á°üÀ¨°²Äɲ¨Àû˹¡¢²¨Ê¿¶Ù¡¢¸ñÁÖÍþÖΡ¢µ¤·ð¡¢µ×ÌØÂÉ¡¢ÐÝ˹¶Ù¡¢ÃܶûÎÖ»ù¡¢Ñκþ³Ç¡¢ÏÄÂåÌØ¡¢Ê¥µØÑǸ硢¾É½ðɽµÈµØ·×·×·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬Ö¸³öÓÐÒÆ¶¯ÍøÂç´¹Âڻͨ¹ýαװ³É¶¼»áÍ£³µÎ¥¹æ²¿·ÖµÄ¶ÌОÙÐÐÕ©Æ¡£¡£¡£¡£ÕâЩ¶ÌÐÅÉù³ÆÓû§ÓÐδ¸¶Í£³µ·Ñ£¬£¬£¬£¬£¬£¬²¢ÍþвÈô²»Ö§¸¶£¬£¬£¬£¬£¬£¬ÌìÌì½«ÌØÊâ·£¿£¿£¿£¿£¿£¿î35ÃÀÔª£¬£¬£¬£¬£¬£¬Í¬Ê±ÌṩÁ´½ÓÓÕµ¼Óû§µã»÷Ö§¸¶¡£¡£¡£¡£¾ÝBleepingComputer±¨µÀ£¬£¬£¬£¬£¬£¬×ÔÈ¥Äê12ÔÂÆð£¬£¬£¬£¬£¬£¬´ËÀà¶ÌÐų±Ò»Á¬Ò»Ö±£¬£¬£¬£¬£¬£¬ÇÒ¶à¸ö¶¼»áÊÕµ½µÄթƶÌÐŽÓÄÉÁËÏàͬµÄÄ£°å¡£¡£¡£¡£Õ©ÆÕßʹÓÃGoogle.comµÄ¿ª·ÅÖØ¶¨Ïò¹¦Ð§£¬£¬£¬£¬£¬£¬½«Óû§Öض¨ÏòÖÁð³äµÄ¶¼»á´¹ÂÚÍøÕ¾£¬£¬£¬£¬£¬£¬ÈçŦԼÊеÄnycparkclient[.]com¡£¡£¡£¡£Ö»¹ÜÆ»¹ûÒÑÍÆ³öÇå¾²¹¦Ð§½ûÓÃÀ´×Ôδ֪·¢¼þÈ˺ͿÉÒÉÓòÃûµÄ¶ÌÐÅÁ´½Ó£¬£¬£¬£¬£¬£¬µ«ÓÉÓÚGoogle.comÊÇÊÜÐÅÈÎÓòÃû£¬£¬£¬£¬£¬£¬ÕâÒ»Îó²îʹµÃÕ©ÆÕ߸üÒ×µ½ÊÖ¡£¡£¡£¡£Óû§µã»÷Á´½Óºó»á±»Ö¸µ¼ÖÁð³äµÄ¡°Å¦Ô¼ÊвÆÎñ²¿£ºÍ£³µºÍÉãÏñÍ·Î¥¹æÐÐΪ¡±ÍøÕ¾£¬£¬£¬£¬£¬£¬ÒªÇóÊäÈëСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬½ø¶øÃæÁÙÊý¾ÝÇÔȡΣº¦£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþ¼°ÐÅÓÿ¨ÐÅÏ¢µÈ¡£¡£¡£¡£ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚ½øÒ»²½µÄÍøÂç´¹ÂÚ¹¥»÷¡¢Éí·Ý͵ÇÔ¡¢½ðÈÚڲƻò½«Êý¾Ý³öÊÛ¸øÆäËûÍþвÐÐΪÕß¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/us-cities-warn-of-wave-of-unpaid-parking-phishing-texts/
2. NTT Com֤ʵ½ü18000¼ÒÆóÒµ¿Í»§Êý¾ÝÔâºÚ¿Í»á¼û
3ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬ÈÕ±¾µçОÞÍ·NTTͨѶ£¨NTT Com£©Ö¤Êµ£¬£¬£¬£¬£¬£¬ÔÚ2Ô·ݵÄÍøÂç¹¥»÷ÖУ¬£¬£¬£¬£¬£¬½ü18,000¼ÒÆóÒµ¿Í»§µÄÊý¾ÝÔâµ½ºÚ¿Í»á¼û£¬£¬£¬£¬£¬£¬µ«ÊÜÓ°ÏìСÎÒ˽¼ÒµÄÏêϸÊýÄ¿Éв»ÇåÎú¡£¡£¡£¡£NTT