ºÚ¿Í¿ÉÒÔ»á¼ûÁè¼Ý120Íǫ̀ҽÁÆ×°±¸µÄÃô¸ÐÊý¾Ý
Ðû²¼Ê±¼ä 2025-08-111. ºÚ¿Í¿ÉÒÔ»á¼ûÁè¼Ý120Íǫ̀ҽÁÆ×°±¸µÄÃô¸ÐÊý¾Ý
8ÔÂ7ÈÕ£¬£¬£¬Å·ÖÞÍøÂçÇå¾²¹«Ë¾Modat½üÆÚÑо¿Õ¹ÏÖ£¬£¬£¬È«Çò¹æÄ£ÄÚÁè¼Ý120Íǫ̀ÉèÖùýʧµÄÁªÍøÒ½ÁÆ×°±¸¼°ÏµÍ³ÒòÇå¾²Îó²î̻¶ÓÚ»¥ÁªÍø£¬£¬£¬ÎªºÚ¿ÍÇÔÈ¡»¼ÕßÃô¸ÐÊý¾ÝÉõÖÁ¸Ä¶¯Ò½ÁƼͼÌṩÁ˿ɳËÖ®»ú¡£¡£¡£¡£¡£¡£ÕâЩÒ×Êܹ¥»÷×°±¸º¸Ç70ÓàÖÖÀàÐÍ£¬£¬£¬°üÀ¨MRI¡¢CT¡¢X¹â»ú¡¢DICOMÉó²éÆ÷¡¢ÑªÒº¼ì²âϵͳ¼°Ò½ÔºÖÎÀíϵͳµÈÒªº¦Ò½ÁÆÉèÊ©¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿Éͨ¹ýÍøÂçÖ±½Ó»á¼û»¼ÕßµÄÉñÃØÒ½Ñ§Ó°Ïñ¡¢ÑªÒº¼ì²âЧ¹û¼°ÉúÎïÌØÕ÷Êý¾Ý£¬£¬£¬²¿·ÖϵͳÉõÖÁÔÊÐíÐÞ¸ÄÀúÊ·¼Í¼£¬£¬£¬¿ÉÄܵ¼ÖÂÕï¶ÏЧ¹û±»¶ñÒâ¸Ä¶¯¡£¡£¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬ÃÀ¹ú£¨17.4Íǫ̀£©¡¢ÄÏ·Ç£¨17.2Íǫ̀£©ºÍ°Ä´óÀûÑÇ£¨11.1Íǫ̀£©ÊÇ̻¶װ±¸×î¶àµÄ¹ú¼Ò£¬£¬£¬°ÍÎ÷¡¢µÂ¹ú¡¢Ó¢¹úµÈÁù¹ú×°±¸ÊýĿҲÁè¼Ý7Íǫ̀£¬£¬£¬ÈÕ±¾¼°ÆäËûµØÇøÔòÓÐÊýÍǫ̀װ±¸´¦ÓÚΣº¦×´Ì¬¡£¡£¡£¡£¡£¡£Îó²î³ÉÒòÖ÷Òª°üÀ¨×°±¸Î´ÉèÖÃÉí·ÝÑéÖ¤¡¢Ê¹Óóö³§Ä¬ÈÏÃÜÂë»òÈõÃÜÂ룬£¬£¬ÒÔ¼°ÔËÐÐδÐÞ²¹µÄ¹ýʱÈí¼þ¡£¡£¡£¡£¡£¡£²¿·Ö×°±¸ÉõÖÁÊôÓÚÒÑ×èÖ¹Ö§³ÖµÄÒÅÁôϵͳ£¬£¬£¬ºã¾Ãȱ·¦Çå¾²¸üС£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Í¨¹ýModat Magnifyƽ̨ɨÃ貢ʶ±ð³öÕâЩװ±¸£¬£¬£¬½ØÍ¼Ö¤¾ÝÏÔʾ£¬£¬£¬¹¥»÷Õ߿ɻñÈ¡»¼ÕßÉúÃüÌåÕ÷¡¢ÄÔ²¿¼°Ðز¿É¨ÃèͼÏñµÈ¸ßÃô¸ÐÐÅÏ¢£¬£¬£¬²¿·Öϵͳ¼Í¼ÉõÖÁ×·ËÝÖÁ¶àÄêǰ¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/million-medical-devices-exposed-to-hackers/
2. ÐÂÐÍEDRɱÊÖ¹¤¾ß±»°Ë´óÀÕË÷ÍÅ»ï½ÓÄÉ
