ºÚ¿Í¿ÉÒÔ»á¼ûÁè¼Ý120Íǫ̀ҽÁÆ×°±¸µÄÃô¸ÐÊý¾Ý
Ðû²¼Ê±¼ä 2025-08-111. ºÚ¿Í¿ÉÒÔ»á¼ûÁè¼Ý120Íǫ̀ҽÁÆ×°±¸µÄÃô¸ÐÊý¾Ý
8ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬£¬Å·ÖÞÍøÂçÇå¾²¹«Ë¾Modat½üÆÚÑо¿Õ¹ÏÖ£¬£¬£¬£¬£¬£¬£¬È«Çò¹æÄ£ÄÚÁè¼Ý120Íǫ̀ÉèÖùýʧµÄÁªÍøÒ½ÁÆ×°±¸¼°ÏµÍ³ÒòÇå¾²Îó²î̻¶ÓÚ»¥ÁªÍø£¬£¬£¬£¬£¬£¬£¬ÎªºÚ¿ÍÇÔÈ¡»¼ÕßÃô¸ÐÊý¾ÝÉõÖÁ¸Ä¶¯Ò½ÁƼͼÌṩÁ˿ɳËÖ®»ú¡£¡£¡£ÕâЩÒ×Êܹ¥»÷×°±¸º¸Ç70ÓàÖÖÀàÐÍ£¬£¬£¬£¬£¬£¬£¬°üÀ¨MRI¡¢CT¡¢X¹â»ú¡¢DICOMÉó²éÆ÷¡¢ÑªÒº¼ì²âϵͳ¼°Ò½ÔºÖÎÀíϵͳµÈÒªº¦Ò½ÁÆÉèÊ©¡£¡£¡£¹¥»÷Õß¿Éͨ¹ýÍøÂçÖ±½Ó»á¼û»¼ÕßµÄÉñÃØÒ½Ñ§Ó°Ïñ¡¢ÑªÒº¼ì²âЧ¹û¼°ÉúÎïÌØÕ÷Êý¾Ý£¬£¬£¬£¬£¬£¬£¬²¿·ÖϵͳÉõÖÁÔÊÐíÐÞ¸ÄÀúÊ·¼Í¼£¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÕï¶ÏЧ¹û±»¶ñÒâ¸Ä¶¯¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹ú£¨17.4Íǫ̀£©¡¢ÄÏ·Ç£¨17.2Íǫ̀£©ºÍ°Ä´óÀûÑÇ£¨11.1Íǫ̀£©ÊÇ̻¶װ±¸×î¶àµÄ¹ú¼Ò£¬£¬£¬£¬£¬£¬£¬°ÍÎ÷¡¢µÂ¹ú¡¢Ó¢¹úµÈÁù¹ú×°±¸ÊýĿҲÁè¼Ý7Íǫ̀£¬£¬£¬£¬£¬£¬£¬ÈÕ±¾¼°ÆäËûµØÇøÔòÓÐÊýÍǫ̀װ±¸´¦ÓÚΣº¦×´Ì¬¡£¡£¡£Îó²î³ÉÒòÖ÷Òª°üÀ¨×°±¸Î´ÉèÖÃÉí·ÝÑéÖ¤¡¢Ê¹Óóö³§Ä¬ÈÏÃÜÂë»òÈõÃÜÂ룬£¬£¬£¬£¬£¬£¬ÒÔ¼°ÔËÐÐδÐÞ²¹µÄ¹ýʱÈí¼þ¡£¡£¡£²¿·Ö×°±¸ÉõÖÁÊôÓÚÒÑ×èÖ¹Ö§³ÖµÄÒÅÁôϵͳ£¬£¬£¬£¬£¬£¬£¬ºã¾Ãȱ·¦Çå¾²¸üС£¡£¡£Ñо¿Ö°Ô±Í¨¹ýModat Magnifyƽ̨ɨÃ貢ʶ±ð³öÕâЩװ±¸£¬£¬£¬£¬£¬£¬£¬½ØÍ¼Ö¤¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õ߿ɻñÈ¡»¼ÕßÉúÃüÌåÕ÷¡¢ÄÔ²¿¼°Ðز¿É¨ÃèͼÏñµÈ¸ßÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¿·Öϵͳ¼Í¼ÉõÖÁ×·ËÝÖÁ¶àÄêǰ¡£¡£¡£
https://cybernews.com/security/million-medical-devices-exposed-to-hackers/
2. ÐÂÐÍEDRɱÊÖ¹¤¾ß±»°Ë´óÀÕË÷ÍÅ»ï½ÓÄÉ
8ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬£¬¾ÝSophosÇå¾²ÍŶÓÑо¿£¬£¬£¬£¬£¬£¬£¬Ò»ÖÖ±»ÊÓΪRansomHub¿ª·¢µÄ"EDRKillShifter"ÑÝ±ä°æµÄÐÂÐÍEDRɱÊÖ¹¤¾ß£¬£¬£¬£¬£¬£¬£¬ÒÑÔڰ˸ö²î±ðÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷Öб»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Éæ¼°RansomHub¡¢Blacksuit¡¢Medusa¡¢Qilin¡¢Dragonforce¡¢Crytox¡¢LynxºÍINC×éÖ¯¡£¡£¡£¸Ã¹¤¾ßµÄ½¹µã¹¦Ð§ÊÇ×ÊÖú¹¥»÷Õ߹رձ»¹¥ÆÆÏµÍ³ÉϵÄÇå¾²²úÆ·£¬£¬£¬£¬£¬£¬£¬Îª°²ÅÅÀÕË÷Èí¼þÓÐÓÃÔØºÉ¡¢ÌáÉýȨÏÞ¡¢ºáÏòÒÆ¶¯¼°Òþ²Ø¼ÓÃÜ×°±¸´´Á¢Ìõ¼þ¡£¡£¡£ÊÖÒÕ²ãÃæ£¬£¬£¬£¬£¬£¬£¬¸Ã¹¤¾ß½ÓÄɸ߶ȻìÏýµÄ¶þ½øÖÆÎļþ£¬£¬£¬£¬£¬£¬£¬ÔËÐÐʱ×ÔÎÒ½âÂë²¢×¢ÈëÕýµ±Ó¦ÓóÌÐòÖС£¡£¡£ÆäÒªº¦»úÖÆÊÇËÑË÷Ó²±àÂëÔÚ¿ÉÖ´ÐÐÎļþÖеÄËæ»úÎå¸ö×Ö·ûÃû³ÆµÄÊý×ÖÊðÃûÇý¶¯³ÌÐò£¬£¬£¬£¬£¬£¬£¬Ò»µ©·¢Ã÷±ã¼ÓÔØ¶ñÒâÄÚºËÇý¶¯£¬£¬£¬£¬£¬£¬£¬Í¨¹ý"×Ô´øÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐò"£¨BYOVD£©¹¥»÷»ñÈ¡ÄÚºËȨÏÞ£¬£¬£¬£¬£¬£¬£¬½ø¶øÖÕÖ¹ÓëAV/EDRÏà¹ØµÄÀú³Ì¼°Ð§ÀÍ¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬¸ÃÇý¶¯³£Î±×°³ÉÕýµ±Îļþ£¬£¬£¬£¬£¬£¬£¬µ«¼¤»îºó»áÖ±½ÓĨɱĿµÄÇå¾²¹¤¾ß¡£¡£¡£ÆäÁýÕֵij§É̹æÄ£ÆÕ±é£¬£¬£¬£¬£¬£¬£¬°üÀ¨Sophos¡¢Microsoft Defender¡¢¿¨°Í˹»ù¡¢ÈüÃÅÌú¿Ë¡¢Ç÷ÊÆ¿Æ¼¼¡¢SentinelOne¡¢Cylance¡¢McAfee¡¢F-Secure¡¢HitmanProºÍWebrootµÈÖ÷Á÷Çå¾²²úÆ·¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-edr-killer-tool-used-by-eight-different-ransomware-groups/
3. È«Çò×î´ó²»·¨IPTVƽ̨Rare Breed TVÔâACEÈ¡µÞ
8ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬£¬´´ÒâÓëÓéÀÖͬÃË£¨ACE£©¿ËÈÕÐû²¼ÀֳɹرÕÈ«Çò×î´ó²»·¨IPTVЧÀÍÌṩÉÌRare Breed TV£¬£¬£¬£¬£¬£¬£¬²¢ÓëÆäÔËÓªÉ̸濢²ÆÎñÏ¢ÕùÐÒé¡£¡£¡£×ܲ¿Î»ÓÚ±±¿¨ÂÞÀ´ÄÉÖݵÄRare Breed