ºÚ¿Í¿ÉÒÔ»á¼ûÁè¼Ý120Íǫ̀ҽÁÆ×°±¸µÄÃô¸ÐÊý¾Ý

Ðû²¼Ê±¼ä 2025-08-11

1. ºÚ¿Í¿ÉÒÔ»á¼ûÁè¼Ý120Íǫ̀ҽÁÆ×°±¸µÄÃô¸ÐÊý¾Ý


8ÔÂ7ÈÕ£¬ £¬£¬Å·ÖÞÍøÂçÇå¾²¹«Ë¾Modat½üÆÚÑо¿Õ¹ÏÖ£¬ £¬£¬È«Çò¹æÄ£ÄÚÁè¼Ý120Íǫ̀ÉèÖùýʧµÄÁªÍøÒ½ÁÆ×°±¸¼°ÏµÍ³ÒòÇå¾²Îó²î̻¶ÓÚ»¥ÁªÍø£¬ £¬£¬ÎªºÚ¿ÍÇÔÈ¡»¼ÕßÃô¸ÐÊý¾ÝÉõÖÁ¸Ä¶¯Ò½ÁƼͼÌṩÁ˿ɳËÖ®»ú¡£¡£¡£¡£¡£¡£ÕâЩÒ×Êܹ¥»÷×°±¸º­¸Ç70ÓàÖÖÀàÐÍ£¬ £¬£¬°üÀ¨MRI¡¢CT¡¢X¹â»ú¡¢DICOMÉó²éÆ÷¡¢ÑªÒº¼ì²âϵͳ¼°Ò½ÔºÖÎÀíϵͳµÈÒªº¦Ò½ÁÆÉèÊ©¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿Éͨ¹ýÍøÂçÖ±½Ó»á¼û»¼ÕßµÄÉñÃØÒ½Ñ§Ó°Ïñ¡¢ÑªÒº¼ì²âЧ¹û¼°ÉúÎïÌØÕ÷Êý¾Ý£¬ £¬£¬²¿·ÖϵͳÉõÖÁÔÊÐíÐÞ¸ÄÀúÊ·¼Í¼£¬ £¬£¬¿ÉÄܵ¼ÖÂÕï¶ÏЧ¹û±»¶ñÒâ¸Ä¶¯¡£¡£¡£¡£¡£¡£Ñо¿ÏÔʾ£¬ £¬£¬ÃÀ¹ú£¨17.4Íǫ̀£©¡¢ÄÏ·Ç£¨17.2Íǫ̀£©ºÍ°Ä´óÀûÑÇ£¨11.1Íǫ̀£©ÊÇ̻¶װ±¸×î¶àµÄ¹ú¼Ò£¬ £¬£¬°ÍÎ÷¡¢µÂ¹ú¡¢Ó¢¹úµÈÁù¹ú×°±¸ÊýĿҲÁè¼Ý7Íǫ̀£¬ £¬£¬ÈÕ±¾¼°ÆäËûµØÇøÔòÓÐÊýÍǫ̀װ±¸´¦ÓÚΣº¦×´Ì¬¡£¡£¡£¡£¡£¡£Îó²î³ÉÒòÖ÷Òª°üÀ¨×°±¸Î´ÉèÖÃÉí·ÝÑéÖ¤¡¢Ê¹Óóö³§Ä¬ÈÏÃÜÂë»òÈõÃÜÂ룬 £¬£¬ÒÔ¼°ÔËÐÐδÐÞ²¹µÄ¹ýʱÈí¼þ¡£¡£¡£¡£¡£¡£²¿·Ö×°±¸ÉõÖÁÊôÓÚÒÑ×èÖ¹Ö§³ÖµÄÒÅÁôϵͳ£¬ £¬£¬ºã¾Ãȱ·¦Çå¾²¸üС£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Í¨¹ýModat Magnifyƽ̨ɨÃ貢ʶ±ð³öÕâЩװ±¸£¬ £¬£¬½ØÍ¼Ö¤¾ÝÏÔʾ£¬ £¬£¬¹¥»÷Õ߿ɻñÈ¡»¼ÕßÉúÃüÌåÕ÷¡¢ÄÔ²¿¼°Ðز¿É¨ÃèͼÏñµÈ¸ßÃô¸ÐÐÅÏ¢£¬ £¬£¬²¿·Öϵͳ¼Í¼ÉõÖÁ×·ËÝÖÁ¶àÄêǰ¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/million-medical-devices-exposed-to-hackers/


