ºÚ¿ÍÕýÔÚʹÓÃWing FTP ServerµÄÑÏÖØRCEÎó²î
Ðû²¼Ê±¼ä 2025-07-141. ºÚ¿ÍÕýÔÚʹÓÃWing FTP ServerµÄÑÏÖØRCEÎó²î
7ÔÂ13ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²ÁìÓòÆØ³öÕë¶ÔWing FTP ServerµÄÑÏÖØÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-47812£©£¬£¬£¬£¬¸ÃÎó²îÒòCVSS 10·ÖµÄ×î¸ßΣÆÀ¼¶Òý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£¡£¡£¡£×÷Ϊ֧³Ö¶àÐÒ飨FTP/FTPS/SFTP/HTTP/S£©µÄ¿çƽ̨Îļþ´«Êä½â¾ö¼Æ»®£¬£¬£¬£¬Wing FTP ServerĬÈÏÒÔroot£¨Linux£©»òSYSTEM£¨Windows£©È¨ÏÞÔËÐУ¬£¬£¬£¬ÇÒȱ·¦È¨ÏÞ¸ôÀë»úÖÆ£¬£¬£¬£¬µ¼ÖÂÎó²î±»Ê¹ÓÃʱ¿ÉÖ±½ÓÔì³ÉЧÀÍÆ÷Íêȫʧ¿Ø¡£¡£¡£¡£Îó²îȪԴÔÚÓÚÈí¼þ¶Ô¿Õ×ֽڵĴ¦Öóͷ£È±ÏÝ¡£¡£¡£¡£MITREÇ徲ͨ¸æÖ¸³ö£¬£¬£¬£¬7.4.4°æ±¾Ç°µÄ²úƷδ¶ÔÓû§ºÍÖÎÀíÔ±Web½çÃæÖеĻỰÎļþ¾ÙÐгä·ÖÑéÖ¤£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ý×¢Èëº¬ÌØÊâ×Ö·ûµÄÓû§Ãû£¬£¬£¬£¬½«¶ñÒâLua´úÂëÖ²Èë»á»°Îļþ¡£¡£¡£¡£µ±Êܺ¦Õß»á¼ûÌØ¶¨Ò³Ãæ»òÖ´ÐÐĿ¼²Ù×÷ʱ£¬£¬£¬£¬¶ñÒâ´úÂë±ã»áÒÔϵͳ×î¸ßȨÏÞ´¥·¢£¬£¬£¬£¬ÐγÉÎÞÐèÎïÀí½Ó´¥µÄÔ¶³Ì´úÂëÖ´ÐÐÁ´¡£¡£¡£¡£ÓÈΪΣÏÕµÄÊÇ£¬£¬£¬£¬×ÝÈ»ÆôÓÃĬÈϽûÓõÄÄäÃûFTPÕË»§£¬£¬£¬£¬¹¥»÷ÕßÈÔ¿ÉÈÆ¹ý×Ö·û´®´¦Öóͷ£»úÖÆÊµÑé¹¥»÷£¬£¬£¬£¬ÊµÏÖ´ÓͨË×Óû§È¨ÏÞµ½ÏµÍ³ÖÎÀíԱȨÏÞµÄ×ÝÏòÌáȨ¡£¡£¡£¡£¸ÃÎó²îÊÖÒÕϸ½ÚÓÚ6ÔÂ30ÈÕ¹ûÕæºó£¬£¬£¬£¬7ÔÂ1ÈÕ¼´·ºÆðÕæÊµ¹¥»÷°¸Àý¡£¡£¡£¡£
