Start-Rite¶ùÍ¯Ð¬ÖÆÔìÉÌÔÙ´ÎÔâÓö¿Í»§Ö§¸¶ÐÅϢй¶ÊÂÎñ
Ðû²¼Ê±¼ä 2024-11-1811ÔÂ14ÈÕ£¬£¬£¬£¬£¬¶ùÍ¯Ð¬ÖÆÔìÉÌStart-Rite¿ËÈÕÔâÓöÁËÉæ¼°¿Í»§Ö§¸¶¿¨ÏêϸÐÅÏ¢µÄÑÏÖØÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬ÕâÊǸù«Ë¾ÔÚÒÑÍù°ËÄêÖеڶþ´Î±¬·¢´ËÀàÖØ´óʧÎ󡣡£¡£¡£¡£¡£¡£¾Ý·¢Ë͸ø¿Í»§µÄ֪ͨ³Æ£¬£¬£¬£¬£¬ÈëÇÖÊÂÎñ±¬·¢ÔÚ10ÔÂ14ÈÕÖÁ11ÔÂ7ÈÕÖ®¼ä£¬£¬£¬£¬£¬¿ÉÄÜй¶µÄÐÅÏ¢°üÀ¨Ö§¸¶¿¨ÉϵĿͻ§ÐÕÃû¡¢¿¨×¢²áµØµã¡¢¿¨ºÅ¡¢ÓÐÓÃÆÚºÍ¿¨ÑéÖ¤Öµ(CVV)¡£¡£¡£¡£¡£¡£¡£Start-Rite½¨Òé¿Í»§ÁªÏµÒøÐлòÐÅÓÿ¨ÌṩÉÌÍ£Óò¢Ìæ»»ÐÅÓÿ¨£¬£¬£¬£¬£¬²¢¼á³ÖСÐļìºË¶ÔÕ˵¥¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÒÑÏòÓ¢¹úÊý¾Ý±£»£»£»¤î¿Ïµ»ú¹¹ÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©±¨¸æ´ËÊ£¬£¬£¬£¬£¬²¢ÌåÏÖ½«È«Á¦ÅäºÏ¾¯·½ÊÂÇé¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜStart-RiteÏò¡¶The Register¡·Ö¤ÊµÁ˴˴ι¥»÷£¬£¬£¬£¬£¬µ«ÉÐδ¹ûÕæÈϿɴËÊ¡£¡£¡£¡£¡£¡£¡£Ó¦ÓÃÇ徲ר¼ÒÌåÏÖ£¬£¬£¬£¬£¬´ËÊÂÎñÒý·¢Á˶ÔStart-RiteÇå¾²Ì¬ÊÆµÄÖÊÒÉ£¬£¬£¬£¬£¬ÒÔ¼°Êý¾ÝÔõÑù±»ÇÔÈ¡µÄÎÊÌâ¡£¡£¡£¡£¡£¡£¡£ICO½²»°ÈËÔÚ±¨µÀºó͸¶£¬£¬£¬£¬£¬Start-RiteÒÑÏòÆäת´ïÁËÕâÒ»ÊÂÎñ£¬£¬£¬£¬£¬²¢ÕýÔÚÆÀ¹ÀËùÌṩµÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£
https://www.theregister.com/2024/11/14/smartrite_breach/
2. CISAÖÒÑÔ£ºPalo Alto Networks Expedition¶à¸öÎó²î±»Æð¾¢Ê¹ÓÃ
11ÔÂ15ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Ðû²¼ÖÒÑÔ£¬£¬£¬£¬£¬Ö¸³öÓ°ÏìPalo Alto Networks ExpeditionµÄÁ½¸öÐÂÎó²îCVE-2024-9463ºÍCVE-2024-9465ÕýÔÚ±»Æð¾¢Ê¹Óᣡ£¡£¡£¡£¡£¡£ÕâÁ½¸öÎó²î»®·ÖÉæ¼°ÏÂÁî×¢ÈëºÍSQL×¢È룬£¬£¬£¬£¬CVSSÆÀ·Ö»®·Ö¸ß´ï9.9ºÍ9.3£¬£¬£¬£¬£¬Èô±»ÀÖ³ÉʹÓ㬣¬£¬£¬£¬¹¥»÷Õß¿ÉÔÚExpeditionǨá㹤¾ßÖÐÒÔrootÉí·ÝÖ´ÐÐí§ÒâÏÂÁî»òй¶Êý¾Ý¿âÄÚÈÝ£¬£¬£¬£¬£¬½ø¶ø¿ÉÄܵ¼ÖÂPAN-OS·À»ðǽµÄÓû§Ãû¡¢ÃÜÂë¡¢ÉèÖúÍAPIÃÜԿй¶£¬£¬£¬£¬£¬»òÔÚÒ×Êܹ¥»÷µÄϵͳÉϽ¨ÉèºÍ¶ÁÈ¡Îļþ¡£¡£¡£¡£¡£¡£¡£CISAÒѽ«ÕâЩÎó²îÄÉÈëÒÑÖª±»Ê¹ÓõÄÎó²îĿ¼£¬£¬£¬£¬£¬²¢ÒªÇóÁª°îÃñÊÂÐÐÕþ²¿·Ö»ú¹¹ÔÚ2024Äê12ÔÂ5ÈÕǰӦÓÃÐëÒª¸üС£¡£¡£¡£¡£¡£¡£Palo