Gemini AIÖúÊÖÒý·¢Google APIÃÜԿ̻¶Σº¦

Ðû²¼Ê±¼ä 2026-02-28

1. Gemini AIÖúÊÖÒý·¢Google APIÃÜԿ̻¶Σº¦


2ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬£¬£¬TruffleSecurityÑо¿Ö°Ô±ÔÚɨÃèÈ«ÇòÍøÕ¾Ê±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬½ü3000¸öǶÈëÔÚ¹«¹²JavaScript´úÂëÖеÄGoogle APIÃÜÔ¿±£´æÑÏÖØÇ徲Σº¦¡£¡£¡£¡£ ¡£ÕâЩÃÜÔ¿Ô­±¾ÓÃÓÚµØÍ¼¡¢YouTubeǶÈë¡¢FirebaseµÈЧÀÍ£¬£¬£¬£¬£¬£¬£¬ÔÚGoogleÍÆ³öGemini AIÖúÊֺ󣬣¬£¬£¬£¬£¬£¬ÆäȨÏÞ±»ÒâÍâÀ©Õ¹ÖÁGeminiÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬£¬µ¼Ö¹¥»÷Õ߿ɸ´ÖÆÃÜÔ¿»á¼û˽ÓÐÊý¾Ý²¢ÀÄÓÃAPIŲÓÃ׬Ǯ¡£¡£¡£¡£ ¡£Ñо¿ÏÔʾ£¬£¬£¬£¬£¬£¬£¬ÕâЩ̻¶ÃÜÔ¿¶à°²ÅÅÓÚ½ðÈÚ»ú¹¹¡¢°²±£¹«Ë¾¡¢ÕÐÆ¸ÆóÒµµÈ×éÖ¯µÄÍøÕ¾Ô´´úÂëÖУ¬£¬£¬£¬£¬£¬£¬²¿·ÖÃÜÔ¿×Ô2023Äê2ÔÂÆð±ãÒ»Á¬Ì»Â¶¡£¡£¡£¡£ ¡£TruffleSecurityͨ¹ý²âÊÔGemini APIµÄ/models¶ËµãÑéÖ¤ÁËÃÜÔ¿µÄÓÐÓÃÐÔ£¬£¬£¬£¬£¬£¬£¬·¢Ã÷µ¥ÈÕ×î¸ß¿É±¬·¢ÊýǧÃÀÔªÓöȡ£¡£¡£¡£ ¡£ÎÊÌâȪԴÔÚÓÚ£¬£¬£¬£¬£¬£¬£¬¿ª·¢Õß´Ëǰ½«GoogleÔÆAPIÃÜÔ¿ÊÓΪ·ÇÃô¸ÐÊý¾Ý¹ûÕæ£¬£¬£¬£¬£¬£¬£¬¶øGeminiÍÆ³öºó£¬£¬£¬£¬£¬£¬£¬ÕâЩÃÜԿͻȻ»ñµÃ¸ü¸ßȨÏÞȴδ±»ÊµÊ±²ì¾õ¡£¡£¡£¡£ ¡£Ñо¿Ö°Ô±ÓÚ2025Äê11ÔÂ21ÈÕÏò¹È¸è±¨¸æÎó²î£¬£¬£¬£¬£¬£¬£¬¹È¸èÀúʱÊýÔÂÓÚ2026Äê1ÔÂ13ÈÕ½«Æä¹éÀàΪ¡°µ¥Ð§ÀÍȨÏÞÌáÉý¡±¡£¡£¡£¡£ ¡£¹È¸èÒѽÓÄÉÆð¾¢²½·¥¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/previously-harmless-google-api-keys-now-expose-gemini-ai-data/