https://securityaffairs.com/179861/hacking/wing-ftp-server-flaw-actively-exploited-shortly-after-technical-details-were-made-public.html
2. Google Gemini Îó²î¿ÉÐ®ÖÆµç×ÓÓʼþÕªÒª¾ÙÐÐÍøÂç´¹ÂÚ
7ÔÂ13ÈÕ£¬£¬£¬£¬Çå¾²Ñо¿Ö°Ô±Åû¶Google Gemini for Workspace±£´æÐÂÐÍÍøÂç´¹ÂÚÎó²î£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÒþ²ØÔÚµç×ÓÓʼþÕýÎÄÖеĶñÒâÖ¸Á£¬£¬£¬ÓÕʹAI¹¤¾ßÌìÉú¿´ËÆÕýµ±µÄ´¹ÂÚÄÚÈÝ¡£¡£¡£¡£¸ÃÎó²îʹÓÃGeminiµÄÕªÒªÉúÀÖ³ÉÄÜ£¬£¬£¬£¬Í¨¹ýÊÖÒÕÊÖ¶ÎÈÆ¹ý¹Å°åÇå¾²¼ì²â£¬£¬£¬£¬³ÉΪ¼Ì2024ÄêÌáÐÑ×¢Èë¹¥»÷ºó£¬£¬£¬£¬Õë¶ÔÌìÉúʽAIµÄÓÖÒ»ÖØ´óÇå¾²ÌôÕ½¡£¡£¡£¡£¾ÝMozilla GenAIÎó²îÉͽðÍýÏëÑо¿Ô±Marco FigueroaÅû¶£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýHTML/CSSÊÖÒÕ½«¶ñÒâÖ¸ÁîǶÈëÓʼþÕýÎÄ£¬£¬£¬£¬Í¨¹ýÉèÖÃ×ÖÌå¾ÞϸΪ0¡¢ÑÕɫΪ°×É«£¬£¬£¬£¬Ê¹Ö¸ÁîÔÚGmail¿Í»§¶ËÖÐÍêÈ«²»¿É¼û¡£¡£¡£¡£µ±Óû§ÇëÇóGeminiÌìÉúÓʼþժҪʱ£¬£¬£¬£¬AI»áÆÊÎö²¢Ö´ÐÐÕâЩÒþ²ØÖ¸Á£¬£¬£¬ÌìÉú°üÀ¨ÐéαÇå¾²ÖÒÑÔ¡¢´¹ÂÚÁ´½Ó»òÖ§³Öµç»°ºÅÂëµÄÄÚÈÝ¡£¡£¡£¡£ÀýÈ磬£¬£¬£¬ÔÚFigueroaÌṩµÄ°¸ÀýÖУ¬£¬£¬£¬GeminiÌìÉúÁË"ÄúµÄGmailÃÜÂëÒÑй¶£¬£¬£¬£¬ÇëÁ¬Ã¦²¦´òÖ§³Öµç»°´¦Öóͷ£"µÄÐéα¾¯±¨£¬£¬£¬£¬´ËÀàÐÅÏ¢¼«Ò×±»Óû§ÎóÒÔΪÊÇGoogle¹Ù·½Í¨Öª¡£¡£¡£¡£¸Ã¹¥»÷µÄÒþ²ØÐÔÌåÏÖÔÚÈý¸ö·½Ã棺ÎÞÐ踽¼þ»òÁ´½Ó¼´¿É´¥·¢¡¢Ê¹ÓÃÓû§¶ÔAIÕªÒªµÄÐÅÈΡ¢Í¨¹ýÊÓ¾õÒþ²Ø¹æ±ÜÓʼþÄÚÈÝɸ²é¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/google-gemini-flaw-hijacks-email-summaries-for-phishing/