8ÔÂ7ÈÕ£¬£¬£¬¾ÝSophosÇå¾²ÍŶÓÑо¿£¬£¬£¬Ò»ÖÖ±»ÊÓΪRansomHub¿ª·¢µÄ"EDRKillShifter"ÑÝ±ä°æµÄÐÂÐÍEDRɱÊÖ¹¤¾ß£¬£¬£¬ÒÑÔڰ˸ö²î±ðÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷Öб»·¢Ã÷£¬£¬£¬Éæ¼°RansomHub¡¢Blacksuit¡¢Medusa¡¢Qilin¡¢Dragonforce¡¢Crytox¡¢LynxºÍINC×éÖ¯¡£¡£¡£¡£¡£¡£¸Ã¹¤¾ßµÄ½¹µã¹¦Ð§ÊÇ×ÊÖú¹¥»÷Õ߹رձ»¹¥ÆÆÏµÍ³ÉϵÄÇå¾²²úÆ·£¬£¬£¬Îª°²ÅÅÀÕË÷Èí¼þÓÐÓÃÔØºÉ¡¢ÌáÉýȨÏÞ¡¢ºáÏòÒÆ¶¯¼°Òþ²Ø¼ÓÃÜ×°±¸´´Á¢Ìõ¼þ¡£¡£¡£¡£¡£¡£ÊÖÒÕ²ãÃæ£¬£¬£¬¸Ã¹¤¾ß½ÓÄɸ߶ȻìÏýµÄ¶þ½øÖÆÎļþ£¬£¬£¬ÔËÐÐʱ×ÔÎÒ½âÂë²¢×¢ÈëÕýµ±Ó¦ÓóÌÐòÖС£¡£¡£¡£¡£¡£ÆäÒªº¦»úÖÆÊÇËÑË÷Ó²±àÂëÔÚ¿ÉÖ´ÐÐÎļþÖеÄËæ»úÎå¸ö×Ö·ûÃû³ÆµÄÊý×ÖÊðÃûÇý¶¯³ÌÐò£¬£¬£¬Ò»µ©·¢Ã÷±ã¼ÓÔØ¶ñÒâÄÚºËÇý¶¯£¬£¬£¬Í¨¹ý"×Ô´øÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐò"£¨BYOVD£©¹¥»÷»ñÈ¡ÄÚºËȨÏÞ£¬£¬£¬½ø¶øÖÕÖ¹ÓëAV/EDRÏà¹ØµÄÀú³Ì¼°Ð§ÀÍ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬¸ÃÇý¶¯³£Î±×°³ÉÕýµ±Îļþ£¬£¬£¬µ«¼¤»îºó»áÖ±½ÓĨɱĿµÄÇå¾²¹¤¾ß¡£¡£¡£¡£¡£¡£ÆäÁýÕֵij§É̹æÄ£ÆÕ±é£¬£¬£¬°üÀ¨Sophos¡¢Microsoft Defender¡¢¿¨°Í˹»ù¡¢ÈüÃÅÌú¿Ë¡¢Ç÷ÊÆ¿Æ¼¼¡¢SentinelOne¡¢Cylance¡¢McAfee¡¢F-Secure¡¢HitmanProºÍWebrootµÈÖ÷Á÷Çå¾²²úÆ·¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-edr-killer-tool-used-by-eight-different-ransomware-groups/
3. È«Çò×î´ó²»·¨IPTVƽ̨Rare Breed TVÔâACEÈ¡µÞ
8ÔÂ7ÈÕ£¬£¬£¬´´ÒâÓëÓéÀÖͬÃË£¨ACE£©¿ËÈÕÐû²¼ÀֳɹرÕÈ«Çò×î´ó²»·¨IPTVЧÀÍÌṩÉÌRare Breed TV£¬£¬£¬²¢ÓëÆäÔËÓªÉ̸濢²ÆÎñÏ¢ÕùÐÒé¡£¡£¡£¡£¡£¡£×ܲ¿Î»ÓÚ±±¿¨ÂÞÀ´ÄÉÖݵÄRare Breed