2. ÐÂÐÍEDRɱÊÖ¹¤¾ß±»°Ë´óÀÕË÷ÍÅ»ï½ÓÄÉ


8ÔÂ7ÈÕ£¬ £¬£¬¾ÝSophosÇå¾²ÍŶÓÑо¿£¬ £¬£¬Ò»ÖÖ±»ÊÓΪRansomHub¿ª·¢µÄ"EDRKillShifter"ÑÝ±ä°æµÄÐÂÐÍEDRɱÊÖ¹¤¾ß£¬ £¬£¬ÒÑÔڰ˸ö²î±ðÀÕË÷Èí¼þÍÅ»ïµÄ¹¥»÷Öб»·¢Ã÷£¬ £¬£¬Éæ¼°RansomHub¡¢Blacksuit¡¢Medusa¡¢Qilin¡¢Dragonforce¡¢Crytox¡¢LynxºÍINC×éÖ¯¡£¡£¡£¡£¡£¡£¸Ã¹¤¾ßµÄ½¹µã¹¦Ð§ÊÇ×ÊÖú¹¥»÷Õ߹رձ»¹¥ÆÆÏµÍ³ÉϵÄÇå¾²²úÆ·£¬ £¬£¬Îª°²ÅÅÀÕË÷Èí¼þÓÐÓÃÔØºÉ¡¢ÌáÉýȨÏÞ¡¢ºáÏòÒÆ¶¯¼°Òþ²Ø¼ÓÃÜ×°±¸´´Á¢Ìõ¼þ¡£¡£¡£¡£¡£¡£ÊÖÒÕ²ãÃæ£¬ £¬£¬¸Ã¹¤¾ß½ÓÄɸ߶ȻìÏýµÄ¶þ½øÖÆÎļþ£¬ £¬£¬ÔËÐÐʱ×ÔÎÒ½âÂë²¢×¢ÈëÕýµ±Ó¦ÓóÌÐòÖС£¡£¡£¡£¡£¡£ÆäÒªº¦»úÖÆÊÇËÑË÷Ó²±àÂëÔÚ¿ÉÖ´ÐÐÎļþÖеÄËæ»úÎå¸ö×Ö·ûÃû³ÆµÄÊý×ÖÊðÃûÇý¶¯³ÌÐò£¬ £¬£¬Ò»µ©·¢Ã÷±ã¼ÓÔØ¶ñÒâÄÚºËÇý¶¯£¬ £¬£¬Í¨¹ý"×Ô´øÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐò"£¨BYOVD£©¹¥»÷»ñÈ¡ÄÚºËȨÏÞ£¬ £¬£¬½ø¶øÖÕÖ¹ÓëAV/EDRÏà¹ØµÄÀú³Ì¼°Ð§ÀÍ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ £¬£¬¸ÃÇý¶¯³£Î±×°³ÉÕýµ±Îļþ£¬ £¬£¬µ«¼¤»îºó»áÖ±½ÓĨɱĿµÄÇå¾²¹¤¾ß¡£¡£¡£¡£¡£¡£ÆäÁýÕֵij§É̹æÄ£ÆÕ±é£¬ £¬£¬°üÀ¨Sophos¡¢Microsoft Defender¡¢¿¨°Í˹»ù¡¢ÈüÃÅÌú¿Ë¡¢Ç÷ÊÆ¿Æ¼¼¡¢SentinelOne¡¢Cylance¡¢McAfee¡¢F-Secure¡¢HitmanProºÍWebrootµÈÖ÷Á÷Çå¾²²úÆ·¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-edr-killer-tool-used-by-eight-different-ransomware-groups/


