EurailÊý¾Ýй¶ÊÂÎñ²¨¼°³¬30ÍòÈË
Ðû²¼Ê±¼ä 2026-04-101. EurailÊý¾Ýй¶ÊÂÎñ²¨¼°³¬30ÍòÈË
4ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬Å·ÖÞÂÃÐй«Ë¾Eurail¿ËÈÕÏòÃÀ¹ú¶à¸öÖÝ˾·¨²¿³¤°ì¹«ÊÒÌύΥ¹æÍ¨Öª£¬£¬£¬£¬£¬£¬Åû¶2025Äê12Ô±¬·¢µÄÊý¾Ýй¶ÊÂÎñÏÖʵӰÏìÁè¼Ý30ÍòÈË£¬£¬£¬£¬£¬£¬ÐÕÃûºÍ»¤ÕÕºÅÂëµÈСÎÒ˽¼ÒÐÅÏ¢±»µÁ¡£¡£¡£¡£¡£¸ÃÊÂÎñ×î³õÓÚ½ñÄê1ÔÂÅû¶£¬£¬£¬£¬£¬£¬Æäʱ¹«Ë¾½öÖÒÑÔ³ÖÓÐÅ·ÖÞÌú·ͨƱµÄÖ÷¹Ë¿ÉÄÜÊܵ½Ó°Ïì¡£¡£¡£¡£¡£×ܲ¿Î»ÓÚºÉÀ¼µÄEurailÌåÏÖ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÆäÍøÂçºóÇÔÈ¡Á˰üÀ¨»ù×Ô¼º·ÝºÍÁªÏµÐÅÏ¢µÄÎļþ¡£¡£¡£¡£¡£½ñÄê2Ô£¬£¬£¬£¬£¬£¬Ò»ÃûºÚ¿ÍÔÚ¹ûÕæµÄÍøÂç·¸·¨ÍøÕ¾ÉÏ´µÅõ³Æ£¬£¬£¬£¬£¬£¬´ÓEurailµÄAWS S3¡¢ZendeskºÍGitLabʵÀýÖÐÇÔÈ¡ÁËÔ¼1.3TBÊý¾Ý£¬£¬£¬£¬£¬£¬°üÀ¨Ô´´úÂë¡¢Ö§³Ö¹¤µ¥ºÍÊý¾Ý¿â±¸·Ý¡£¡£¡£¡£¡£¸ÃºÚ¿ÍÉù³ÆÇÔÈ¡ÁËÊý°ÙÍòÅ·ÖÞÌú·ͨƱÓû§µÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢³ÆÓëÂÃÐй«Ë¾µÄ̸ÅÐÒѾʧ°Ü¡£¡£¡£¡£¡£3Ô³õ£¬£¬£¬£¬£¬£¬Eurail֤ʵºÚ¿ÍÒ»Ö±ÔÚ°µÍøÉ϶µÊÛÇÔÈ¡µÄÊý¾Ý£¬£¬£¬£¬£¬£¬²¢ÔÚTelegramƵµÀÉÏÐû²¼ÁËÑù±¾Êý¾Ý¼¯¡£¡£¡£¡£¡£¹«Ë¾Í¬Ê±³ÎÇ壬£¬£¬£¬£¬£¬ËûÃDz»´æ´¢ÒøÐлòÐÅÓÿ¨ÐÅÏ¢£¬£¬£¬£¬£¬£¬Ò²²»´æ´¢»¤Õյĵç×Ó°æÕÕÆ¬£¬£¬£¬£¬£¬£¬µ«ÔÊÐíÈôÊǿͻ§µÄСÎÒ˽¼ÒÊý¾Ý±»°üÀ¨ÔÚÑù±¾Êý¾Ý¼¯ÖУ¬£¬£¬£¬£¬£¬½«Ö±½Ó֪ͨÊÜÓ°ÏìµÄ¿Í»§¡£¡£¡£¡£¡£ÉÏÖÜÏò¶íÀÕ¸ÔÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄÎļþÏÔʾ£¬£¬£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶ÏÖʵӰÏì308,777ÈË¡£¡£¡£¡£¡£
https://www.securityweek.com/300000-people-impacted-by-eurail-data-breach/
2. È«Çò×î´ó±ÈÌØ±ÒATMÔËÓªÉÌBitcoin DepotÔâÈëÇÖ
4ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬ÔËÓª×ÅÈ«Çò×î´ó±ÈÌØ±ÒATMÍøÂçÖ®Ò»µÄBitcoin Depot¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÓÚÉϸöÔÂÈëÇÖÆäϵͳºó£¬£¬£¬£¬£¬£¬´ÓÆä¼ÓÃÜÇ®°üÖÐÇÔÈ¡Á˼ÛÖµ366.5ÍòÃÀÔªµÄ±ÈÌØ±Ò¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÈ«ÇòÖÎÀí×ÅÁè¼Ý25,000̨±ÈÌØ±ÒATM»úºÍBDCheckoutÍøµã£¬£¬£¬£¬£¬£¬2025ÄêÊÕÈëµÖ´ï6.15ÒÚÃÀÔª¡£¡£¡£¡£¡£Æ¾Ö¤Ìá½»¸øÃÀ¹ú֤ȯÉúÒâίԱ»áµÄÎļþ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔÚ3ÔÂ23ÈÕ¼ì²âµ½Æä²¿·ÖITϵͳ±£´æ¿ÉÒɻºó·¢Ã÷Á˴˴ι¥»÷¡£¡£¡£¡£¡£Ö»¹ÜÁ¬Ã¦½ÓÄɲ½·¥¿ØÖƹ¥»÷£¬£¬£¬£¬£¬£¬µ«¹¥»÷ÕßÈÔÓÐʱ¼äÇÔÈ¡Êý×Ö×ʲú½áËãÕË»§µÄƾ֤£¬£¬£¬£¬£¬£¬²¢ÔÚÆä»á¼ûȨÏÞ±»×èֹ֮ǰ´ÓBitcoin DepotµÄÇ®°üÖÐ×ªÒÆÁË50.903¸ö±ÈÌØ±Ò£¬£¬£¬£¬£¬£¬°´±¨¸æµ±ÈÕ¼ÛÖµÔ¼366.5ÍòÃÀÔª¡£¡£¡£¡£¡£¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬·¢Ã÷ÎÊÌâºóÁ¬Ã¦Æô¶¯ÁËÊÂÎñÏìÓ¦ÐÒ飬£¬£¬£¬£¬£¬Ô¼ÇëÁËÍâ²¿ÍøÂçÇ徲ר¼Ò£¬£¬£¬£¬£¬£¬²¢Í¨ÖªÁËÖ´·¨²¿·Ö¡£¡£¡£¡£¡£Bitcoin Depot½øÒ»²½ÒÔΪ£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñ½öÏÞÓÚ¹«Ë¾ÄÚ²¿ÇéÐΣ¬£¬£¬£¬£¬£¬²¢Î´Ó°Ïì¿Í»§Æ½Ì¨¡¢²¿·Ö¡¢ÏµÍ³¡¢Êý¾Ý»òÇéÐΡ£¡£¡£¡£¡£ËäÈ»¹«Ë¾ÓµÓÐÕë¶ÔÍøÂç¹¥»÷µÄ°ü¹Ü£¬£¬£¬£¬£¬£¬µ«Bitcoin DepotÌåÏÖÕâ¿ÉÄÜÎÞ·¨º¸Ç¹¥»÷Ôì³ÉµÄËùÓÐËðʧ¡£¡£¡£¡£¡£¼øÓÚ¸ÃÊÂÎñ¿ÉÄÜÔì³ÉµÄÉùÓþË𺦡¢Ö´·¨¡¢î¿ÏµºÍÓ¦¶Ô±¾Ç®£¬£¬£¬£¬£¬£¬¹«Ë¾ÓÚ2026Äê4ÔÂ6ÈÕÈ϶¨¸ÃÊÂÎñ¾ßÓÐÖØ´óÒâÒå¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/crypto-atm-giant-bitcoin-depot-says-hackers-stole-36-million-from-its-wallets/
3. Âåɼí¶ÊÐ״ʦ°ì¹«ÊÒÔâºÚ¿ÍÈëÇÖ
4ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬ÂåÉ¼í¶¾¯Ô±¾ÖÖܶþÐû²¼£¬£¬£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÁËÂåɼí¶ÊÐ״ʦ°ì¹«ÊÒµÄÊý×ִ洢ϵͳ£¬£¬£¬£¬£¬£¬¸Ãϵͳ°üÀ¨´ó×ÚÃô¸Ð¾¯ÎñÎļþ¡£¡£¡£¡£¡£¾ÝÂåÉ¼í¶¾¯Ô±¾Ö³Æ£¬£¬£¬£¬£¬£¬ÕâЩÎļþÊÇ´ËǰÒѽâ¾ö»òÏ¢ÕùµÄÃñʰ¸¼þÖУ¬£¬£¬£¬£¬£¬ÔÚÖ¤¾Ý¿ªÊ¾½×¶ÎÒÆ½»µÄÖÊÁÏ¡£¡£¡£¡£¡£¾¯·½Ç¿µ÷£¬£¬£¬£¬£¬£¬´Ë´ÎÈëÇÖ²¢Î´Í»ÆÆÈκÎÂåÉ¼í¶¾¯Ô±¾Ö×ÔÉíµÄϵͳ»òÍøÂ磬£¬£¬£¬£¬£¬µ«ÊÂÎñÈÔÒýÆðÁ˶ÔÖ´·¨Ãô¸ÐÐÅÏ¢±£»£»£»£»£»¤µÄ¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£Âåɼí¶ÊÐ״ʦ°ì¹«ÊÒ½²»°ÈËËæºóÐû²¼ÉùÃ÷³Æ£¬£¬£¬£¬£¬£¬°ì¹«ÊÒÓÚ3ÔÂ20ÈÕ·¢Ã÷ÁË´Ë´ÎÈëÇÖ¡£¡£¡£¡£¡£ºÚ¿Í»á¼ûµÄÊÇ¡°ÊÐ״ʦ°ì¹«ÊÒÓÃÓÚÏò¶Ô·½×´Ê¦ºÍËßËϵ±ÊÂÈË´«ÊäÖ¤¾ÝµÄµÚÈý·½¹¤¾ß¡±¡£¡£¡£¡£¡£ÉùÏÔ×ÅÈ·ÌåÏÖ£¬£¬£¬£¬£¬£¬Ã»ÓÐÆäËûÊÐÕþÓ¦ÓûòÏµÍ³Éæ¼°´Ë´ÎÊÂÎñ£¬£¬£¬£¬£¬£¬¸ÃµÚÈý·½¹¤¾ßÖеÄÐÅÏ¢ÓëÈκβ¿·Ö¼Í¼»òϵͳ¾ùÎÞÁ´½Ó»ò»á¼ûȨÏÞ¡£¡£¡£¡£¡£¾Ý¡¶Âåɼí¶Ê±±¨¡·±¨µÀ£¬£¬£¬£¬£¬£¬É罻ýÌåÉÏÒÑ·ºÆðÉù³Æ°üÀ¨±»µÁÖÊÁÏÐÅÏ¢µÄÌû×Ó£¬£¬£¬£¬£¬£¬²¿·ÖÌû×ÓÒѱ»É¾³ý¡£¡£¡£¡£¡£ÕâЩÌû×ÓÏÔʾ£¬£¬£¬£¬£¬£¬¹²ÓÐ7.7TBÊý¾Ý¿É¹©ÏÂÔØ£¬£¬£¬£¬£¬£¬Áè¼Ý33.7Íò·ÝÎļþ±»»á¼û¡£¡£¡£¡£¡£Ð¹Â¶µÄÖÊÁϰüÀ¨Ö¤ÈËÐÕÃû¡¢Ò½ÁÆÐÅÏ¢¡¢Î´±à¼µÄÐÌÊÂͶËßÒÔ¼°ÊÓ²ìÎļþµÈ¸ß¶ÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£
https://therecord.media/breach-exposes-lapd-files-city-attorney-systems
4. Masjesu½©Ê¬ÍøÂçÒþ²Ø¹¥»÷ÎïÁªÍø×°±¸
4ÔÂ8ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾Trellix¿ËÈÕÐû²¼±¨¸æ£¬£¬£¬£¬£¬£¬ÉîÈëÆÊÎöÁËÃûΪMasjesuµÄÎïÁªÍø½©Ê¬ÍøÂçµÄÄÚ²¿ÔË×÷»úÖÆ¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂç×Ô2023ÄêÆð»îÔ¾£¬£¬£¬£¬£¬£¬Ö÷ÒªÓÃÓÚ·¢¶¯ÂþÑÜʽ¾Ü¾øÐ§À͹¥»÷£¬£¬£¬£¬£¬£¬ÒÑѬȾ¶àÖÖÎïÁªÍø×°±¸¡£¡£¡£¡£¡£ÆäÔËÓªÕßÖ÷ÒªÔÚTelegramÉϾÙÐÐÐû´«£¬£¬£¬£¬£¬£¬Éù³ÆÄܹ»·¢¶¯Êý°ÙGB¹æÄ£µÄDDoS¹¥»÷£¬£¬£¬£¬£¬£¬Ìû×ÓͬʱÕë¶ÔÖÐÎĺÍÓ¢ÎÄÓû§£¬£¬£¬£¬£¬£¬Åú×¢ÆäЧÀͼÌÐøÃé×¼ÖÐÃÀ¿Í»§¡£¡£¡£¡£¡£ÏÖÔÚÔËÓªÕßµÄTelegramƵµÀÓµÓÐÁè¼Ý400Ãû¶©ÔÄÕߣ¬£¬£¬£¬£¬£¬µ«ÏÖÊÊÓû§Èº¿ÉÄܸü´ó¡£¡£¡£¡£¡£´ÓѬȾװ±¸µÄÂþÑÜÀ´¿´£¬£¬£¬£¬£¬£¬´ó´ó¶¼±»Ñ¬È¾µÄ×°±¸Î»