ComΪȫÇò70¸ö¹ú¼ÒµÄÁè¼Ý100,000¸öÆóÒµÌṩµç»°ºÍÍøÂçÊÖÒÕЧÀÍ£¬£¬£¬£¬£¬£¬´Ë´Îй¶µÄÊý¾Ý°üÀ¨17,891¸ö×éÖ¯µÄ¿Í»§ÐÕÃû¡¢ÌõÔ¼ºÅ¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢ÏÖʵµØµãºÍЧÀÍʹÓÃÐÅÏ¢¡£¡£¡£¡£Ö»¹ÜNTT ComÔÚ2ÔÂ5ÈÕ·¢Ã÷ÄÚ²¿ÏµÍ³±»¡°Î´¾ÊÚȨ»á¼û¡±ºóÁ¬Ã¦ÏÞÖÆÁËÊÜѬȾװ±¸µÄ»á¼û£¬£¬£¬£¬£¬£¬µ«2ÔÂ15ÈÕÓÖ·¢Ã÷¹¥»÷ÕßÒÑÈëÇÖÆäÄÚ²¿ÍøÂçÖеÄÁíһ̨װ±¸²¢Á¬Ã¦¶Ï¿ªÅþÁ¬¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬ºÚ¿Í¹¥»÷ÊÂÎñ±³ºóµÄÈËÎïºÍÍøÂç¹¥»÷µÄÏêϸÐÔ×ÓÉв»ÇåÎú£¬£¬£¬£¬£¬£¬Ò²Ã»ÓÐÈκδóÐÍÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´ËÈÏÕæ¡£¡£¡£¡£½üÄêÀ´£¬£¬£¬£¬£¬£¬µçÐÅ×éÖ¯ÒѳÉÎªÍøÂç·¸·¨·Ö×Ӻ͹ú¼ÒÖ§³ÖµÄºÚ¿ÍµÄÖ÷Òª¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×Ó»¹»á¹¥»÷µçОÞÍ·´æ´¢µÄµç»°¼Í¼¿âÒÔ·¢¶¯½øÒ»²½µÄÍøÂç¹¥»÷¡£¡£¡£¡£
https://techcrunch.com/2025/03/07/japanese-telco-giant-ntt-com-says-hackers-accessed-details-of-almost-18000-organizations/
3. YouTubeÐéα°æÈ¨ÍþÐ²ÍÆ¹ã¶ñÒâÍÚ¿óÈí¼þ
3ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×ÓʹÓÃYouTubeƽ̨£¬£¬£¬£¬£¬£¬Í¨¹ý·¢ËÍÐéα°æÈ¨ÉùÃ÷£¬£¬£¬£¬£¬£¬Ç¿ÆÈ´´×÷ÕßÔÚÊÓÆµÖÐÐû´«¶ñÒâÈí¼þºÍ¼ÓÃÜÇ®±Ò¿ó¹¤¡£¡£¡£¡£ËûÃÇÃé×¼ÁËÐû²¼ÓйØWindowsÊý¾Ý°üת·¢£¨WPD£©¹¤¾ß½Ì³ÌµÄ´´×÷Õߣ¬£¬£¬£¬£¬£¬ÕâЩ¹¤¾ßÔÚ¶íÂÞ˹¹ãÊܽӴý£¬£¬£¬£¬£¬£¬ÒòÆäÄÜÈÆ¹ý»¥ÁªÍøÉó²é¡£¡£¡£¡£·¸·¨·Ö×Óð³ä¹¤¾ß°æÈ¨³ÖÓÐÕߣ¬£¬£¬£¬£¬£¬ÏòYouTubeÌá³öÊéȨͶËߣ¬£¬£¬£¬£¬£¬²¢Íþв´´×÷ÕßÈô²»ÏàÖú½«ÃæÁÙÆµµÀ·â½û¡£¡£¡£¡£Ðí¶à´´×÷ÕßÒòµ£ÐÄʧȥƵµÀ¶øÇü·þ£¬£¬£¬£¬£¬£¬Ìí¼ÓÁËÖ¸Ïò¶ñÒâGitHub´æ´¢¿âµÄÁ´½Ó£¬£¬£¬£¬£¬£¬ÕâЩÁ´½ÓÏÖʵÉϰüÀ¨¼ÓÃÜÇ®±ÒÍÚ¿óÈí¼þµÄľÂí°æ±¾¡£¡£¡£¡£¿£¿£¿£¿£¿£¿¨°Í˹»ù·¢Ã÷£¬£¬£¬£¬£¬£¬Ïà¹ØÊÓÆµµÄԢĿ¼ÊýÁè¼Ý40Íò´Î£¬£¬£¬£¬£¬£¬¶ñÒâÁ´½ÓÔÚ±»É¾³ýǰÒѱ»ÏÂÔØ4Íò´Î¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