ÐÂÐÍAndroid¶ñÒâÈí¼þ½èHugging Faceƽ̨Èö²¥

Ðû²¼Ê±¼ä 2026-01-30

1. ÐÂÐÍAndroid¶ñÒâÈí¼þ½èHugging Faceƽ̨Èö²¥


1ÔÂ29ÈÕ £¬£¬£¬£¬½üÆÚ £¬£¬£¬£¬Ò»ÖÖÐÂÐÍAndroid¶ñÒâÈí¼þ»î¶¯±»ÆØÊ¹ÓÃHugging Faceƽ̨×÷Ϊ´æ´¢¿â £¬£¬£¬£¬Èö²¥Êýǧ¸öAPKÓÐÓÃÔØºÉ±äÌå £¬£¬£¬£¬×¨ÃÅÇÔÈ¡³£ÓýðÈÚºÍÖ§¸¶Ð§À͵ÄÓû§Æ¾Ö¤¡£¡£¡£¡£Hugging Face×÷Ϊ×ÅÃûÈ˹¤ÖÇÄÜ¡¢NLP¼°»úеѧϰģ×ÓÍÐ¹ÜÆ½Ì¨ £¬£¬£¬£¬Òò±»ÊÓΪ¡°¿ÉÐÅÆ½Ì¨¡±¶ø³£ÈƹýÇå¾²¼ì²â £¬£¬£¬£¬´ËǰÒѶà´Î±»²»·¨·Ö×ÓÀÄÓÃÍйܶñÒâAIÄ£×Ó¡£¡£¡£¡£´Ë´Î¹¥»÷ʼÓÚαװ³ÉÇå¾²¹¤¾ßµÄ¡°TrustBastion¡±Í¶·ÅÆ÷Ó¦Óᣡ£¡£¡£¸ÃÓ¦ÓÃͨ¹ýÏÅ»£Ê½¹ã¸æÐû³Æ×°±¸ÒÑѬȾ £¬£¬£¬£¬ÓÕµ¼Óû§×°Öᣡ£¡£¡£×°ÖÃºó £¬£¬£¬£¬Æä½çÃæÄ£ÄâGoogle PlayÇ¿ÖÆ¸üР£¬£¬£¬£¬ÊµÔòÁªÏµtrustbastion[.]comЧÀÍÆ÷ £¬£¬£¬£¬½«Óû§Öض¨ÏòÖÁHugging Face´æ´¢¿âÏÂÔØ¶ñÒâAPK¡£¡£¡£¡£BitdefenderÑо¿·¢Ã÷ £¬£¬£¬£¬ÍþвÐÐΪÕß½ÓÄÉЧÀÍÆ÷¶Ë¶à̬ÐÔÊÖÒÕ £¬£¬£¬£¬Ã¿15·ÖÖÓÌìÉúÐÂÓÐÓÃÔØºÉ±äÌåÒÔÌӱܼì²â¡£¡£¡£¡£ÊÓ²ìʱ´ú £¬£¬£¬£¬¸Ã´æ´¢¿â±£´æ29Ìì £¬£¬£¬£¬ÀÛ¼ÆÌá½»³¬6000´Î £¬£¬£¬£¬ºóËä±»¹Ø±Õ £¬£¬£¬£¬µ«¹¥»÷ÕßѸËÙÒÔ¡°Premium Club¡±ÐÂÃû³Æ¡¢ÐÂͼ±êÖØÆôÐж¯ £¬£¬£¬£¬±£´æÏàͬ¶ñÒâ´úÂë¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hugging-face-abused-to-spread-thousands-of-android-malware-variants/