Alto NetworksÔÚ2024Äê10ÔÂ9ÈÕÐû²¼µÄÇå¾²¸üÐÂÖÐÐÞ¸´ÁËÕâЩÎó²î£¬£¬£¬£¬£¬²¢È·ÈÏÊÕµ½CISA±¨¸æ³ÆÕâЩÎó²îÕýÔÚ±»Ê¹Óᣡ£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Ò»ÖÜǰCISA»¹×ª´ïÁËÁíÒ»¸öÓ°ÏìExpeditionµÄÑÏÖØÎó²îCVE-2024-5910ÕýÔÚ±»Ê¹Ó㬣¬£¬£¬£¬¸ÃÎó²î¿Éµ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄÔ¶³ÌÏÂÁîÖ´ÐУ¬£¬£¬£¬£¬Õë¶Ô»¥ÁªÍøÉÏ̻¶µÄ·À»ðǽÖÎÀí½Ó¿Ú¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2024/11/cisa-flags-critical-palo-alto-network.html
3. RecraftÄ£×Ó´æÇå¾²Îó²î£ºÎÞÒâÖÐй¶Ãô¸ÐϵͳָÁîÒý·¢¹Ø×¢
11ÔÂ14ÈÕ£¬£¬£¬£¬£¬¾ÝCyber Security News±¨µÀ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±Ôڸ߼¶È˹¤ÖÇÄÜͼÏñÌìÉúÄ£×ÓÖз¢Ã÷ÁËDZÔÚµÄÇå¾²Îó²î£¬£¬£¬£¬£¬ÌØÊâÊÇÔÚRecraftÄ£×ÓÖУ¬£¬£¬£¬£¬¸ÃÄ£×ÓÔÚÎı¾µ½Í¼Æ¬ÅÅÐаñÉÏ´¦ÓÚÁìÏÈְλ¡£¡£¡£¡£¡£¡£¡£Recraft½ÓÄÉÁ½¼¶¼Ü¹¹£¬£¬£¬£¬£¬Á¬ÏµÁË´óÐÍÓïÑÔÄ£×ÓºÍÀ©É¢Ä£×Ó£¬£¬£¬£¬£¬Äܹ»´¦Öóͷ£ÖØ´óÅÌÎʲ¢ÌìÉú¸ü׼ȷ¡¢¸üÄܸÐÖªÉÏÏÂÎĵÄͼÏñ¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬Í¨¹ýÄ³Ð©ÌØ¶¨ÌáÐÑ£¬£¬£¬£¬£¬¿ÉÒÔÓÕʹRecraftй¶²¿·ÖÄÚ²¿Ö¸Á£¬£¬£¬£¬°üÀ¨ÏµÍ³ÌáÐÑÆ¬¶ÏºÍÏêϸָµ¼´óÄ£×ÓÐÐΪµÄ˵Ã÷¡£¡£¡£¡£¡£¡£¡£ÕâЩй¶µÄÖ¸Áî°üÀ¨ÐÎÃ²Æø¸Å¡¢ÎïÌåºÍÈËÎïµÄÏêϸÐÎò¡¢ÐÎòÐÔ¾ä×Ó¡¢¹¹Í¼Ï¸½ÚÒÔ¼°×èֹʹÓõĴÊÓïµÈ¡£¡£¡£¡£¡£¡£¡£ÕâÖÖÎÞÒâÖÐй¶ϵͳÌáÐѵÄÐÐΪÒý·¢ÁËÈËÃǶÔÈ˹¤ÖÇÄÜÄ£×ÓÇå¾²ÐÔºÍÒþ˽ÐԵĵ£ÐÄ¡£¡£¡£¡£¡£¡£¡£ÈôÊǶñÒâÐÐΪÕßÄܹ»ÌáÈ¡ÕâЩÃô¸ÐÖ¸Á£¬£¬£¬£¬ËûÃÇ¿ÉÄÜ»áʹÓÃϵͳ¡¢ÈƹýÇå¾²²½·¥»òÉîÈëÏàʶרÓеÄÈ˹¤ÖÇÄÜÊÖÒÕ¡£¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬ÕâÒ»ÊÂÎñΪAI¿ª·¢Ö°Ô±ºÍÑо¿Ö°Ô±ÇÃÏìÁ˾¯ÖÓ£¬£¬£¬£¬£¬ÌáÐÑËûÃDZØÐèÈ·±£ÕâЩϵͳµÄÇå¾²ÐÔºÍÍêÕûÐÔ£¬£¬£¬£¬£¬Ëæ×ÅAIÊÖÒÕµÄһֱǰ½øºÍ¸üÉîÈëµØÈÚÈëÎÒÃÇÉúÑĵĸ÷¸ö·½Ã棬£¬£¬£¬£¬ÕâÒ»µã±äµÃÓÈΪÖ÷Òª¡£¡£¡£¡£¡£¡£¡£