3. È«Çò×î´ó²»·¨IPTVƽ̨Rare Breed TVÔâACEÈ¡µÞ


8ÔÂ7ÈÕ£¬ £¬£¬´´ÒâÓëÓéÀÖͬÃË£¨ACE£©¿ËÈÕÐû²¼ÀֳɹرÕÈ«Çò×î´ó²»·¨IPTVЧÀÍÌṩÉÌRare Breed TV£¬ £¬£¬²¢ÓëÆäÔËÓªÉ̸濢²ÆÎñÏ¢ÕùЭÒé¡£¡£¡£¡£¡£¡£×ܲ¿Î»ÓÚ±±¿¨ÂÞÀ´ÄÉÖݵÄRare Breed TVÊÇÊý×ÖµÁ°æÁìÓòµÄ¾ÞÍ·£¬ £¬£¬Éù³ÆÓµÓÐÁè¼Ý28,000¸öÖ±²¥ÆµµÀ¼°100,000²¿Ó°Ï·ºÍµçÊÓ¾çµÄ²»·¨×ÊÔ´¿â£¬ £¬£¬ÆäÊÓÆµµã²¥Æ½Ì¨¸ü°üÀ¨14,000¸öδ¾­ÊÚȨµÄ½ÚÄ¿£¬ £¬£¬ºã¾Ãͨ¹ýÿÔÂ15.99ÃÀÔªÖÁÕûÄê79.99ÃÀÔªµÄ¶©ÔÄģʽIJÀû¡£¡£¡£¡£¡£¡£ACE×÷ΪÓÉÈ«Çò50Óà¼ÒÓ°ÊÓÓéÀÖ¾ÞÍ·×é³ÉµÄ·´µÁ°æÍ¬ÃË£¬ £¬£¬ÆäÖÎÀíίԱ»áº­¸ÇÑÇÂíÑ·¡¢µÏÊ¿Äá¡¢Netflix¡¢»ªÄÉÐֵܵȶ¥¼¶¹«Ë¾¡£¡£¡£¡£¡£¡£´Ë´ÎÐж¯ÖУ¬ £¬£¬ACEͨ¹ýÖ´·¨Í¾¾¶Ëø¶¨Rare Breed TV±³ºóµÄʹÓÃÕߣ¬ £¬£¬ÆÈʹÆäÓÀÊÀ¹Ø±Õ²»·¨Æ½Ì¨²¢Ö§¸¶¾Þ¶îÅâ³¥½ð¡£¡£¡£¡£¡£¡£Ö»¹ÜÔÚÉùÃ÷Ðû²¼Ê±£¬ £¬£¬Rare Breed TVÍøÕ¾ÈÔÔÝʱÔÚÏߣ¬ £¬£¬µ«ACEÇ¿µ÷ÔËÓªÉÌÒÑÔÊÐí×èÖ¹ÇÖȨÐÐΪ£¬ £¬£¬²¢½«ÅäºÏºóÐøÊӲ졣¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/technology/massive-illegal-iptv-service-provider-rare-breed-tv-taken-offline/