2. IvantiÖÒÑÔEPMMÎó²îÒѱ»ÁãÈÕ¹¥»÷ʹÓÃ


1ÔÂ29ÈÕ £¬£¬£¬£¬¿ËÈÕ £¬£¬£¬£¬IvantiÅû¶ÆäEndpoint Manager Mobile£¨EPMM£©²úÆ·±£´æÁ½¸öÑÏÖØÁãÈÕÎó²î£¨CVE-2026-1281¡¢CVE-2026-1340£© £¬£¬£¬£¬Òѱ»¹¥»÷ÕßʹÓᣡ£¡£¡£ÕâÁ½¸ö´úÂë×¢ÈëÎó²îÔÊÐíÔ¶³ÌδÊÚȨ¹¥»÷ÕßÔÚÊÜÓ°Ïì×°±¸ÉÏÖ´ÐÐí§Òâ´úÂë £¬£¬£¬£¬CVSSÆÀ·Ö¾ù´ï9.8 £¬£¬£¬£¬Êô×î¸ßΣ¼¶±ð¡£¡£¡£¡£Îó²îͨ¹ýÄÚ²¿Ó¦Ó÷ַ¢ºÍAndroidÎļþ´«Ê书Ч´¥·¢ £¬£¬£¬£¬¹¥»÷ʵÑé»á·µ»Ø404 HTTPÏìÓ¦Âë £¬£¬£¬£¬¶øÕýµ±ÇëÇóͨ³£·µ»Ø200¡£¡£¡£¡£Ivanti½¨ÒéÖÎÀíԱʹÓÃÕýÔò±í´ïʽÔÚApache»á¼ûÈÕÖ¾Öмì²âÍⲿ¹¥»÷Á÷Á¿¡£¡£¡£¡£ÀÖ³ÉʹÓÃÎó²îºó £¬£¬£¬£¬¹¥»÷Õ߿ɻñÈ¡ÖÎÀíÔ±Õ˺š¢Óû§Ãô¸ÐÐÅÏ¢£¨ÈçÐÕÃû¡¢ÓÊÏä¡¢×°±¸±êʶ·ûIMEI/MACµØµã£©¡¢Î»ÖÃÊý¾Ý£¨ÈôÆôÓøú×Ù£©¼°ÒÑ×°ÖÃÓ¦ÓÃÇåµ¥ £¬£¬£¬£¬ÉõÖÁͨ¹ýAPI»òWeb¿ØÖÆÌ¨ÐÞ¸Ä×°±¸ÉèÖã¨ÈçÈÏÖ¤ÉèÖã©¡£¡£¡£¡£ÎªÑÚÊÎÐÐ×Ù £¬£¬£¬£¬¹¥»÷Õß¿ÉÄܸ͝»òɾ³ýÈÕÖ¾ £¬£¬£¬£¬Òò´ËIvantiÇ¿µ÷ÐèÓÅÏȼì²é×°±¸ÍⲿÈÕÖ¾¡£¡£¡£¡£IvantiÒÑÐû²¼RPM¾ç±¾»º½âÄ¿½ñ°æ±¾Îó²î £¬£¬£¬£¬²¢ÍýÏëÔÚ2026ÄêµÚÒ»¼¾¶ÈÍíЩʱ¼äÐû²¼µÄ12.8.0.0°æ±¾ÖÐÓÀÊÀÐÞ¸´¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/ivanti-warns-of-two-epmm-flaws-exploited-in-zero-day-attacks/