ÓÚÔ½ÄÏ£¬£¬£¬£¬£¬£¬µ«°ÍÎ÷¡¢Ó¡¶È¡¢ÒÁÀÊ¡¢¿ÏÄáÑǺÍÎÚ¿ËÀ¼Ò²Óдó×Ú×°±¸±»Ñ¬È¾¡£¡£¡£¡£¡£TrellixÖ¸³ö£¬£¬£¬£¬£¬£¬Êý¾ÝÇ¿ÁÒÅú×¢¹¥»÷À´×Ô¶à¸ö×ÔÖÎϵͳ£¬£¬£¬£¬£¬£¬Éæ¼°ÖÖÖÖÍøÂ磬£¬£¬£¬£¬£¬¶ø·Ç½©Ê¬ÍøÂçÍêÈ«ÍйÜÓÚ¼òµ¥ÐéÄâרÓÃЧÀÍÆ÷ÌṩÉÌ¡£¡£¡£¡£¡£½üÆÚÆÊÎöµÄMasjesuÑù±¾ÏÔʾ£¬£¬£¬£¬£¬£¬Æä¿ÉÕë¶Ô¶àÖÖCPU¼Ü¹¹£¬£¬£¬£¬£¬£¬°üÀ¨i386¡¢MIPS¡¢ARM¡¢SPARC¡¢PPC¡¢68KºÍAMD64¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçͨ¹ýD-Link·ÓÉÆ÷¡¢GPON·ÓÉÆ÷¡¢»ªÎª¼ÒÍ¥Íø¹Ø¡¢MVPower DVR¡¢Netgear·ÓÉÆ÷¡¢UPnPЧÀͼ°ÆäËûÎïÁªÍø×°±¸µÄÒÑÖªÎó²î¾ÙÐÐÈö²¥¡£¡£¡£¡£¡£
https://www.securityweek.com/evasive-masjesu-ddos-botnet-targets-iot-devices/
5. Adobe ReaderÁãÈÕÎó²îÔâºÚ¿ÍʹÓÃÊýÔÂ
4ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬Çå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬ºÚ¿ÍÕýʹÓÃAdobe ReaderÖÐÒ»¸öÉÐδÐÞ¸´µÄÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬Í¨¹ýÈ«ÐĽṹµÄ¶ñÒâPDFÎļþ·¢¶¯Ò»Á¬ÐÔ¹¥»÷¡£¡£¡£¡£¡£¸ÃÎó²îÓÉÍøÂçÇå¾²Ñо¿Ô±ÓÚ3ÔÂ26ÈÕ·¢Ã÷£¬£¬£¬£¬£¬£¬ÆäʱÊÕµ½Ò»·Ý¿ÉÒÉÑù±¾¡£¡£¡£¡£¡£½øÒ»²½ÆÊÎöÏÔʾ£¬£¬£¬£¬£¬£¬¹¥»÷»î¶¯ÖÁÉÙ×Ô2025Äê11Ô¾ÍÒÑ×îÏÈ£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪ¡°Invoice540.pdf¡±µÄÑù±¾ÓÚ2025Äê11ÔÂ28ÈÕÉÏ´«ÖÁVirusTotal£¬£¬£¬£¬£¬£¬Åú×¢ºÚ¿ÍÒÑÒ»Á¬¹¥»÷³¤´ïËĸöÔÂÖ®¾Ã¡£¡£¡£¡£¡£¸ÃÎó²î¼«ÎªÎ£ÏÕ£¬£¬£¬£¬£¬£¬Óû§½öÐè·¿ª¶ñÒâPDFÎļþ¼´¿É´¥·¢¹¥»÷£¬£¬£¬£¬£¬£¬ÎÞÐèÈκÎÌØÊâµã»÷²Ù×÷£¬£¬£¬£¬£¬£¬ÇÒÈ·ÈÏ¿ÉÔÚ×îа汾µÄAdobe ReaderÉÏÀÖ³ÉÔËÐС£¡£¡£¡£¡£¹¥»÷¾ßÓÐÏÔ×ÅÕë¶ÔÐÔ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Gi7w0rmÆÊÎö·¢Ã÷£¬£¬£¬£¬£¬£¬¶ñÒâPDFÎļþÖаüÀ¨¶íÓïÓÕ¶üÄÚÈÝ£¬£¬£¬£¬£¬£¬Éæ¼°¶íÂÞ˹ʯÓͺÍ×ÔÈ»ÆøÐÐÒµµÄÊ±ÊÆÎÊÌ⣬£¬£¬£¬£¬£¬Åú×¢¹¥»÷Ä¿µÄ¿ÉÄÜÊǶíÓïµØÇøµÄÕþ¸®¡¢ÄÜÔ´»ò»ù´¡ÉèÊ©Ïà¹Ø»ú¹¹¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬AdobeÉÐδÐû²¼ÐÞ¸´²¹¶¡£¬£¬£¬£¬£¬£¬Ò²Î´¹ûÕæ»ØÓ¦´ËÊ¡£¡£¡£¡£¡£