Ò»¸öÓµÓÐ34Íò¶©ÔÄÕßµÄTelegramƵµÀÒ²¼ÓÈëÁ˶ñÒâÈí¼þµÄÍÆ¹ã¡£¡£¡£¡£¾Ý¿¨°Í˹»ùÒ£²â£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÒÑÓ°Ïì¶íÂÞ˹2000¶àÃûÊܺ¦Õߣ¬£¬£¬£¬£¬£¬µ«ÏÖʵÊý×Ö¿ÉÄܸü¸ß¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýPython¼ÓÔØÆ÷Æô¶¯£¬£¬£¬£¬£¬£¬Õë¶Ô¶íÂÞ˹IPµØµãÖ´ÐУ¬£¬£¬£¬£¬£¬¾ßÓÐÌӱܷÀ²¡¶¾ÆÊÎöºÍ·´É³ºÐ¹¦Ð§£¬£¬£¬£¬£¬£¬×îÖÕÏÂÔØSilentCryptoMinerÍÚ¿ó»ú£¬£¬£¬£¬£¬£¬ÍÚ¾ò¶àÖÖ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¸ÃÍÚ¿ó»ú°´ÆÚ¸üÐÂÉèÖ㬣¬£¬£¬£¬£¬²¢Ê¹ÓÃÀú³ÌÍÚ¿ÕÊÖÒÕÌӱܼì²â¡£¡£¡£¡£Ö»¹ÜÏÖÔÚÖ÷ÒªÕë¶Ô¶íÂÞ˹Óû§£¬£¬£¬£¬£¬£¬µ«´ËÀ๥»÷Õ½ÂÔ¿ÉÄܱ»ÓÃÓÚ¸üÆÕ±éµÄ¹æÄ££¬£¬£¬£¬£¬£¬Èö²¥¸ß·çа¶ñÒâÈí¼þ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/youtubers-extorted-via-copyright-strikes-to-spread-malware/
4. ̨±±ÂíÙɼÍÄîÒ½ÔºÔâÍøÂç¹¥»÷ÖÂÐÅϢй¶²¢ÖÂǸ
3ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬Ì¨±±ÂíÙɼÍÄîÒ½Ôº¿ËÈվͱ¾Ô³õÔâÊÜÃûΪ¡°Crazy Hunter¡±µÄÀÕË÷Èí¼þ¹¥»÷µ¼ÖµÄÐÅϢй¶ÊÂÎñÏò¹«ÖÚÖÂǸ¡£¡£¡£¡£¾Ý±¨µÀ£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷µ¼Ö¸ÃÒ½Ôº500¶ą̀ÅÌËã»úÍ߽⣬£¬£¬£¬£¬£¬²¢Óиߴï32.5GBµÄÐÅÏ¢±»µÁ£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨À´×Ǫ̂Íå¸÷µØÂíÙÉ·ÖÔºµÄ1660ÍòÃû»¼ÕßµÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬£¬Ò»ÃûºÚ¿ÍÔÚÍøÂçÂÛ̳ÉÏÉù³ÆÓµÓд˴ι¥»÷µÄÊý¾Ý²¢ÔÚÍøÉϳöÊÛ¡£¡£¡£¡£Õë¶Ô´Ë´ÎÊÂÎñ£¬£¬£¬£¬£¬£¬Ò½ÔºÌåÏÖÒÑ×ñÕÕ½ôÆÈÐÒ飬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÎÀÉú²¿µÄÍøÂçÇ徲ƽ̨Ìá½»±¨¸æ¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬Ò½ÔºÒ²³ÎÇåÁËÏà¹ØÇéÐΣ¬£¬£¬£¬£¬£¬²¢½¨Ò鹫ÖÚÌá¸ßСÐÄ£¬£¬£¬£¬