3. Gravity FormsÔ⹩ӦÁ´¹¥»÷£¬£¬£¬£¬¹Ù·½ÇþµÀÏÂÔØÎļþ±»Ö²ÈëºóÃÅ
7ÔÂ11ÈÕ£¬£¬£¬£¬È«ÇòÔ¼°ÙÍò¸öÍøÕ¾Ê¹ÓõÄWordPress¸ß¼¶±íµ¥²å¼þGravity FormsÔâÓöÑÏÖØ¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬Æä¹Ù·½ÍøÕ¾ÌṩµÄÊÖ¶¯×°Öðü±»Ö²Èë¶ñÒâºóÃÅ£¬£¬£¬£¬µ¼Ö²¿·ÖÏÂÔØ°æ±¾±£´æÔ¶³Ì´úÂëÖ´ÐÐΣº¦¡£¡£¡£¡£¾ÝÇå¾²¹«Ë¾PatchStackÅû¶£¬£¬£¬£¬¹¥»÷Õßͨ¹ý¸Ä¶¯²å¼þ½¹µãÎļþcommon.php£¬£¬£¬£¬ÔÚ7ÔÂ10ÈÕÖÁ11ÈÕʱ´úÏò»á¼ûgravityapi.orgÓòÃûµÄЧÀÍÆ÷·¢ËÍÕ¾µãÔªÊý¾Ý£¨°üÀ¨URL¡¢ÖÎÀí·¾¶¡¢Ö÷Ìâ²å¼þ°æ±¾µÈÃô¸ÐÐÅÏ¢£©£¬£¬£¬£¬²¢ÎüÊÕbase64±àÂëµÄ¶ñÒâÔØºÉ£¬£¬£¬£¬×îÖÕÔÚÍøÕ¾Ä¿Â¼ÌìÉúαװ³ÉWordPressϵͳÎļþµÄ"bookmark-canonical.php"£¬£¬£¬£¬ÊµÏÖÎÞÐèÉí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£´Ë´ÎÊÂÎñÓ°Ïì¹æÄ£ÆÕ±é£¬£¬£¬£¬Éæ¼°Gravity Forms 2.9.11.1ºÍ2.9.12°æ±¾µÄÊÖ¶¯ÏÂÔØ¼°Composer×°Ö÷½·¨¡£¡£¡£¡£¹¥»÷ÕßʹÓøúóÃŲ»µ«ÇÔÈ¡Êý¾Ý£¬£¬£¬£¬¸üÖ±½ÓÔÚÊÜÑ¬È¾ÍøÕ¾Ìí¼ÓÖÎÀíÔ±ÕË»§£¬£¬£¬£¬ÍêÈ«¿ØÖÆÄ¿µÄϵͳ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬Í¨¹ýGravity Forms¹Ù·½APIЧÀ;ÙÐеÄ×Ô¶¯¸üк͸½¼Ó×é¼þ×°ÖÃδÊÜÓ°Ï죬£¬£¬£¬µ«ÊÖ¶¯ÏÂÔØÇþµÀ³ÉΪ¹¥»÷Èë¿Ú¡£¡£¡£¡£¿£¿£¿£¿£¿£¿£¿ª·¢³§ÉÌRocketGeniusÔÚʺ󱨸æÖÐÈ·ÈÏ£¬£¬£¬£¬¶ñÒâ´úÂë»á×è¶ÏÕý³£¸üÐÂÁ÷³Ì²¢Ò»Á¬ÅþÁ¬ÍⲿЧÀÍÆ÷£¬£¬£¬£¬½¨ÒéËùÓнüÆÚͨ¹ýÊÖ¶¯·½·¨×°Öûò¸üвå¼þµÄÓû§Á¬Ã¦ÖØÐÂ×°Öùٷ½Çå½à°æ±¾£¬£¬£¬£¬²¢¼ì²éÍøÕ¾ÊÇ·ñ±£´æÒì³£ÖÎÀíÔ±ÕË»§¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/wordpress-gravity-forms-developer-hacked-to-push-backdoored-plugins/
4. ÃÀ¹ú°¢À°ÍÂíÖݼӵǴú¶ûÊÐÔâINC RansomÀÕË÷¹¥»÷
7ÔÂ11ÈÕ£¬£¬£¬£¬ÃÀ¹ú°¢À°ÍÂíÖݼӵǴú¶ûÊÐÕþ¸®¿ËÈÕÏÝÈëÊý¾ÝÇ徲Σ»£»£»£»£»£»£»ú£¬£¬£¬£¬ÆäÃô¸ÐÐÅÏ¢±»ÆØ·ºÆðÔÚ°µÍøÂÛ̳ÉÏ¡£¡£¡£¡£×ÅÃûÀÕË÷×éÖ¯INC RansomÐû³ÆÒÑÇÔÈ¡¸ÃÊÐÔ¼50GBÊý¾Ý£¬£¬£¬£¬°üÀ¨ÊÐÕþÌõÔ¼¡¢²ÆÎñ¼Í¼¡¢¿Í»§ÐÅÏ¢¡¢ÈËÁ¦×ÊÔ´µµ°¸¼°Ê¹ʱ¨¸æµÈÉñÃØ×ÊÁÏ£¬£¬£¬£¬²¢½«ÆäÁÐÈëйÃÜÍøÕ¾ÒÔʩѹ֧¸¶Êê½ð¡£¡£¡£¡£Ö»¹Ü¹¥»÷ÕßÉÐδÌṩÊý¾ÝÑù±¾»ò½ØÍ¼ÑéÖ¤ÕæÊµÐÔ£¬£¬£¬£¬µ«´Ë´ÎÊÂÎñÒÑÒý·¢¶ÔÊÐÃñÉí·ÝµÁÓÃΣº¦¼°ÊÐÕþϵͳÇå¾²ÐԵĵ£ÐÄ¡£¡£¡£¡£¼ÓµÇ´ú¶ûÊÐ×÷Ϊ²®Ã÷º²±±²¿½¼Çø¡¢Éú³Ý³¬1.6ÍòµÄ³ÇÕò£¬£¬£¬£¬ÈôÊý¾Ýй¶Êôʵ£¬£¬£¬£¬¿ÉÄܳÉÎªÍøÂç·¸·¨·Ö×Ó½øÒ»²½ÉøÍ¸Õþ¸®ÍøÂçµÄÒªº¦Ìø°å¡£¡£¡£¡£INC Ransom×éÖ¯×Ô2023Äê7Ô»îÔ¾ÒÔÀ´£¬£¬£¬£¬ÒÑÐγÉ"¶àÖØÀÕË÷"ģʽ£¬£¬£¬£¬²»µ«¼ÓÃÜÊý¾Ý£¬£¬£¬£¬¸üÒÔ¹ûÕæÐ¹Â¶ÎªÍþв£¬£¬£¬£¬ÆÈʹÊܺ¦Õ߾ͷ¶¡£¡£¡£¡£¾Ý°µÍø¼à¿Ø¹¤¾ßRansomlookerͳ¼Æ£¬£¬£¬£¬¸ÃÍÅ»ïÒÑÍùÒ»ÄêÄÚ¹¥»÷ÖÁÉÙ176¼Ò»ú¹¹£¬£¬£¬£¬Êܺ¦Õ߱鲼ҽÁÆ¡¢½ÌÓý¡¢Õþ¸®¼°ÆóÒµÁìÓò¡£¡£¡£¡£
https://cybernews.com/security/gardendale-alabama-ransomware-attack/
5. ÷è÷ëÀÕË÷Èí¼þÇ¿ÊÆáÈÆð£¬£¬£¬£¬Ê¹ÓÃFortinetÎó²îÖÂ81¼Ò»ú¹¹Êܹ¥»÷