2. ManoManoÔâµÚÈý·½Ð§ÀÍÉ̺ڿÍÈëÇÖÖÂÊý¾Ýй¶


2ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬£¬·¨¹úDIYµçÉ̾ÞÍ·ManoMano¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬£¬ÆäÒ»¼ÒµÚÈý·½¿Í»§Ð§ÀÍÌṩÉÌÓÚ2026Äê1ÔÂÔâÓöºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÔ¼3800ÍòÓû§Êý¾Ýй¶¡£¡£¡£¡£ ¡£¸Ã¹«Ë¾Ö¤Êµ£¬£¬£¬£¬£¬£¬£¬ºÚ¿Íͨ¹ýδ¾­ÊÚȨ»á¼û¸ÃÍ»Äá˹·Ö°üÉÌϵͳ£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡ÁËÓëÓû§ÕË»§¼°¿Í·þ»¥¶¯Ïà¹ØµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¼°¿Í»§Ð§ÀÍÏàͬ¼Í¼£¬£¬£¬£¬£¬£¬£¬µ«Î´Éæ¼°ÕË»§ÃÜÂë»ò¹«Ë¾ÏµÍ³Êý¾ÝÐ޸ġ£¡£¡£¡£ ¡£×÷ΪŷÖÞÁìÏȵļҾÓ×°ÐÞ¡¢Ô°ÒÕ²úÆ·ÔÚÏßÊг¡£¬£¬£¬£¬£¬£¬£¬ManoManoÔÚ·¨¡¢±È¡¢Î÷¡¢Òâ¡¢µÂ¡¢Ó¢Áù¹úÔËÓª£¬£¬£¬£¬£¬£¬£¬Ô¾ù×ÔÁ¦·Ã¿Í´ï5000Íò¡£¡£¡£¡£ ¡£´Ë´ÎÊÂÎñÔ´ÓÚºÚ¿ÍÂÛ̳ÉϼÙÃû¡°Indra¡±µÄ¹¥»÷ÕßÐû³Æ¶ÔÈëÇÖÈÏÕæ£¬£¬£¬£¬£¬£¬£¬²¢Éù³Æ»ñÈ¡ÁË3780ÍòÓû§ÕË»§¼°Êýǧ·ÝÖ§³Ö¹¤µ¥Ó븽¼þ¡£¡£¡£¡£ ¡£ÍøÂçÇå¾²¹«Ë¾HackmanacÖ¸³ö£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶ÈªÔ´»òÓëZendeskÊý¾Ýй¶Ïà¹Ø£¬£¬£¬£¬£¬£¬£¬µ«ManoManoδֱ½ÓÈ·ÈÏÊÖÒÕϸ½Ú¡£¡£¡£¡£ ¡£ÊÂÎñÆØ¹âºó£¬£¬£¬£¬£¬£¬£¬ManoManoÁ¬Ã¦½ÓÄÉÓ¦¼±²½·¥£º½ûÓÃÏà¹Ø»á¼ûȨÏÞ¡¢×÷·Ï·Ö°üÉÌÊý¾Ý»á¼ûȨ¡¢Ç¿»¯»á¼û¿ØÖÆÓë¼à¿Ø£¬£¬£¬£¬£¬£¬£¬²¢Í¬²½×ª´ï·¨¹ú¹ú¼ÒÐÅÏ¢Óë×ÔÓÉίԱ»á£¨CNIL£©¼°¹ú¼Ò¿ÆÑ§Ó빤ҵÖÎÀí¾Ö£¨ANSSI£©¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/european-dyi-chain-manomano-data-breach-impacts-38-million-customers/


3. ÂíÈü×ãÇò¾ãÀÖ²¿ÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬40ÍòÓû§ÐÅÏ¢ÃæÁÙΣº¦


2ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬£¬·¨¹úÂíÈü°ÂÁÖÆ¥¿Ë×ãÇò¾ãÀÖ²¿£¨OM£©¿ËÈÕ֤ʵÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬³ÉΪ½üÆÚÕë¶Ô´óÐÍÌåÓý×éÖ¯ÍøÂçÇå¾²ÊÂÎñµÄ×îа¸Àý¡£¡£¡£¡£ ¡£¸Ã¾ãÀÖ²¿½¨ÉèÓÚ1899Ä꣬£¬£¬£¬£¬£¬£¬ÊÇ·¨¼×ÁªÈüÊ×´´³ÉÔ±Ö®Ò»£¬£¬£¬£¬£¬£¬£¬²¢ÓÚ1993Äê³ÉΪÊ×Ö§¶áµÃÅ·ÖÞ¹Ú¾üÁªÈü¹Ú¾üµÄ·¨¹úÇò¶Ó¡£¡£¡£¡£ ¡£¾ÝÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳Åû¶£¬£¬£¬£¬£¬£¬£¬ÆäÓÚ±¾Ô³õÈëÇÖ¾ãÀÖ²¿²¿·ÖЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡Á˰üÀ¨40ÍòÃûÔ±¹¤¡¢ÇòÃÔ¼°Ö§³ÖÕßÐÅÏ¢µÄÊý¾Ý¿â£¬£¬£¬£¬£¬£¬£¬ÏêϸÊý¾ÝÉæ¼°ÐÕÃû¡¢µØµã¡¢¶©µ¥¼Í¼¡¢µç×ÓÓʼþ¼°ÊÖ»úºÅÂë¡£¡£¡£¡£ ¡£¹¥»÷Õß»¹Éù³Æ»ñÈ¡ÁË2050¸öDrupal CMSÕË»§ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨34Ãû¾ãÀÖ²¿Ô±¹¤ºÍ1770ÃûТ˳Õß¡¢°æÖ÷µÄÕË»§Æ¾Ö¤¡£¡£¡£¡£ ¡£ÎªÖ¤Êµ¹¥»÷ÕæÊµÐÔ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¹ûÕæÁ˲¿·ÖÊý¾ÝÑù±¾£¬£¬£¬£¬£¬£¬£¬²¢ÊÔͼÔÚÂÛ̳³öÊÛËùν¡°2026Äê2Ô½ÇÖðÊý¾Ý¡±¡£¡£¡£¡£ ¡£¾ãÀÖ²¿ÔÚÖܶþÐû²¼µÄÉùÃ÷ÖÐÈ·ÈÏÁ˹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬µ«Ç¿µ÷¡°µÃÒæÓÚÊÖÒÕÍŶÓÓëרҵЧÀÍÉ̵ĿìËÙÏìÓ¦£¬£¬£¬£¬£¬£¬£¬ÊÂ̬ÒÑ»ñµÃ¿ØÖÆ¡±¡£¡£¡£¡£ ¡£ÏÖÔÚ¾ãÀÖ²¿ËùÓÐÓªÒµ¾ùÔÚÇå¾²ÇéÐÎÏÂÕý³£ÔËÐУ¬£¬£¬£¬£¬£¬£¬ÇÒÎÞÒøÐÐÐÅÏ¢»òÃÜÂëй¶¡£¡£¡£¡£ ¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬¾ãÀÖ²¿ÌåÏÖÈÔÔÚÊÓ²ìÊÂÎñÏêϸ¹æÄ££¬£¬£¬£¬£¬£¬£¬²¢ÒÑÏò·¨¹úÊý¾Ý±£»£»£»¤»ú¹¹£¨CNIL£©Õýʽ±¨¸æ£¬£¬£¬£¬£¬£¬£¬Í¬Ê±ºôÓõÇòÃÔСÐÄ´¹ÂÚ¹¥»÷¼°¿ÉÒɻ¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/olympique-marseille-football-club-confirms-cyberattack-after-data-leak/


4. UAT-10027ʹÓÃDohdoorºóÃŹ¥»÷ÃÀ¹ú½ÌÓýºÍÒ½ÁƱ£½¡ÏµÍ³


2ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬£¬Cisco Talos¿ËÈÕÅû¶±àºÅΪUAT-10027µÄÍþв¼¯Èº£¬£¬£¬£¬£¬£¬£¬¸Ã¼¯Èº×Ô2025Äê12ÔÂÆðÒÔÃÀ¹ú½ÌÓý¼°Ò½ÁƱ£½¡»ú¹¹ÎªÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬°²ÅÅÁËÐÂÐͺóÃųÌÐòDohdoor¡£¡£¡£¡£ ¡£¹¥»÷³õʼ½×¶Îͨ¹ý´¹ÂÚÓʼþ´¥·¢PowerShell¾ç±¾£¬£¬£¬£¬£¬£¬£¬ÏÂÔØ¶ñÒâ.batÎļþ²¢Ê¹ÓÃDLL²àÔØÊÖÒÕ¼ÓÔØDohdoor¶ñÒâDLL¡£¡£¡£¡£ ¡£¸ÃºóÃÅͨ¹ýDNS over HTTPS£¨DoH£©ÓëCloudflare»ù´¡ÉèÊ©Òþ²ØC2ͨѶ£¬£¬£¬£¬£¬£¬£¬½«Á÷Á¿Î±×°³ÉÕýµ±HTTPSÅþÁ¬£¬£¬£¬£¬£¬£¬£¬ÊµÏÖÈÆ¹ý¹Å°åÇå¾²¼ì²âµÄÒ»Á¬»á¼û¡£¡£¡£¡£ ¡£DohdoorΪ2025Äê11Ô±àÒëµÄ64λDLL¼ÓÔØÆ÷£¬£¬£¬£¬£¬£¬£¬½ÓÄÉË«ÖØ½âÃÜ»úÖÆ£ºÅúÁ¿Êý¾ÝʹÓÃSIMDÖ¸ÁîµÄXOR-SUBËã·¨´¦Öóͷ££¬£¬£¬£¬£¬£¬£¬Ê£ÓàÊý¾Ýͨ¹ýλÖÃÏà¹Ø¹«Ê½½âÃÜ¡£¡£¡£¡£ ¡£ÆäC2ͨѶͨ¹ýÆÊÎöCloudflareµÄJSONÏìÓ¦»ñȡЧÀÍÆ÷IP£¬£¬£¬£¬£¬£¬£¬²¢Ä£ÄâcurlÁ÷Á¿·¢ËÍHTTPS GETÇëÇóÏÂÔØ¼ÓÃÜÔØºÉ¡£¡£¡£¡£ ¡£Îª¹æ±ÜEDR¼ì²â£¬£¬£¬£¬£¬£¬£¬Dohdoor»á¶¯Ì¬¶¨Î»ntdll.dllÖеÄNtProtectVirtualMemoryº¯Êý£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÐÞ²¹ÏµÍ³Å²Óôæ¸ù½¨ÉèÖ±½ÓϵͳŲÓÃÌø×ª£¬£¬£¬£¬£¬£¬£¬ÈƹýÓû§Ä£Ê½¹³×Ó¡£¡£¡£¡£ ¡£TalosÆÀ¹ÀÒÔΪ£¬£¬£¬£¬£¬£¬£¬Ö»¹ÜUAT-10027ÓëLazarus±£´æÊÖÒÕ¹ØÁª£¬£¬£¬£¬£¬£¬£¬µ«ÆäÄ¿µÄÁìÓòÌØÊâÐÔÈÔÐèÒýÆðÏà¹ØÐÐÒµ¸ß¶ÈСÐÄ¡£¡£¡£¡£ ¡£