TVÊÇÊý×ÖµÁ°æÁìÓòµÄ¾ÞÍ·£¬£¬£¬Éù³ÆÓµÓÐÁè¼Ý28,000¸öÖ±²¥ÆµµÀ¼°100,000²¿Ó°Ï·ºÍµçÊÓ¾çµÄ²»·¨×ÊÔ´¿â£¬£¬£¬ÆäÊÓÆµµã²¥Æ½Ì¨¸ü°üÀ¨14,000¸öδ¾ÊÚȨµÄ½ÚÄ¿£¬£¬£¬ºã¾Ãͨ¹ýÿÔÂ15.99ÃÀÔªÖÁÕûÄê79.99ÃÀÔªµÄ¶©ÔÄģʽIJÀû¡£¡£¡£¡£¡£¡£ACE×÷ΪÓÉÈ«Çò50Óà¼ÒÓ°ÊÓÓéÀÖ¾ÞÍ·×é³ÉµÄ·´µÁ°æÍ¬ÃË£¬£¬£¬ÆäÖÎÀíίԱ»áº¸ÇÑÇÂíÑ·¡¢µÏÊ¿Äá¡¢Netflix¡¢»ªÄÉÐֵܵȶ¥¼¶¹«Ë¾¡£¡£¡£¡£¡£¡£´Ë´ÎÐж¯ÖУ¬£¬£¬ACEͨ¹ýÖ´·¨Í¾¾¶Ëø¶¨Rare Breed TV±³ºóµÄʹÓÃÕߣ¬£¬£¬ÆÈʹÆäÓÀÊÀ¹Ø±Õ²»·¨Æ½Ì¨²¢Ö§¸¶¾Þ¶îÅâ³¥½ð¡£¡£¡£¡£¡£¡£Ö»¹ÜÔÚÉùÃ÷Ðû²¼Ê±£¬£¬£¬Rare Breed TVÍøÕ¾ÈÔÔÝʱÔÚÏߣ¬£¬£¬µ«ACEÇ¿µ÷ÔËÓªÉÌÒÑÔÊÐí×èÖ¹ÇÖȨÐÐΪ£¬£¬£¬²¢½«ÅäºÏºóÐøÊӲ졣¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/technology/massive-illegal-iptv-service-provider-rare-breed-tv-taken-offline/
4. ¸çÂ×±ÈÑÇ´óѧÔâÓö´ó¹æÄ£Êý¾Ýй¶£¬£¬£¬½ü87ÍòÈËÃô¸ÐÐÅÏ¢ÔâÇÔ
8ÔÂ8ÈÕ£¬£¬£¬ÃÀ¹ú¸çÂ×±ÈÑÇ´óѧ¿ËÈÕÅû¶һÆðÖØ´óÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬Ô¼868,969ÃûÏÖÈμ°Ç°ÈÎѧÉú¡¢Ô±¹¤¡¢ÉêÇëÈ˼°¾ìÊôµÄСÎÒ˽¼ÒÐÅÏ¢ÔÚ2025Äê5ÔÂ16ÈÕµÄÍøÂç¹¥»÷Öб»µÁ¡£¡£¡£¡£¡£¡£×÷Ϊ³£´ºÌÙÃËУ֮һ£¬£¬£¬¸ÃУӵÓÐ35,000ÓàÃûѧÉúºÍ20,000ÃûÔ±¹¤£¬£¬£¬2024ÄêÔ¤Ëã´ï66ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£ÊÂÎñÔ´ÓÚ6ÔÂ24ÈÕ²¿·ÖϵͳÒì³£ÖÐÖ¹£¬£¬£¬¾Íâ²¿ÍøÂçÇ徲ר¼ÒÐÖúÊÓ²ìºó£¬£¬£¬Ñ§Ð£È·ÈÏδ¾ÊÚȨµÄµÚÈý·½»á¼ûÁËÆäÍøÂç²¢ÇÔÈ¡Îļþ¡£¡£¡£¡£¡£¡£Ö»¹ÜºÚ¿ÍÔøÐû³Æ»ñÈ¡460GBÊý¾Ý£¬£¬£¬µ«Ð£·½ÉùÃ÷δ֤ʵÏêϸÊý¾ÝÁ¿£¬£¬£¬½öÃ÷ȷй¶ÐÅÏ¢º¸ÇÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢ÁªÏµ·½·¨¡¢Ñ§ÊõÀúÊ·¡¢²ÆÎñÔ®Öú¼Í¼¡¢°ü¹ÜÐÅÏ¢¼°¿µ½¡Êý¾ÝµÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£¡£ÖµµÃÇìÐÒµÄÊÇ£¬£¬£¬Á¥ÊôµÄÅ·ÎÄҽѧÖÐÐÄ»¼Õ߼ͼδÊܲ¨¼°¡£¡£¡£¡£¡£¡£¸çÂ×±ÈÑÇ´óѧÒÑÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»Õýʽ֪ͨ£¬£¬£¬²¢Í¨¹ýÃÀ¹úÓÊÕþЧÀÍ֪ͨÊÜÓ°Ïì¸öÌå¡£¡£¡£¡£¡£¡£Îª½µµÍΣº¦£¬£¬£¬¸ÃУ½«Í¨¹ýKroll¹«Ë¾ÌṩΪÆÚÁ½ÄêµÄÃâ·ÑÐÅÓÃ¼à¿Ø¡¢Ú²Æ×Éѯ¼°Éí·Ý͵ÇÔ»Ö¸´Ð§ÀÍ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/columbia-university-data-breach-impacts-nearly-870-000-students-applicants-employees/
5. RubyGems¹©Ó¦Á´Ôâ¶ñÒâÈí¼þ¹¥»÷£º60¸öÇÔÃÜ×é¼þÏÂÔØ³¬27.5Íò´Î
8ÔÂ9ÈÕ£¬£¬£¬×Ô2023Äê3ÔÂÆð£¬£¬£¬Ò»³¡Õë¶ÔRuby¿ª·¢ÕߵĴó¹æÄ£¹©Ó¦Á´¹¥»÷ÔÚRubyGemsƽ̨һÁ¬·¢½Í¡£¡£¡£¡£¡£¡£Çå¾²»ú¹¹SocketÅû¶£¬£¬£¬60¸öαװ³ÉÕýµ±¹¤¾ßµÄ¶ñÒâRuby×é¼þ£¨gem£©±»ÏÂÔØÁè¼Ý27.5Íò´Î£¬£¬£¬Æäͨ¹ýÇÔÈ¡¿ª·¢ÕßÕË»§Æ¾Ö¤ÊµÑéÍøÂç´¹ÂÚ£¬£¬£¬³ÉΪ½üÄêÀ´×îÑÏÖØµÄ¿ªÔ´Éú̬Çå¾²ÊÂÎñÖ®Ò»¡£¡£¡£¡£¡£¡£ÕâЩ¶ñÒâ×é¼þÓɶà¸ö¹ØÁªÕË»§£¨Èçzon¡¢nowonµÈ£©ÒÔÓÖÃûÐÎʽÐû²¼£¬£¬£¬Ä£ÄâWordPress¡¢Telegram¡¢NaverµÈÖ÷Á÷ƽ̨µÄ×Ô¶¯»¯¹¤¾ßÃüÃû£¨Èçwp_posting_duo¡¢tg_send_zonµÈ£©£¬£¬£¬²¢Å䱸ÐéαͼÐνçÃæ£¨GUI£©ÓÕµ¼Óû§ÊäÈëÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÓ²±àÂëµÄC2ЧÀÍÆ÷ÇÔÈ¡Ã÷ÎÄÓû§ÃûÃÜÂë¡¢×°±¸MACµØµã¼°Èí¼þ°üʹÓÃÊý¾Ý£¬£¬£¬²¿·Ö×é¼þÉõÖÁαÔìAPIÏìÓ¦ÓÕÆÓû§¡£¡£¡£¡£¡£¡£SocketÔÚ¶íÓï°µÍøÊг¡·¢Ã÷À´×Ômarketingduo.co.krµÄ±»µÁƾ֤ÈÕÖ¾£¬£¬£¬Ö¤Êµ¹¥»÷ÕßÒѽ«Êý¾ÝÓÃÓÚ²»·¨ÉúÒâ¡£¡£¡£¡£¡£¡£RubyGems×÷ΪRubyÓïÑԵĹٷ½°ü¹ÜÀíÆ÷£¬£¬£¬ÆäÉú̬Çå¾²ÐÔÔÚ´Ë´ÎÊÂÎñÖÐÌ»Â¶ÖØ´óÒþ»¼¡£¡£¡£¡£¡£¡£Ö»¹ÜSocketÒÑÏò¹Ù·½ÍŶӾٱ¨ËùÓÐ60¸ö¶ñÒâ×é¼þ£¬£¬£¬µ«×èÖ¹±¨¸æÐû²¼Ê±ÈÔÓÐ16¸öδ±»Ï¼ܡ£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/60-malicious-ruby-gems-downloaded-275-000-times-steal-credentials/