£¬£¬²»ÒªÌý´Óָʾ´Ó×Ô¶¯È¡¿î»úȡǮ»òÔÚ¿ÉÒɵ绰ÖÐÌṩСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£ÎªÌá·ÀÀàËÆÊÂÎñÔٴα¬·¢£¬£¬£¬£¬£¬£¬Ò½Ôº½«ÔöÇ¿ÍøÂçÇ徲ϵͳ£¬£¬£¬£¬£¬£¬²¢°´ÆÚ¾ÙÐÐϵͳ¼ì²é¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÎÀÉú¸£Àû²¿×ÊѶÖÎÀí˾˾³¤ÀÕÃÌåÏÖ£¬£¬£¬£¬£¬£¬ËäÈ»±»ÏúÊÛµÄ×ÊÁÏ¿´ËÆÒ½ÁÆ×ÊѶ£¬£¬£¬£¬£¬£¬¿ÉÊÇ·ñÀ´×ÔÂíÙÉÒ½ÔºÈÔÐèÈ·ÈÏ¡£¡£¡£¡£Ëûͬʱָ³ö£¬£¬£¬£¬£¬£¬Õû¯»ù¶½½ÌÒ½Ôº×î½üÒ²Ôâµ½ºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬¹¥»÷Õß»ñµÃÁËÖÎÀíԱȨÏÞ£¬£¬£¬£¬£¬£¬Òò´ËºôÓõ¸÷Ò½ÔºÔöÇ¿ÍøÂçÇå¾²²½·¥£¬£¬£¬£¬£¬£¬È·±£»£»£»£»£»¼ÕßÐÅÏ¢µÄÇå¾²¡£¡£¡£¡£
https://www.taiwannews.com.tw/news/6053546
5. Edimax IC-7100ÉãÏñ»úÑÏÖØÎó²îÔâ½©Ê¬ÍøÂç¹¥»÷ʹÓÃ
3ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬Ò»¸öÓ°ÏìEdimax IC-7100 IPÉãÏñ»úµÄÑÏÖØÏÂÁî×¢ÈëÎó²î£¨CVE-2025-1316£©ÕýÔÚ±»½©Ê¬ÍøÂç¶ñÒâÈí¼þʹÓ㬣¬£¬£¬£¬£¬µ¼ÖÂ×°±¸ÊÜË𡣡£¡£¡£¸ÃÎó²îÓÉAkamaiµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬²¢Òѱ¨¸æ¸øÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©¾Ö(CISA)£¬£¬£¬£¬£¬£¬µ«¹©Ó¦ÉÌEdimaxδ»ØÓ¦¡£¡£¡£¡£Edimax IC-7100ÊÇÒ»¿îÓÃÓÚÔ¶³Ì¼à¿ØµÄIPÇå¾²ÉãÏñ»ú£¬£¬£¬£¬£¬£¬ËäÈ»ÒÑÍ£²ú£¬£¬£¬£¬£¬£¬µ«ÈÔ¿ÉÄÜÔÚÈ«Çò¹æÄ£ÄÚʹÓᣡ£¡£¡£Ô¶³Ì¹¥»÷Õß¿ÉÒÔͨ¹ý·¢ËÍÌØÖÆÇëÇóÀ´»ñµÃÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬Ê¹ÓôËÎó²îÆÆËð×°±¸¡£¡£¡£¡£½©Ê¬ÍøÂçͨ³£Ê¹ÓÃÕâЩװ±¸ÌᳫÂþÑÜʽ¾Ü¾øÐ§ÀÍ(DDoS)¹¥»÷¡¢ÊðÀí¶ñÒâÁ÷Á¿»ò¹¥»÷Í³Ò»ÍøÂçÉÏµÄÆäËû×°±¸¡£¡£¡£¡£CISA½¨ÒéÓû§½«ÊÜÓ°Ïì×°±¸ÏÂÏß¡¢ÖÃÓÚ·À»ðǽºóÃæ¡¢ÓëÒªº¦ÓªÒµÍøÂç¸ôÀ룬£¬£¬£¬£¬£¬²¢ÔÚÐèҪʱʹÓÃ×îеÄVPN²úƷʵÏÖÇå¾²µÄÔ¶³Ì»á¼û¡£¡£¡£¡£ÎïÁªÍø×°±¸ÊÜËðµÄ³£¼û¼£Ïó°üÀ¨ÐÔÄÜϽµ¡¢¹ýÈÈ¡¢×°±¸ÉèÖÃÒâÍâת±äÒÔ¼°·Çµä·¶/Òì³£µÄÍøÂçÁ÷Á¿¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/unpatched-edimax-ip-camera-flaw-actively-exploited-in-botnet-attacks/