3. ¹È¸èÁªºÏ¹¥»÷È«Çò×î´óסլÊðÀíÍøÂçIPIDEA


1ÔÂ29ÈÕ £¬£¬£¬£¬±¾ÖÜ £¬£¬£¬£¬¹È¸èÍþвÇ鱨С×飨GTIG£©ÁªºÏÐÐÒµÏàÖúͬ°é¶ÔÈ«Çò×î´óסլÊðÀíÍøÂçÖ®Ò»IPIDEAÌᳫרÏî¹¥»÷ £¬£¬£¬£¬¹Ø±ÕÆäÓòÃû²¢¹²ÏíSDKÇ鱨¡£¡£¡£¡£¸ÃÍøÂçÒÔ¡°¼ÓÃÜÁ÷Á¿¡¢Òþ²ØIP¡±ÎªàåÍ· £¬£¬£¬£¬Ðû³ÆÓµÓÐ670ÍòÓû§ £¬£¬£¬£¬ÊµÔòͨ¹ýľÂí»¯AndroidÓ¦Óã¨Ç¶ÈëPacket SDKµÈ£©ºÍαװ³ÉOneDriveSync/Windows UpdateµÄWindows¶þ½øÖÆÎļþ £¬£¬£¬£¬ÔÚÓû§²»ÖªÇéϽ«×°±¸×ª»¯ÎªÊðÀí³ö¿Ú½Úµã £¬£¬£¬£¬ÐγÉÓÉ19¼Ò¹ØÁªÆ·ÅÆ£¨Èç360 Proxy¡¢Luna Proxy¡¢Door VPNµÈ£©×é³ÉµÄͳһ¿ØÖÆ»ù´¡ÉèÊ© £¬£¬£¬£¬ÔËÓªÕßÉí·ÝÖÁ½ñ±£ÃÜ¡£¡£¡£¡£¹È¸èÅû¶ £¬£¬£¬£¬ÍþвÐÐΪÕßʹÓÃIPIDEAסլÊðÀíÍøÂçʵÑéÕË»§½ÓÊÜ¡¢ÐéαÕ˺ލÉ衢ƾ֤ÇÔÈ¡¡¢Ãô¸ÐÐÅϢй¶¼°DDoS¹¥»÷¡£¡£¡£¡£ÆäÁ½²ãC2¼Ü¹¹ÖÐ £¬£¬£¬£¬µÚÒ»²ãÈÏÕæÉèÖÃÓëʱ¼äÖÎÀí £¬£¬£¬£¬µÚ¶þ²ãÓÉ7400̨ЧÀÍÆ÷·ÖÅÉÊðÀíʹÃü²¢×ª·¢Á÷Á¿¡£¡£¡£¡£GTIGÊӲ쵽һÖÜÄÚ³¬550¸öÍþв×é֯ʹÓÃÆä³ö¿Ú½Úµã £¬£¬£¬£¬»î¶¯º­¸ÇSaaSƽ̨»á¼û¡¢ÃÜÂëÅçÈ÷¹¥»÷¡¢½©Ê¬ÍøÂç¿ØÖÆ¼°»ù´¡ÉèÊ©»ìÏý¡£¡£¡£¡£´Ëǰ £¬£¬£¬£¬Ë¼¿ÆTalosÒѹØÁªIPIDEAÓëVPN/SSH±©Á¦ÆÆ½â¹¥»÷¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/google-disrupts-ipidea-residential-proxy-networks-fueled-by-malware/


4. Match GroupÔâShinyHunters´¹ÂÚ¹¥»÷


1ÔÂ29ÈÕ £¬£¬£¬£¬È«ÇòÔÚÏßÔ¼»á¾ÞÍ·Match Group£¨ÆìÏÂÓµÓÐTinder¡¢Hinge¡¢Match.com¡¢OkCupidµÈƽ̨£©Ö¤Êµ±¬·¢ÍøÂçÇå¾²ÊÂÎñ £¬£¬£¬£¬µ¼ÖÂÓû§Êý¾Ýй¶¡£¡£¡£¡£´Ë´Î¹¥»÷ÓÉÍþв×éÖ¯ShinyHuntersÌᳫ £¬£¬£¬£¬¸Ã×é֯й¶ÁË1.7GBѹËõÎļþ £¬£¬£¬£¬ÄÚº¬Ô¼1000ÍòÌõHinge¡¢MatchºÍOkCupidÓû§ÐÅÏ¢¼Í¼¼°ÄÚ²¿Îļþ¡£¡£¡£¡£Match GroupÌåÏÖ £¬£¬£¬£¬ÒÑѸËÙÖÕֹδ¾­ÊÚȨ»á¼û £¬£¬£¬£¬ÔÚÍⲿר¼ÒЭÖúÏÂÊÓ²ìÏÔʾ £¬£¬£¬£¬Î´Ð¹Â¶Óû§µÇ¼ƾ֤¡¢²ÆÎñÐÅÏ¢»ò˽ÈËͨѶ £¬£¬£¬£¬½ö¡°ÓÐÏÞÊýÄ¿¡±µÄÓû§Êý¾ÝÊÜÓ°Ïì £¬£¬£¬£¬²¢½«×ÃÇé֪ͨÏà¹ØÐ¡ÎÒ˽¼Ò¡£¡£¡£¡£´Ë´ÎÊÂÎñÊÇShinyHuntersÐÂÌᳫµÄÓïÒôÍøÂç´¹ÂÚ£¨vishing£©»î¶¯µÄÒ»²¿·Ö £¬£¬£¬£¬¸Ã»î¶¯Õë¶ÔOkta¡¢Microsoft¡¢GoogleµÈ°Ù¼Ò¸ß¼ÛÖµ×éÖ¯µÄµ¥µãµÇ¼£¨SSO£©ÕË»§¡£¡£¡£¡£¹¥»÷ÕßʹÓô¹ÂÚÓòÃû¡°matchinternal.com¡±ÓÕµ¼Óû§»á¼ûαÔìÄÚ²¿µÇ¼ÃÅ»§ £¬£¬£¬£¬Í¨¹ýÉç»á¹¤³Ì¹¥ÆÆOkta SSOÕË»§ºó £¬£¬£¬£¬½øÒ»²½»á¼ûMatch GroupµÄAppsFlyerÓªÏúÆÊÎöʵÀý¼°Google Drive¡¢DropboxÔÆ´æ´¢ £¬£¬£¬£¬ÇÔÈ¡°üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©µÄÊý¾Ý £¬£¬£¬£¬µ«´ó²¿·ÖΪ׷×ÙÐÅÏ¢¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/match-group-breach-exposes-data-from-hinge-tinder-okcupid-and-match/