7ÔÂ12ÈÕ£¬£¬£¬£¬¿ËÈÕÀÕË÷Èí¼þÁìÓòÓÀ´ÖØ´ó±ä¾Ö£¬£¬£¬£¬÷è÷루Qilin£©×éÖ¯ÒÀ¸½47.3%µÄ»îÔ¾¶È¼¤Ôö£¬£¬£¬£¬ÒÔ81ÆðÐÂÔö°¸¼þÓâÔ½¹Å°å¾¢Â㬣¬£¬£¬³ÉΪȫÇò×î»îÔ¾µÄÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©ÍŻ¡£¡£¡£¸Ã×éÖ¯×Ô½µÉúÒÔÀ´ÒÑÀۼƹ¥»÷³¬310¸öÄ¿µÄ£¬£¬£¬£¬ÆäÊÖÒÕÑݽøÓëÕ½ÂÔתÐÍÕýÖØËÜÍøÂçÇå¾²ÍþвÃûÌᣡ£¡£¡£÷è÷ëµÄ¿ìËÙÀ©ÕÅÔ´ÓÚ¶ÔÒªº¦»ù´¡ÉèÊ©Îó²îµÄϵͳÐÔʹÓᣡ£¡£¡£2025Äê5-6Ô¼䣬£¬£¬£¬¸Ã×éÖ¯½«¹¥»÷½¹µãÃé׼δÐÞ²¹µÄFortinetÇå¾²×°±¸£¬£¬£¬£¬ÓÈÆäÕë¶ÔFortiGateºÍFortiProxy×°±¸ÖеÄCVE-2024-21762£¨Éí·ÝÑéÖ¤ÈÆ¹ý£©ÓëCVE-2024-55591£¨Ô¶³Ì´úÂëÖ´ÐУ©Îó²î¡£¡£¡£¡£Ö»¹ÜǰÕßÒÑÓÚ2025Äê2ÔÂÐû²¼²¹¶¡£¬£¬£¬£¬µ«È«ÇòÊýÍǫ̀װ±¸ÈÔ̻¶ÔÚ¹¥»÷ÃæÏ£¬£¬£¬£¬Îª÷è÷ëÌṩÁË×Ô¶¯»¯°²Åŵľø¼ÑÈë¿Ú¡£¡£¡£¡£¹¥»÷Á´ÏÔʾ£¬£¬£¬£¬ÍþвÐÐΪÕßͨ¹ýÌØÖÆÇëÇó´¥·¢Îó²î£¬£¬£¬£¬ÎÞÐèÆ¾Ö¤¼´¿É½¨ÉèÍøÂçפ×ãµã£¬£¬£¬£¬ËæºóÊͷŽÓÄÉRustÓëCÓïÑÔ±àдµÄÄ£¿£¿£¿£¿£¿£¿£¿é»¯¶ñÒâÔØºÉ£¬£¬£¬£¬ÊµÑ鳤ÆÚ»¯¿ØÖÆÓëºáÏòÉøÍ¸¡£¡£¡£¡£ÊÖÒÕÆÊÎöÕ¹ÏÖ£¬£¬£¬£¬÷è÷ëµÄÍþвģ×ÓÒÑÍ»ÆÆ¹Å°åÀÕË÷ÁìÓò£¬£¬£¬£¬¹¹½¨Æðº¸ÇÀ¬»øÓʼþ¡¢DDoS¹¥»÷¡¢PB¼¶Êý¾Ý´æ´¢¼°ÐÄÀíÕ½¹¤¾ßµÄÍêÕû·¸·¨Éú̬¡£¡£¡£¡£Æä¶À´´µÄ"ºô½Ð״ʦ"¹¦Ð§Í¨¹ýÄ£ÄâÖ´·¨Ì¸Åг¡¾°£¬£¬£¬£¬¶ÔÊܺ¦ÕßÊ©¼ÓÐÄÀíѹÁ¦£¬£¬£¬£¬ÏÔÖøÌáÉýÊê½ðÐÉÌЧÂÊ¡£¡£¡£¡£ÕâÖÖ¶àά¶È¹¥»÷ģʽʹÆäѸËÙÌî²¹LockBit¡¢BlackCatµÈÇýÖð×éÖ¯ÁôϵÄÊг¡¿Õȱ£¬£¬£¬£¬ÎüÒý´ó×ÚÁ¥ÊôÍŶӼÓÃË¡£¡£¡£¡£
https://cybersecuritynews.com/qilin-emerged-as-the-most-active-group/