https://securityaffairs.com/188558/apt/uat-10027-campaign-hits-u-s-education-and-healthcare-with-stealthy-dohdoor-backdoor.html


5. ³¯ÏÊAPT37×éÖ¯ÌᳫRuby Jumper¶ñÒâ»î¶¯


2ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬ÔÆÇå¾²¹«Ë¾Zscaler¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬£¬Óɳ¯Ïʹú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯APT37ÌᳫµÄ"Ruby Jumper"¶ñÒâ»î¶¯£¬£¬£¬£¬£¬£¬£¬Õýͨ¹ý¿ÉÒÆ¶¯´æ´¢Çý¶¯Æ÷ÔÚÎïÀí¸ôÀëϵͳÓëÁªÍøÏµÍ³¼ä½¨ÉèÒþ²ØÊý¾Ý´«ÊäͨµÀ¡£¡£¡£¡£ ¡£¹¥»÷Á´Ê¼ÓÚÊܺ¦Õß·­¿ªÎ±×°³É³¯ÏÊýÌ幨ÓÚ°ÍÒÔ³åÍ»°¢À­²®ÓïÒë±¾µÄ¶ñÒâLNKÎļþ£¬£¬£¬£¬£¬£¬£¬¸ÃÎļþ»á°²ÅÅPowerShell¾ç±¾ÌáÈ¡ÓÐÓÃÔØºÉ²¢Æô¶¯ÓÕ¶üÎĵµ¡£¡£¡£¡£ ¡£¾ç±¾Ê×ÏȼÓÔØRESTLEAFÖ²Èë³ÌÐò£¬£¬£¬£¬£¬£¬£¬Í¨¹ýZoho WorkDriveÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬£¬£¬»ñÈ¡¼ÓÃÜshellcodeºóÏÂÔØ»ùÓÚRubyµÄSNAKEDROPPER¼ÓÔØÆ÷¡£¡£¡£¡£ ¡£¸Ã¼ÓÔØÆ÷»á×°ÖÃαװ³Éusbspeed.exeµÄRuby 3.3.0ÔËÐÐʱÇéÐΣ¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýÿÎå·ÖÖÓÖ´ÐеÄÍýÏëʹÃüÌæ»»RubyGemsĬÈÏÎļþ£¬£¬£¬£¬£¬£¬£¬ÊµÏÖ×Ô¶¯¼ÓÔØ¡£¡£¡£¡£ ¡£THUMBSBDºóÃÅÒÔascii.rbÎļþÐÎʽÏÂÔØ£¬£¬£¬£¬£¬£¬£¬ÈÏÕæÍøÂçϵͳÐÅÏ¢¡¢ÔÝ´æÏÂÁîÎļþ£¬£¬£¬£¬£¬£¬£¬²¢ÔÚUSBÇý¶¯Æ÷½¨ÉèÒþ²ØÄ¿Â¼¾ÙÐÐÊý¾ÝË«Ïò´«Ê䣬£¬£¬£¬£¬£¬£¬½«¿ÉÒÆ¶¯½éÖÊת»¯Îª"Òþ²ØC2ÖмÌ"¡£¡£¡£¡£ ¡£VIRUSTASKÔòͨ¹ýÌæ»»Õýµ±ÎļþΪ¶ñÒâ¿ì½Ý·½·¨£¬£¬£¬£¬£¬£¬£¬ÔÚÇý¶¯Æ÷ÓÐ2GBÒÔÉϿռäʱ´¥·¢Ñ¬È¾£¬£¬£¬£¬£¬£¬£¬ÏòÐÂÎïÀí¸ôÀë×°±¸Èö²¥¡£¡£¡£¡£ ¡£FOOTWINEÌØ¹¤Èí¼þαװ³ÉAPKÎļþ£¬£¬£¬£¬£¬£¬£¬Ö§³Ö¼üÅ̼ͼ¡¢ÆÁÄ»½ØÍ¼¡¢ÒôÊÓÆµÂ¼ÖƵÈÔ¶³Ì²Ù×÷¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/