https://cybersecuritynews.com/researchers-warn-of-ai-image-generators/#google_vignette
4. ð³äAI±à¼Æ÷ÍÆ¶¯ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þѬȾWindowsºÍmacOS
11ÔÂ16ÈÕ£¬£¬£¬£¬£¬½üÆÚð³äAIͼÏñºÍÊÓÆµÌìÉúÆ÷³ÉÎªÍøÂç¹¥»÷µÄÐÂÊֶΣ¬£¬£¬£¬£¬Í¨¹ýʹÓÃLumma Stealer£¨Õë¶ÔWindows£©ºÍAMOS£¨Õë¶ÔmacOS£©ÕâÁ½ÖÖÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬£¬£¬£¬£¬Ñ¬È¾Óû§×°±¸²¢ÇÔÈ¡¼ÓÃÜÇ®±ÒÇ®°ü¡¢Æ¾Ö¤¡¢ÃÜÂë¡¢ÐÅÓÿ¨ÐÅÏ¢¼°ä¯ÀÀÀúÊ·µÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¡£ÕâЩ±»ÇÔÈ¡µÄÊý¾Ý»á±»´ò°ü·¢Ëͻع¥»÷Õߣ¬£¬£¬£¬£¬ÓÃÓÚ½øÒ»²½¹¥»÷»òÔÚºÚÊÐÉϳöÊÛ¡£¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²Ñо¿Ô±·¢Ã÷£¬£¬£¬£¬£¬¹¥»÷Õß½¨ÉèÁËð³äEditPro AI±à¼Æ÷µÄÐéÎ±ÍøÕ¾£¬£¬£¬£¬£¬Í¨¹ýËÑË÷Ч¹ûºÍ¹ã¸æÍƹãÉî¶ÈαÔìµÄÕþÖÎÊÓÆµ£¬£¬£¬£¬£¬ÓÕµ¼Óû§ÏÂÔØÎ±×°³ÉEditProAIÓ¦ÓóÌÐòµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£WindowsºÍmacOSÓû§»®·Ö»áÊÕµ½ÃûΪ¡°Edit-ProAI-Setup-newest_release.exe¡±ºÍ¡°EditProAi_v.4.36.dmg¡±µÄÎļþ¡£¡£¡£¡£¡£¡£¡£ÕâЩÎļþÓÉÇÔÈ¡µÄ´úÂëÊðÃûÖ¤ÊéÊðÃû£¬£¬£¬£¬£¬²¢Í¨¹ýÌØ¶¨Ãæ°å·¢Ëͱ»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£¡£ÍøÂçÇ徲ר¼Ò½¨Ò飬£¬£¬£¬£¬ÈôÔøÏÂÔØ¸Ã³ÌÐò£¬£¬£¬£¬£¬Ó¦Á¬Ã¦ÖØÖÃËùÓÐÃÜÂë²¢ÆôÓöàÒòËØÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fake-ai-video-generators-infect-windows-macos-with-infostealers/
5. ÃÀµäÖÊ´û¿î»ú¹¹ÔâÊý¾Ýй¶£¬£¬£¬£¬£¬17Íò¿Í»§SSNµÈÐÅÏ¢±»µÁ
11ÔÂ15ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÉçÇøµäÖÊ´û¿îÊÜÀí¹«Ë¾£¨ÒÔAnnieMac Home MortgageÃûÒåÔËÓª£©ÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬Ò»ÃûÈëÇÖÕßÔÚ8ÔÂ21ÈÕÖÁ23ÈÕʱ´úÈëÇÖÆäϵͳ£¬£¬£¬£¬£¬ÇÔÈ¡ÁË171,000Ãû¿Í»§µÄСÎÒ˽¼ÒÊý¾Ý£¬£¬£¬£¬£¬°üÀ¨ÐÕÃûºÍÉç»áÇå¾²ºÅÂë(SSN)¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚûÓÐÖ¤¾ÝÅú×¢ÕâЩÊý¾ÝÒÑÔÚ°µÍøÉϱ»ÀÄÓ㬣¬£¬£¬£¬µ«AnnieMacÒѽÓÄÉÌØÊâÇå¾²²½·¥±ÜÃâÀàËÆÊÂÎñÔٴα¬·¢£¬£¬£¬£¬£¬²¢ÏòÊÜÓ°Ïì¿Í»§Ìṩ12¸öÔµÄÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»£»¤¡£¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹Ìṩ¶àÖÖµäÖÊ´û¿î²úÆ·£¬£¬£¬£¬£¬°üÀ¨Õë¶ÔµÍÊÕÈë»òÐÅÓÃÆÀ¼¶½Ï²î¹º·¿ÕßµÄÍýÏ룬£¬£¬£¬£¬ÈçOneUPÍýÏëÔÊÐíÂò¼Ò½öÓÃ1%µÄÊ׸¶¹º·¿¡£¡£¡£¡£¡£¡£¡£Óë¸üÆÕ±éµÄÊý¾Ýй¶Ïà±È£¬£¬£¬£¬£¬´Ë´Îй¶µÄÊý¾ÝÀàÐÍÏà¶Ô½ÏÉÙ£¬£¬£¬£¬£¬µ«SSNµÄй¶ÈÔ±£´æÎ£º¦£¬£¬£¬£¬£¬¿ÉÄÜË𺦿ͻ§µÄÐÅÓÃÆÀ·Ö£¬£¬£¬£¬£¬ÌØÊâÊÇÄÇЩÐÅÓÃÆÀ·ÖÔÀ´¾ÍÒ»Ñùƽ³£µÄ¿Í»§¡£¡£¡£¡£¡£¡£¡£
https://www.theregister.com/2024/11/15/anniemac_data_breach/
6. GeoVision±¨·Ï×°±¸ÁãÈÕÎó²îÔâʹÓ㬣¬£¬£¬£¬½©Ê¬ÍøÂçÈëÇÖΣº¦¾çÔö
11ÔÂ15ÈÕ£¬£¬£¬£¬£¬¶ñÒâÈí¼þ½©Ê¬ÍøÂçÕýÔÚʹÓÃGeoVision±¨·Ï×°±¸ÖеĸßΣÁãÈÕÎó²îCVE-2024-11120¾ÙÐÐÈëÇÖ£¬£¬£¬£¬£¬²¢ÕÐļÕâЩװ±¸¾ÙÐпÉÄܵÄDDoS¹¥»÷»ò¼ÓÃÜÍÚ¾ò¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚ×°±¸ÉÏÖ´ÐÐí§ÒâϵͳÏÂÁ£¬£¬£¬£¬ÒÑÓ°Ïì¶à¿î²»ÔÙÊܹ©Ó¦ÉÌÖ§³ÖµÄGeoVision×°±¸Ðͺ𣡣¡£¡£¡£¡£¡£¾ÝÍþв¼à¿ØÆ½Ì¨Shadowserver Foundation±¨¸æ£¬£¬£¬£¬£¬Ô¼ÓÐ17,000̨GeoVision×°±¸ÔÚÏß̻¶£¬£¬£¬£¬£¬Ò×Êܹ¥»÷£¬£¬£¬£¬£¬ÆäÖдó´ó¶¼Î»ÓÚÃÀ¹ú¡£¡£¡£¡£¡£¡£¡£¸Ã½©Ê¬ÍøÂçÒÉΪMiraiµÄ±äÖÖ¡£¡£¡£¡£¡£¡£¡£ÈôÊÇ·¢Ã÷×°±¸¹ýÈÈ¡¢ÔËÐлºÂý¡¢ÎÞÏìÓ¦»òÉèÖñ»¸ü¸ÄµÈ¼£Ï󣬣¬£¬£¬£¬½¨ÒéÖØÖÃ×°±¸¡¢¸ü¸ÄÃÜÂë¡¢¹Ø±ÕÔ¶³Ì»á¼û²¢ÖÃÓÚ·À»ðǽºó¡£¡£¡£¡£¡£¡£¡£ÀíÏëÇéÐÎÏ£¬£¬£¬£¬£¬Ó¦Ìæ»»ÕâЩװ±¸£¬£¬£¬£¬£¬Èô²»¿ÉÄÜ£¬£¬£¬£¬£¬ÔòÓ¦¸ôÀë²¢Ç×½ü¼à¿Ø¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/botnet-exploits-geovision-zero-day-to-install-mirai-malware/