TVÊÇÊý×ÖµÁ°æÁìÓòµÄ¾ÞÍ·£¬£¬£¬£¬£¬£¬£¬Éù³ÆÓµÓÐÁè¼Ý28,000¸öÖ±²¥ÆµµÀ¼°100,000²¿Ó°Ï·ºÍµçÊÓ¾çµÄ²»·¨×ÊÔ´¿â£¬£¬£¬£¬£¬£¬£¬ÆäÊÓÆµµã²¥Æ½Ì¨¸ü°üÀ¨14,000¸öδ¾ÊÚȨµÄ½ÚÄ¿£¬£¬£¬£¬£¬£¬£¬ºã¾Ãͨ¹ýÿÔÂ15.99ÃÀÔªÖÁÕûÄê79.99ÃÀÔªµÄ¶©ÔÄģʽIJÀû¡£¡£¡£ACE×÷ΪÓÉÈ«Çò50Óà¼ÒÓ°ÊÓÓéÀÖ¾ÞÍ·×é³ÉµÄ·´µÁ°æÍ¬ÃË£¬£¬£¬£¬£¬£¬£¬ÆäÖÎÀíίԱ»áº¸ÇÑÇÂíÑ·¡¢µÏÊ¿Äá¡¢Netflix¡¢»ªÄÉÐֵܵȶ¥¼¶¹«Ë¾¡£¡£¡£´Ë´ÎÐж¯ÖУ¬£¬£¬£¬£¬£¬£¬ACEͨ¹ýÖ´·¨Í¾¾¶Ëø¶¨Rare Breed TV±³ºóµÄʹÓÃÕߣ¬£¬£¬£¬£¬£¬£¬ÆÈʹÆäÓÀÊÀ¹Ø±Õ²»·¨Æ½Ì¨²¢Ö§¸¶¾Þ¶îÅâ³¥½ð¡£¡£¡£Ö»¹ÜÔÚÉùÃ÷Ðû²¼Ê±£¬£¬£¬£¬£¬£¬£¬Rare Breed TVÍøÕ¾ÈÔÔÝʱÔÚÏߣ¬£¬£¬£¬£¬£¬£¬µ«ACEÇ¿µ÷ÔËÓªÉÌÒÑÔÊÐí×èÖ¹ÇÖȨÐÐΪ£¬£¬£¬£¬£¬£¬£¬²¢½«ÅäºÏºóÐøÊӲ졣¡£¡£
https://www.bleepingcomputer.com/news/technology/massive-illegal-iptv-service-provider-rare-breed-tv-taken-offline/
4. ¸çÂ×±ÈÑÇ´óѧÔâÓö´ó¹æÄ£Êý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬½ü87ÍòÈËÃô¸ÐÐÅÏ¢ÔâÇÔ
8ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹ú¸çÂ×±ÈÑÇ´óѧ¿ËÈÕÅû¶һÆðÖØ´óÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Ô¼868,969ÃûÏÖÈμ°Ç°ÈÎѧÉú¡¢Ô±¹¤¡¢ÉêÇëÈ˼°¾ìÊôµÄСÎÒ˽¼ÒÐÅÏ¢ÔÚ2025Äê5ÔÂ16ÈÕµÄÍøÂç¹¥»÷Öб»µÁ¡£¡£¡£×÷Ϊ³£´ºÌÙÃËУ֮һ£¬£¬£¬£¬£¬£¬£¬¸ÃУӵÓÐ35,000ÓàÃûѧÉúºÍ20,000ÃûÔ±¹¤£¬£¬£¬£¬£¬£¬£¬2024ÄêÔ¤Ëã´ï66ÒÚÃÀÔª¡£¡£¡£ÊÂÎñÔ´ÓÚ6ÔÂ24ÈÕ²¿·ÖϵͳÒì³£ÖÐÖ¹£¬£¬£¬£¬£¬£¬£¬¾Íâ²¿ÍøÂçÇ徲ר¼ÒÐÖúÊÓ²ìºó£¬£¬£¬£¬£¬£¬£¬Ñ§Ð£È·ÈÏδ¾ÊÚȨµÄµÚÈý·½»á¼ûÁËÆäÍøÂç²¢ÇÔÈ¡Îļþ¡£¡£¡£Ö»¹ÜºÚ¿ÍÔøÐû³Æ»ñÈ¡460GBÊý¾Ý£¬£¬£¬£¬£¬£¬£¬µ«Ð£·½ÉùÃ÷δ֤ʵÏêϸÊý¾ÝÁ¿£¬£¬£¬£¬£¬£¬£¬½öÃ÷ȷй¶ÐÅÏ¢º¸ÇÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢ÁªÏµ·½·¨¡¢Ñ§ÊõÀúÊ·¡¢²ÆÎñÔ®Öú¼Í¼¡¢°ü¹ÜÐÅÏ¢¼°¿µ½¡Êý¾ÝµÈÃô¸ÐÄÚÈÝ¡£¡£¡£ÖµµÃÇìÐÒµÄÊÇ£¬£¬£¬£¬£¬£¬