5. ¶í¸¥À­»ùÃ×¶ûÃæ°ü³§ÔâÍøÂç¹¥»÷Ö¹©Ó¦Á´ÖÐÖ¹


1ÔÂ29ÈÕ £¬£¬£¬£¬¾ÝÍâµØÃ½Ì屨µÀ £¬£¬£¬£¬¶íÂÞ˹¸¥À­»ùÃ×¶ûÖÝ×î´óÃæ°üÉú²úÉÌÖ®Ò»¸¥À­»ùÃ×¶ûÃæ°ü³§ÓÚÖÜÈÕÍí¼äÔâÓöÑÏÖØÍøÂç¹¥»÷ £¬£¬£¬£¬µ¼ÖÂÆäÄÚ²¿Êý×ÖϵͳÖÜȫ̱»¾¡£¡£¡£¡£´Ë´Î¹¥»÷²¨¼°°ì¹«µçÄÔ¡¢Ð§ÀÍÆ÷¡¢µç×ÓÎĵµÖÎÀí¹¤¾ß¼°ÆÕ±éʹÓõÄ1CÆóÒµ»á¼ÆÏµÍ³ £¬£¬£¬£¬Ö±½Ó¹¥»÷Á˶©µ¥´¦Öóͷ£ÓëÅäËÍÁ÷³Ì £¬£¬£¬£¬Ôì³ÉÍâµØ×¡Ãñ¡¢ÁãÊ۵꼰Éç»á»ú¹¹µÄʳÎ﹩ӦÔÝʱÐÔǷȱ¡£¡£¡£¡£Ö»¹ÜÃæ°üÉú²ú×Ô¼ºÎ´ÊÜÓ°Ïì £¬£¬£¬£¬¹¤³§ÈÔ¼á³ÖÂú¸ººÉÔËת £¬£¬£¬£¬µ«Êý×Ö»¯ÏµÍ³µÄÍß½âʹÌõÔ¼ÍÆÐÐÏÝÈëÔÓÂÒ¡£¡£¡£¡£´óÐÍÁãÊÛÁ¬ËøµêËäδ·ºÆð´ó¹æÄ£»£»£»£»£»£»£»õÇãÔþÖà £¬£¬£¬£¬µ«ÅäËÍÎÊÌâÒÑÒý·¢ÏûºÄÕßµ£ÐÄ¡£¡£¡£¡£ÎªÓ¦¶ÔΣ»£»£»£»£»£»£»ú £¬£¬£¬£¬¸Ã¹«Ë¾½ôÆÈÆô¶¯Ó¦¼±²½·¥£ºËùÓа칫ÊÒÔ±¹¤×ªÎª24СʱÂÖ°àÖÆ £¬£¬£¬£¬²¢ÔÝʱ»Ö¸´È˹¤´¦Öóͷ£¶©µ¥ºÍ·¢»õ¡£¡£¡£¡£È»¶ø £¬£¬£¬£¬¹¤³§ÉÐδÐû²¼Êý×Ö»¯ÏµÍ³ÖÜÈ«»Ö¸´µÄÏêϸʱ¼ä±í £¬£¬£¬£¬½ö¾Í´Ë´ÎÖÐÖ¹ÏòÏàÖúͬ°éºÍÏûºÄÕßÖÂǸ¡£¡£¡£¡£