6. RESURGE¶ñÒâÈí¼þʵÏÖIvanti×°±¸Òþ²Ø³¤ÆÚÈëÇÖ


2ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕÐû²¼Á˹ØÓÚRESURGE¶ñÒâÖ²Èë³ÌÐòµÄ×îÐÂÊÖÒÕϸ½Ú¡£¡£¡£¡£ ¡£¸Ã³ÌÐò±»ÓÃÓÚʹÓÃCVE-2025-0282ÁãÈÕÎó²îÈëÇÖIvanti Connect Secure×°±¸£¬£¬£¬£¬£¬£¬£¬¾ßÓÐÑÓ³ÙÆô¶¯¡¢ÖØ´óÍøÂç¼¶¹æ±ÜºÍÈÏÖ¤ÊÖÒÕµÈÌØÕ÷£¬£¬£¬£¬£¬£¬£¬¿ÉʵÏÖÒþ²ØÍ¨Ñ¶Ó볤ÆÚÐÔפÁô¡£¡£¡£¡£ ¡£¾ÝCISAÆÊÎö£¬£¬£¬£¬£¬£¬£¬RESURGEÊÇÒ»¸öÃûΪlibdsupgrade.soµÄ32λLinux¹²Ïí¹¤¾ßÎļþ£¬£¬£¬£¬£¬£¬£¬¾ß±¸rootkit¡¢bootkit¡¢ºóÃÅ¡¢Í¶·ÅÆ÷¡¢ÊðÀíºÍËíµÀµÈ¶àÖØ¹¦Ð§¡£¡£¡£¡£ ¡£ÆäÆæÒìÖ®´¦ÔÚÓÚ²»×Ô¶¯ÏòC2ЧÀÍÆ÷·¢ËÍÐű꣬£¬£¬£¬£¬£¬£¬¶øÊÇÎÞÏÞÆÚÆÚ´ýÌØ¶¨ÈëÕ¾TLSÅþÁ¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ýCRC32 TLSÖ¸ÎÆ¹þÏ£¼Æ»®Ê¶±ð¹¥»÷ÕßµÄÅþÁ¬ÊµÑé¡£¡£¡£¡£ ¡£µ±ÔÚ"web"Àú³ÌϼÓÔØÊ±£¬£¬£¬£¬£¬£¬£¬Ëü»á¹Ò¹³"accept()"º¯Êý£¬£¬£¬£¬£¬£¬£¬ÔÚÁ÷Á¿µÖ´ïЧÀÍÆ÷ǰ¼ì²éTLSÊý¾Ý°ü£¬£¬£¬£¬£¬£¬£¬ÈôÖ¸ÎÆÆ¥ÅäÔò½¨ÉèË«ÏòTLS»á»°£¬£¬£¬£¬£¬£¬£¬²»È»½«Á÷Á¿µ¼ÏòÕýµ±IvantiЧÀÍÆ÷¡£¡£¡£¡£ ¡£¹¥»÷Õß»¹Ê¹ÓÃαÔìµÄIvantiÖ¤Êé¾ÙÐÐÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬£¬¸ÃÖ¤Êé½öÓÃÓÚÈÏÖ¤¶ø·Ç¼ÓÃÜ£¬£¬£¬£¬£¬£¬£¬ÇÒͨ¹ý»¥ÁªÍøÃ÷ÎÄ´«Ê䣬£¬£¬£¬£¬£¬£¬·ÀÓùÕ߿ɽ«Æä×÷ÎªÍøÂçÊðÃû¼ì²âÈëÇÖ¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/cisa-warns-that-resurge-malware-can-be-dormant-on-ivanti-devices/