4. ¸çÂ×±ÈÑÇ´óѧÔâÓö´ó¹æÄ£Êý¾Ýй¶£¬ £¬£¬½ü87ÍòÈËÃô¸ÐÐÅÏ¢ÔâÇÔ


8ÔÂ8ÈÕ£¬ £¬£¬ÃÀ¹ú¸çÂ×±ÈÑÇ´óѧ¿ËÈÕÅû¶һÆðÖØ´óÍøÂçÇå¾²ÊÂÎñ£¬ £¬£¬Ô¼868,969ÃûÏÖÈμ°Ç°ÈÎѧÉú¡¢Ô±¹¤¡¢ÉêÇëÈ˼°¾ìÊôµÄСÎÒ˽¼ÒÐÅÏ¢ÔÚ2025Äê5ÔÂ16ÈÕµÄÍøÂç¹¥»÷Öб»µÁ¡£¡£¡£¡£¡£¡£×÷Ϊ³£´ºÌÙÃËУ֮һ£¬ £¬£¬¸ÃУӵÓÐ35,000ÓàÃûѧÉúºÍ20,000ÃûÔ±¹¤£¬ £¬£¬2024ÄêÔ¤Ëã´ï66ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£ÊÂÎñÔ´ÓÚ6ÔÂ24ÈÕ²¿·ÖϵͳÒì³£ÖÐÖ¹£¬ £¬£¬¾­Íâ²¿ÍøÂçÇ徲ר¼ÒЭÖúÊÓ²ìºó£¬ £¬£¬Ñ§Ð£È·ÈÏδ¾­ÊÚȨµÄµÚÈý·½»á¼ûÁËÆäÍøÂç²¢ÇÔÈ¡Îļþ¡£¡£¡£¡£¡£¡£Ö»¹ÜºÚ¿ÍÔøÐû³Æ»ñÈ¡460GBÊý¾Ý£¬ £¬£¬µ«Ð£·½ÉùÃ÷δ֤ʵÏêϸÊý¾ÝÁ¿£¬ £¬£¬½öÃ÷ȷй¶ÐÅÏ¢º­¸ÇÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢ÁªÏµ·½·¨¡¢Ñ§ÊõÀúÊ·¡¢²ÆÎñÔ®Öú¼Í¼¡¢°ü¹ÜÐÅÏ¢¼°¿µ½¡Êý¾ÝµÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£¡£ÖµµÃÇìÐÒµÄÊÇ£¬ £¬£¬Á¥ÊôµÄÅ·ÎÄҽѧÖÐÐÄ»¼Õ߼ͼδÊܲ¨¼°¡£¡£¡£¡£¡£¡£¸çÂ×±ÈÑÇ´óѧÒÑÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»Õýʽ֪ͨ£¬ £¬£¬²¢Í¨¹ýÃÀ¹úÓÊÕþЧÀÍ֪ͨÊÜÓ°Ïì¸öÌå¡£¡£¡£¡£¡£¡£Îª½µµÍΣº¦£¬ £¬£¬¸ÃУ½«Í¨¹ýKroll¹«Ë¾ÌṩΪÆÚÁ½ÄêµÄÃâ·ÑÐÅÓÃ¼à¿Ø¡¢Ú²Æ­×Éѯ¼°Éí·Ý͵ÇÔ»Ö¸´Ð§ÀÍ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/columbia-university-data-breach-impacts-nearly-870-000-students-applicants-employees/


5. RubyGems¹©Ó¦Á´Ôâ¶ñÒâÈí¼þ¹¥»÷£º60¸öÇÔÃÜ×é¼þÏÂÔØ³¬27.5Íò´Î


8ÔÂ9ÈÕ£¬ £¬£¬×Ô2023Äê3ÔÂÆð£¬ £¬£¬Ò»³¡Õë¶ÔRuby¿ª·¢ÕߵĴó¹æÄ£¹©Ó¦Á´¹¥»÷ÔÚRubyGemsƽ̨һÁ¬·¢½Í¡£¡£¡£¡£¡£¡£Çå¾²»ú¹¹SocketÅû¶£¬ £¬£¬60¸öαװ³ÉÕýµ±¹¤¾ßµÄ¶ñÒâRuby×é¼þ£¨gem£©±»ÏÂÔØÁè¼Ý27.5Íò´Î£¬ £¬£¬Æäͨ¹ýÇÔÈ¡¿ª·¢ÕßÕË»§Æ¾Ö¤ÊµÑéÍøÂç´¹ÂÚ£¬ £¬£¬³ÉΪ½üÄêÀ´×îÑÏÖØµÄ¿ªÔ´Éú̬Çå¾²ÊÂÎñÖ®Ò»¡£¡£¡£¡£¡£¡£ÕâЩ¶ñÒâ×é¼þÓɶà¸ö¹ØÁªÕË»§£¨Èçzon¡¢nowonµÈ£©ÒÔÓÖÃûÐÎʽÐû²¼£¬ £¬£¬Ä£ÄâWordPress¡¢Telegram¡¢NaverµÈÖ÷Á÷ƽ̨µÄ×Ô¶¯»¯¹¤¾ßÃüÃû£¨Èçwp_posting_duo¡¢tg_send_zonµÈ£©£¬ £¬£¬²¢Å䱸ÐéαͼÐνçÃæ£¨GUI£©ÓÕµ¼Óû§ÊäÈëÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýÓ²±àÂëµÄC2ЧÀÍÆ÷ÇÔÈ¡Ã÷ÎÄÓû§ÃûÃÜÂë¡¢×°±¸MACµØµã¼°Èí¼þ°üʹÓÃÊý¾Ý£¬ £¬£¬²¿·Ö×é¼þÉõÖÁαÔìAPIÏìÓ¦ÓÕÆ­Óû§¡£¡£¡£¡£¡£¡£SocketÔÚ¶íÓï°µÍøÊг¡·¢Ã÷À´×Ômarketingduo.co.krµÄ±»µÁƾ֤ÈÕÖ¾£¬ £¬£¬Ö¤Êµ¹¥»÷ÕßÒѽ«Êý¾ÝÓÃÓÚ²»·¨ÉúÒâ¡£¡£¡£¡£¡£¡£RubyGems×÷ΪRubyÓïÑԵĹٷ½°ü¹ÜÀíÆ÷£¬ £¬£¬ÆäÉú̬Çå¾²ÐÔÔÚ´Ë´ÎÊÂÎñÖÐÌ»Â¶ÖØ´óÒþ»¼¡£¡£¡£¡£¡£¡£Ö»¹ÜSocketÒÑÏò¹Ù·½ÍŶӾٱ¨ËùÓÐ60¸ö¶ñÒâ×é¼þ£¬ £¬£¬µ«×èÖ¹±¨¸æÐû²¼Ê±ÈÔÓÐ16¸öδ±»Ï¼ܡ£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/60-malicious-ruby-gems-downloaded-275-000-times-steal-credentials/