£¬Á¥ÊôµÄÅ·ÎÄҽѧÖÐÐÄ»¼Õ߼ͼδÊܲ¨¼°¡£¡£¡£¸çÂ×±ÈÑÇ´óѧÒÑÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»Õýʽ֪ͨ£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýÃÀ¹úÓÊÕþЧÀÍ֪ͨÊÜÓ°Ïì¸öÌå¡£¡£¡£Îª½µµÍΣº¦£¬£¬£¬£¬£¬£¬£¬¸ÃУ½«Í¨¹ýKroll¹«Ë¾ÌṩΪÆÚÁ½ÄêµÄÃâ·ÑÐÅÓÃ¼à¿Ø¡¢Ú²Æ×Éѯ¼°Éí·Ý͵ÇÔ»Ö¸´Ð§ÀÍ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/columbia-university-data-breach-impacts-nearly-870-000-students-applicants-employees/
5. RubyGems¹©Ó¦Á´Ôâ¶ñÒâÈí¼þ¹¥»÷£º60¸öÇÔÃÜ×é¼þÏÂÔØ³¬27.5Íò´Î
8ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬£¬×Ô2023Äê3ÔÂÆð£¬£¬£¬£¬£¬£¬£¬Ò»³¡Õë¶ÔRuby¿ª·¢ÕߵĴó¹æÄ£¹©Ó¦Á´¹¥»÷ÔÚRubyGemsƽ̨һÁ¬·¢½Í¡£¡£¡£Çå¾²»ú¹¹SocketÅû¶£¬£¬£¬£¬£¬£¬£¬60¸öαװ³ÉÕýµ±¹¤¾ßµÄ¶ñÒâRuby×é¼þ£¨gem£©±»ÏÂÔØÁè¼Ý27.5Íò´Î£¬£¬£¬£¬£¬£¬£¬Æäͨ¹ýÇÔÈ¡¿ª·¢ÕßÕË»§Æ¾Ö¤ÊµÑéÍøÂç´¹ÂÚ£¬£¬£¬£¬£¬£¬£¬³ÉΪ½üÄêÀ´×îÑÏÖØµÄ¿ªÔ´Éú̬Çå¾²ÊÂÎñÖ®Ò»¡£¡£¡£ÕâЩ¶ñÒâ×é¼þÓɶà¸ö¹ØÁªÕË»§£¨Èçzon¡¢nowonµÈ£©ÒÔÓÖÃûÐÎʽÐû²¼£¬£¬£¬£¬£¬£¬£¬Ä£ÄâWordPress¡¢Telegram¡¢NaverµÈÖ÷Á÷ƽ̨µÄ×Ô¶¯»¯¹¤¾ßÃüÃû£¨Èçwp_posting_duo¡¢tg_send_zonµÈ£©£¬£¬£¬£¬£¬£¬£¬²¢Å䱸ÐéαͼÐνçÃæ£¨GUI£©ÓÕµ¼Óû§ÊäÈëÃô¸ÐÐÅÏ¢¡£¡£¡£¹¥»÷Õßͨ¹ýÓ²±àÂëµÄC2ЧÀÍÆ÷ÇÔÈ¡Ã÷ÎÄÓû§ÃûÃÜÂë¡¢×°±¸MACµØµã¼°Èí¼þ°üʹÓÃÊý¾Ý£¬£¬£¬£¬£¬£¬£¬²¿·Ö×é¼þÉõÖÁαÔìAPIÏìÓ¦ÓÕÆÓû§¡£¡£¡£SocketÔÚ¶íÓï°µÍøÊг¡·¢Ã÷À´×Ômarketingduo.co.krµÄ±»µÁƾ֤ÈÕÖ¾£¬£¬£¬£¬£¬£¬£¬Ö¤Êµ¹¥»÷ÕßÒѽ«Êý¾ÝÓÃÓÚ²»·¨ÉúÒâ¡£¡£¡£RubyGems×÷ΪRubyÓïÑԵĹٷ½°ü¹ÜÀíÆ÷£¬£¬£¬£¬£¬£¬£¬ÆäÉú̬Çå¾²ÐÔÔÚ´Ë´ÎÊÂÎñÖÐÌ»Â¶ÖØ´óÒþ»¼¡£¡£¡£Ö»¹ÜSocketÒÑÏò¹Ù·½ÍŶӾٱ¨ËùÓÐ60¸ö¶ñÒâ×é¼þ£¬£¬£¬£¬£¬£¬£¬µ«×èÖ¹±¨¸æÐû²¼Ê±ÈÔÓÐ16¸öδ±»Ï¼ܡ£¡£¡£