6. ³¬10ÒÚ×°±¸Ê¹ÓõÄSP32΢оƬ±»ÆØº¬Î´¼Í¼¡°ºóÃÅ¡±ÏÂÁî
3ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬ÀÖöÎ(Espressif)Éú²úµÄESP32΢оƬ£¬£¬£¬£¬£¬£¬×÷ΪȫÇòÎïÁªÍø×°±¸ÖÐÓÃÓÚWi-FiºÍÀ¶ÑÀÅþÁ¬µÄ×îÆÕ±éʹÓõÄоƬ֮һ£¬£¬£¬£¬£¬£¬Òѱ»Áè¼Ý10ÒŲ́װ±¸½ÓÄÉ¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬Î÷°àÑÀTarlogic SecurityµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬ESP32Öб£´æ29Ìõδ¼Í¼µÄÏÂÁ£¬£¬£¬£¬£¬ÕâЩÏÂÁî¿ÉÄܱ»ÓÃ×÷¡°ºóÃÅ¡±£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷Õß¾ÙÐÐð³ä¹¥»÷¡¢Î´¾ÊÚȨµÄÊý¾Ý»á¼û¡¢×ªÏòÍøÂçÉÏµÄÆäËû×°±¸£¬£¬£¬£¬£¬£¬²¢½¨Éèºã¾Ã³¤ÆÚÐÔ¡£¡£¡£¡£ÕâЩÏÂÁî°üÀ¨ÄÚ´æ²Ù×÷¡¢MACµØµãÓÕÆºÍLMP/LLCPÊý¾Ý°ü×¢ÈëµÈ¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚÂíµÂÀïµÄRootedCONÉÏչʾÁËËûÃǵÄÑо¿Ð§¹û£¬£¬£¬£¬£¬£¬²¢ÖÒÑԳƣ¬£¬£¬£¬£¬£¬ÓÉÓÚESP32µÄÆÕ±éÓ¦Ó㬣¬£¬£¬£¬£¬Î£º¦ºÜ´ó¡£¡£¡£¡£´ËÎÊÌâÏÖÔÚÒÑÔÚCVE-2025-27840ϾÙÐиú×Ù¡£¡£¡£¡£ÀÖöÎÉÐδ¹ûÕæ¼Í¼ÕâЩÏÂÁ£¬£¬£¬£¬£¬Òò´ËÕâЩÏÂÁî¿ÉÄÜÊDZ»¹ýʧµØÒÅ©»òÔÀ´¾ÍÎÞ·¨»á¼û¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬£¬£¬£¬ÕâЩÏÂÁî´øÀ´µÄΣº¦°üÀ¨OEM¼¶±ðµÄ¶ñÒâʵÑéºÍ¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬£¬ÓÈÆäÊǵ±¹¥»÷ÕßÒѾӵÓÐÎïÆÊÎö¼û×°±¸µÄUSB»òUART½Ó¿Úʱ¡£¡£¡£¡£ÈôÊǹ¥»÷ÕßÄܹ»Ê¹ÓÃÕâЩÏÂÁ£¬£¬£¬£¬£¬ËûÃǽ«Äܹ»ÍêÈ«¿ØÖÆESP32оƬ£¬£¬£¬£¬£¬£¬²¢Í¨¹ýÔÊÐíRAMºÍFlashÐ޸ĵÄÏÂÁî»ñµÃоƬµÄ³¤ÆÚÐÔ£¬£¬£¬£¬£¬£¬´Ó¶ø¶ÔÆäËû×°±¸Ö´ÐÐÀ¶ÑÀ»òWi-Fi¹¥»÷¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/


¾©¹«Íø°²±¸11010802024551ºÅ