6. WinRARÁãÈÕÎó²îÔâ¶íÂÞ˹ºÚ¿Í×é֯ʹÓÃ


8ÔÂ8ÈÕ£¬ £¬£¬½üÆÚ£¬ £¬£¬Ò»¸ö±àºÅΪCVE-2025-8088µÄWinRARĿ¼±éÀúÎó²î±»ÆØ¹â£¬ £¬£¬¸ÃÎó²îÒѱ»¹¥»÷ÕßʹÓÃΪÁãÈÕÎó²îÌá³«ÍøÂç´¹ÂÚ¹¥»÷£¬ £¬£¬ÓÃÓÚÈö²¥Óë¶íÂÞ˹¹ØÁªµÄRomCom¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¾ÝÇå¾²³§ÉÌESETÅû¶£¬ £¬£¬¸ÃÎó²î±£´æÓÚWinRAR 7.13°æ±¾Ö®Ç°µÄËùÓÐWindowsƽ̨²úÆ·ÖУ¬ £¬£¬°üÀ¨RAR¡¢UnRAR½âѹ¹¤¾ß¼°UnRAR.dll¿â£¬ £¬£¬¶øLinux/UnixºÍAndroid°æ±¾²»ÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£Îó²îµÄ½¹µã»úÖÆÔÚÓÚ£¬ £¬£¬¹¥»÷Õß¿Éͨ¹ý½á¹¹¶ñÒâRARѹËõ°ü£¬ £¬£¬ÈƹýWinRARĬÈϵĽâѹ·¾¶ÏÞÖÆ£¬ £¬£¬½«ÎļþÖ±½ÓÌáÈ¡ÖÁWindowsϵͳµÄ×Ô¶¯ÔËÐÐĿ¼¡£¡£¡£¡£¡£¡£µ±Êܺ¦ÕßÏ´εǼϵͳʱ£¬ £¬£¬ÕâЩ±»Ö²ÈëµÄ¿ÉÖ´ÐÐÎļþ½«×Ô¶¯ÔËÐУ¬ £¬£¬´Ó¶øÊµÏÖÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¡£¡£¡£¡£¡£¡£ESETÑо¿Ö°Ô±Peter Stry?ekÖ¸³ö£¬ £¬£¬ÏÖÔÚ¸ÃÎó²îÒѱ»ÓÃÓÚÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷£¬ £¬£¬Í¨¹ý°üÀ¨¶ñÒâRARÎļþµÄÓʼþ¸½¼þÈö²¥RomComºóÃųÌÐò¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ £¬£¬WinRAR¹Ù·½ÒÑÔÚ7.13°æ±¾ÖÐÐÞ¸´´ËÎó²î£¬ £¬£¬µ«ÒòÆäȱ·¦×Ô¶¯¸üлúÖÆ£¬ £¬£¬Óû§ÐèÊÖ¶¯´Ó¹ÙÍøÏÂÔØ×îÐÂ×°Öðü¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/winrar-zero-day-flaw-exploited-by-romcom-hackers-in-phishing-attacks/