https://www.bleepingcomputer.com/news/security/60-malicious-ruby-gems-downloaded-275-000-times-steal-credentials/
6. WinRARÁãÈÕÎó²îÔâ¶íÂÞ˹ºÚ¿Í×é֯ʹÓÃ
8ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬£¬£¬Ò»¸ö±àºÅΪCVE-2025-8088µÄWinRARĿ¼±éÀúÎó²î±»ÆØ¹â£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÒѱ»¹¥»÷ÕßʹÓÃΪÁãÈÕÎó²îÌá³«ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÓÃÓÚÈö²¥Óë¶íÂÞ˹¹ØÁªµÄRomCom¶ñÒâÈí¼þ¡£¡£¡£¾ÝÇå¾²³§ÉÌESETÅû¶£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î±£´æÓÚWinRAR 7.13°æ±¾Ö®Ç°µÄËùÓÐWindowsƽ̨²úÆ·ÖУ¬£¬£¬£¬£¬£¬£¬°üÀ¨RAR¡¢UnRAR½âѹ¹¤¾ß¼°UnRAR.dll¿â£¬£¬£¬£¬£¬£¬£¬¶øLinux/UnixºÍAndroid°æ±¾²»ÊÜÓ°Ïì¡£¡£¡£Îó²îµÄ½¹µã»úÖÆÔÚÓÚ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ý½á¹¹¶ñÒâRARѹËõ°ü£¬£¬£¬£¬£¬£¬£¬ÈƹýWinRARĬÈϵĽâѹ·¾¶ÏÞÖÆ£¬£¬£¬£¬£¬£¬£¬½«ÎļþÖ±½ÓÌáÈ¡ÖÁWindowsϵͳµÄ×Ô¶¯ÔËÐÐĿ¼¡£¡£¡£µ±Êܺ¦ÕßÏ´εǼϵͳʱ£¬£¬£¬£¬£¬£¬£¬ÕâЩ±»Ö²ÈëµÄ¿ÉÖ´ÐÐÎļþ½«×Ô¶¯ÔËÐУ¬£¬£¬£¬£¬£¬£¬´Ó¶øÊµÏÖÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£¡£¡£ESETÑо¿Ö°Ô±Peter Stry?ekÖ¸³ö£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚ¸ÃÎó²îÒѱ»ÓÃÓÚÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬£¬Í¨¹ý°üÀ¨¶ñÒâRARÎļþµÄÓʼþ¸½¼þÈö²¥RomComºóÃųÌÐò¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬WinRAR¹Ù·½ÒÑÔÚ7.13°æ±¾ÖÐÐÞ¸´´ËÎó²î£¬£¬£¬£¬£¬£¬£¬µ«ÒòÆäȱ·¦×Ô¶¯¸üлúÖÆ£¬£¬£¬£¬£¬£¬£¬Óû§ÐèÊÖ¶¯´Ó¹ÙÍøÏÂÔØ×îÐÂ×°Öðü¡£¡£¡£
https://www.bleepingcomputer.com/news/security/winrar-zero-day-flaw-exploited-by-romcom-hackers-in-phishing-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