https://therecord.media/cyberattack-russian-bread-factory-supply-disruptions


6. Aisuru/Kimwolf½©Ê¬ÍøÂç´´31.4Tbps DDoS¹¥»÷мͼ


1ÔÂ29ÈÕ £¬£¬£¬£¬CloudflareÓÚÈ¥Äê12ÔÂ19ÈÕ¼ì²â²¢»º½âÁËÒ»³¡ÓÉAisuru/Kimwolf½©Ê¬ÍøÂçÌᳫµÄ´ó¹æÄ£DDoS¹¥»÷ £¬£¬£¬£¬¸Ã¹¥»÷ÒÔ31.4TbpsµÄ·åÖµÁ÷Á¿ºÍÿÃë2ÒÚ´ÎÇëÇó£¨rps£©Ë¢ÐÂÀúÊ·¼Í¼ £¬£¬£¬£¬±»ÃüÃûΪ¡°Ê¥µ®Ç°Ò¹¡±Ðж¯¡£¡£¡£¡£´Ë´Î¹¥»÷Ö÷ÒªÕë¶ÔµçÐÅЧÀÍÌṩÉÌ¡¢IT×éÖ¯¼°Cloudflare»ù´¡ÉèÊ© £¬£¬£¬£¬×é³É¡°Ø¨¹ÅδÓеĺäÕ¨¡±¡£¡£¡£¡£¹¥»÷ÌØÕ÷ÏÔÖø£º³¬°ëÊý¹¥»÷Ò»Á¬1-2·ÖÖÓ £¬£¬£¬£¬90%µÄ·åÖµÁ÷Á¿¼¯ÖÐÓÚ1-5TbpsÇø¼ä £¬£¬£¬£¬94%µÄ¹¥»÷Êý¾Ý°üËÙÂÊÔÚÿÃë10ÒÚÖÁ50ÒÚ¸öÖ®¼ä¡£¡£¡£¡£Ö»¹Ü¹æÄ£ÖØ´ó £¬£¬£¬£¬CloudflareµÄ×Ô¶¯·ÀÓùϵͳÀÖ³É×èµ² £¬£¬£¬£¬Î´´¥·¢ÄÚ²¿¾¯±¨¡£¡£¡£¡£¹¥»÷Ô´À´×Ô±»ÈëÇÖµÄÎïÁªÍø×°±¸¡¢Â·ÓÉÆ÷¼°°²×¿µçÊÓ £¬£¬£¬£¬Í¹ÏÔÎïÁªÍø×°±¸ÔÚ½©Ê¬ÍøÂçÖеĽ¹µã×÷Óᣡ£¡£¡£Cloudflare±¨¸æÖ¸³ö £¬£¬£¬£¬2025ÄêµÚËÄÐò¶ÈDDoS¹¥»÷»·±ÈÔöÌí31% £¬£¬£¬£¬Í¬±ÈÔöÌí58% £¬£¬£¬£¬Á÷Á¿³¬100MppsµÄÍøÂç²ã¹¥»÷ÔöÌí600% £¬£¬£¬£¬³¬1TbpsµÄ¹¥»÷»·±ÈÔöÌí65%¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬£¬£¬³¬71.5%µÄHTTP DDoS¹¥»÷Ô´×ÔÒÑÖª½©Ê¬ÍøÂç £¬£¬£¬£¬Í¹ÏÔ½©Ê¬ÍøÂç¶ÔÍøÂçÇå¾²µÄÒ»Á¬Íþв¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/aisuru-botnet-sets-new-record-with-314-tbps-ddos-attack/