https://securityaffairs.com/190558/hacking/malicious-pdf-reveals-active-adobe-reader-zero-day-in-the-wild.html
6. LucidRookÕë¶Ǫ̂Íå·ÇÕþ¸®×éÖ¯ºÍ´óѧ·¢¶¯´¹ÂÚ¹¥»÷
4ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬Ë¼¿ÆTalosÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬Ò»ÖÖÃûΪLucidRookµÄÐÂÐÍÄ£¿£¿£¿£¿£¿£¿é»¯¶ñÒâÈí¼þÕý±»ÓÃÓÚÕë¶Ǫ̂ÍåµØÇø·ÇÕþ¸®×éÖ¯ºÍ´óѧµÄÓã²æÊ½ÍøÂç´¹Âڻ¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»ùÓÚLuaÓïÑÔ¿ª·¢£¬£¬£¬£¬£¬£¬±»¹éÒòÓÚÄÚ²¿×·×ÙµÄÍþв×éÖ¯UAT-10362£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±½«ÆäÐÎòΪ¡°ÓµÓгÉÊì×÷Õ½¼¼ÇÉ¡±µÄǿʢµÐÊÖ¡£¡£¡£¡£¡£LucidRookÓÚ2025Äê10Ô±»ÓÃÓÚÏÖʵ¹¥»÷£¬£¬£¬£¬£¬£¬¹¥»÷ÊÖ¶ÎÖ÷ÒªÒÀÀµÐ¯´øÊÜÃÜÂë±£»£»£»£»£»¤´æµµÎļþµÄÍøÂç´¹ÂÚµç×ÓÓʼþ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÁËÁ½ÖÖ²î±ðµÄѬȾÁ´¡£¡£¡£¡£¡£µÚÒ»ÖÖʹÓÃLNK¿ì½Ý·½·¨Îļþ£¬£¬£¬£¬£¬£¬×îÖÕͶ·ÅÃûΪLucidPawnµÄ¶ñÒâÈí¼þͶ·ÅÆ÷£»£»£»£»£»µÚ¶þÖÖ»ùÓÚEXEµÄѬȾÁ´ÔòʹÓÃαװ³ÉÇ÷ÊÆ¿Æ¼¼Worry-Free Business Security ServicesµÄð³äɱ¶¾Èí¼þ¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£¡£LucidRookÔÚÖ´ÐÐÀú³ÌÖлá¾ÙÐÐϵͳÕì̽£¬£¬£¬£¬£¬£¬ÍøÂçÓû§ºÍÅÌËã»úÃû³Æ¡¢ÒÑ×°ÖÃÓ¦ÓóÌÐòºÍÕýÔÚÔËÐеÄÀú³ÌµÈÐÅÏ¢¡£¡£¡£¡£¡£ÍøÂçµ½µÄÊý¾ÝʹÓÃRSA¼ÓÃÜ£¬£¬£¬£¬£¬£¬´æ´¢ÔÚÊÜÃÜÂë±£»£»£»£»£»¤µÄ´æµµÖУ¬£¬£¬£¬£¬£¬²¢Í¨¹ýFTPй¶µ½¹¥»÷Õß¿ØÖƵĻù´¡ÉèÊ©¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-lucidrook-malware-used-in-targeted-attacks-on-ngos-universities/


¾©¹«Íø°²±¸11010802024551ºÅ