6. ºÚ¿Í½èÕýµ±Mac¹¤¾ßÖ²ÈëZuRuľÂí£¬£¬£¬£¬ÖصãÕë¶Ô¿ª·¢ÕßȺÌå
7ÔÂ11ÈÕ£¬£¬£¬£¬Çå¾²»ú¹¹SentinelOne¿ËÈÕÐû²¼¾¯±¨£¬£¬£¬£¬Õ¹ÏÖºÚ¿ÍÕýͨ¹ýÎÛȾËÑË÷ÒýÇæÐ§¹ûµÄ·½·¨£¬£¬£¬£¬½«Ö²ÈëZuRuľÂíµÄ¸Ä¶¯°æMac¹¤¾ßÍÆË͸øÓû§£¬£¬£¬£¬×îй¥»÷Ä¿µÄÃé×¼¿çƽ̨SSH¿Í»§¶ËTermius¡£¡£¡£¡£´Ë´Î¹¥»÷ÑÓÐøÁËÕë¶Ô¿ª·¢Õß³£Óù¤¾ßµÄ¶ñÒâÈí¼þÈö²¥Ä£Ê½£¬£¬£¬£¬Í¹ÏÔmacOSÆ½Ì¨ÃæÁٵũӦÁ´Çå¾²ÍþвһÁ¬Éý¼¶¡£¡£¡£¡£±»¸Ä¶¯µÄTermius×°ÖðüÄÚº¬Ð°æmacOS.ZuRuºóÃŲ¡¶¾¡£¡£¡£¡£¸ÃľÂí×°Öúó»áÔÚºǫ́¾²Ä¬ÔËÐУ¬£¬£¬£¬½¨É賤ÆÚ»¯»á¼ûͨµÀ£¬£¬£¬£¬²»µ«Äܹ»Ô¶³ÌÏÂÔØÓк¦×é¼þ£¬£¬£¬£¬»¹¿ÉÖ´Ðй¥»÷ÕßÖ¸Á£¬£¬£¬¹¦Ð§º¸ÇÎļþ´«Ê䡢ϵͳÕì̽¡¢Àú³Ì²Ù¿Ø¼°Ö¸Áî·´ÏìµÈ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬¹¥»÷ÕßÒªÇóÊܺ¦ÏµÍ³ÖÁÉÙΪ2023Äê10ÔÂÐû²¼µÄSonoma 14.1»ò¸üа汾£¬£¬£¬£¬ÌåÏÖÆä¿ÉÄÜÕë¶Ô½ÏеÄmacOSÇéÐÎÓÅ»¯¹¥»÷´úÂë¡£¡£¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬£¬£¬£¬´Ë´Î¹¥»÷Öи͝µÄTermius°üÀ¨³¤ÆÚÐÔÏÂÔØÆ÷£¬£¬£¬£¬¿É»ñÈ¡²¢½âÂë¿ªÔ´ÉøÍ¸¹¤¾ßKhepri£¬£¬£¬£¬Í¨¹ý¶ñÒâÓòÃû½¨ÉèÏÂÁî¿ØÖÆÍ¨µÀ¡£¡£¡£¡£¶ñÒâ´úÂëÖ´ÐÐʱ»áͬ²½Æô¶¯Ä¾Âí¼ÓÔØÆ÷ÓëÕý°æÓ¦Ó㬣¬£¬£¬È·±£Óû§ÄÑÒÔ²ì¾õÒì³£¡£¡£¡£¡£Ç徲ר¼ÒÆÀ¹ÀÒÔΪ£¬£¬£¬£¬´ËÀ๥»÷Ö÷ÒªÕë¶Ô"ȱ·¦ÓÐÓÃÖÕ¶Ë·À»¤"µÄÇéÐΣ¬£¬£¬£¬ÓÈÆäÊÇÒÀÀµËÑË÷ÒýÇæÏÂÔØÈí¼þµÄ¿ª·¢ÕßȺÌå¡£¡£¡£¡£
https://cybernews.com/security/hackers-hide-mac-trojan-in-legitimate-applications/


¾©¹«Íø°²±¸11010802024551ºÅ