6. WinRARÁãÈÕÎó²îÔâ¶íÂÞ˹ºÚ¿Í×é֯ʹÓÃ
8ÔÂ8ÈÕ£¬£¬£¬½üÆÚ£¬£¬£¬Ò»¸ö±àºÅΪCVE-2025-8088µÄWinRARĿ¼±éÀúÎó²î±»ÆØ¹â£¬£¬£¬¸ÃÎó²îÒѱ»¹¥»÷ÕßʹÓÃΪÁãÈÕÎó²îÌá³«ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬ÓÃÓÚÈö²¥Óë¶íÂÞ˹¹ØÁªµÄRomCom¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¾ÝÇå¾²³§ÉÌESETÅû¶£¬£¬£¬¸ÃÎó²î±£´æÓÚWinRAR 7.13°æ±¾Ö®Ç°µÄËùÓÐWindowsƽ̨²úÆ·ÖУ¬£¬£¬°üÀ¨RAR¡¢UnRAR½âѹ¹¤¾ß¼°UnRAR.dll¿â£¬£¬£¬¶øLinux/UnixºÍAndroid°æ±¾²»ÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£Îó²îµÄ½¹µã»úÖÆÔÚÓÚ£¬£¬£¬¹¥»÷Õß¿Éͨ¹ý½á¹¹¶ñÒâRARѹËõ°ü£¬£¬£¬ÈƹýWinRARĬÈϵĽâѹ·¾¶ÏÞÖÆ£¬£¬£¬½«ÎļþÖ±½ÓÌáÈ¡ÖÁWindowsϵͳµÄ×Ô¶¯ÔËÐÐĿ¼¡£¡£¡£¡£¡£¡£µ±Êܺ¦ÕßÏ´εǼϵͳʱ£¬£¬£¬ÕâЩ±»Ö²ÈëµÄ¿ÉÖ´ÐÐÎļþ½«×Ô¶¯ÔËÐУ¬£¬£¬´Ó¶øÊµÏÖÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£¡£¡£¡£¡£¡£ESETÑо¿Ö°Ô±Peter Stry?ekÖ¸³ö£¬£¬£¬ÏÖÔÚ¸ÃÎó²îÒѱ»ÓÃÓÚÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬Í¨¹ý°üÀ¨¶ñÒâRARÎļþµÄÓʼþ¸½¼þÈö²¥RomComºóÃųÌÐò¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬WinRAR¹Ù·½ÒÑÔÚ7.13°æ±¾ÖÐÐÞ¸´´ËÎó²î£¬£¬£¬µ«ÒòÆäȱ·¦×Ô¶¯¸üлúÖÆ£¬£¬£¬Óû§ÐèÊÖ¶¯´Ó¹ÙÍøÏÂÔØ×îÐÂ×°Öðü¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/winrar-zero-day-flaw-exploited-by-romcom-hackers-in-phishing-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