ÍøÂç´¹ÂÚ¹¥»÷Ãé×¼GitHub£¬£¬£¬£¬£¬£¬½ü12000´æ´¢¿âÃæÁÙΣº¦

Ðû²¼Ê±¼ä 2025-03-17

1. ÍøÂç´¹ÂÚ¹¥»÷Ãé×¼GitHub£¬£¬£¬£¬£¬£¬½ü12000´æ´¢¿âÃæÁÙΣº¦


3ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬Ò»³¡´ó¹æÄ£µÄÍøÂç´¹ÂڻÕë¶Ô½ü12,000¸öGitHub´æ´¢¿âÌᳫÁËÐéαµÄ¡°Çå¾²¾¯±¨¡±£¬£¬£¬£¬£¬£¬ÍýÏëÓÕÆ­¿ª·¢Ö°Ô±ÊÚȨһ¸ö¶ñÒâµÄOAuthÓ¦ÓóÌÐò¡£¡£¡£¡£¸ÃÓ¦ÓóÌÐòÒ»µ©»ñµÃÊÚȨ£¬£¬£¬£¬£¬£¬½«¸¶Óë¹¥»÷Õß¶ÔÓû§ÕÊ»§ºÍ´úÂëµÄÍêÈ«¿ØÖÆÈ¨¡£¡£¡£¡£ÕâÐ©ÍøÂç´¹ÂÚÎÊÌâ¶¼°üÀ¨ÏàͬµÄÎı¾£¬£¬£¬£¬£¬£¬Éù³Æ¼ì²âµ½À´×Ô±ùµºÀ׿ËÑÅδ¿ËºÍÌØ¶¨IPµØµãµÄÒì³£µÇ¼ʵÑé¡£¡£¡£¡£ÍøÂçÇå¾²Ñо¿Ô±Luc4mÊ×ÏÈ·¢Ã÷ÁËÕâһȦÌ×£¬£¬£¬£¬£¬£¬ÆäÖÐÖÒÑÔÓû§Ó¦¸üÐÂÃÜÂë¡¢¼ì²é»î¶¯»á»°²¢ÆôÓÃË«ÒòËØÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬µ«ËùÓÐÁ´½Ó¾ùÖ¸ÏòÒ»¸öÃûΪ¡°gitsecurityapp¡±µÄ¶ñÒâOAuthÓ¦ÓóÌÐò£¬£¬£¬£¬£¬£¬ÇëÇó´ó×ÚΣÏÕȨÏÞ¡£¡£¡£¡£ÈôÓû§Ê§É÷ÊÚȨ£¬£¬£¬£¬£¬£¬¸ÃÓ¦Óý«»ñÈ¡¶Ô¹«¹²ºÍ˽Óд洢¿âµÄÍêÈ«»á¼û¡¢Óû§×ÊÁÏÖÎÀí¡¢×éÖ¯ÏîÄ¿¶ÁÈ¡¡¢ÌÖÂÛ¶Áд¡¢GitHub gist»á¼û¼°´æ´¢¿âɾ³ýµÈȨÏÞ¡£¡£¡£¡£´Ë´Î»î¶¯Ê¼ÓÚ½ñÈÕÔçÉÏ6:52£¬£¬£¬£¬£¬£¬ÏÖÔÚÈÔÔÚÒ»Á¬£¬£¬£¬£¬£¬£¬ÊÜÓ°Ïì´æ´¢¿âÊýÄ¿ÓÐËù²¨¶¯£¬£¬£¬£¬£¬£¬ÌåÏÖGitHubÕýÔÚ½ÓÄɲ½·¥Ó¦¶Ô¡£¡£¡£¡£ÈôÄúÊÜÓ°Ïì²¢ÒÑÊÚȨ¸Ã¶ñÒâÓ¦Ó㬣¬£¬£¬£¬£¬ÇëÁ¬Ã¦ÔÚGitHubÉèÖÃÖÐ×÷·ÏÆä»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬²¢²éÕÒÈκβ»ÊìϤ»ò¿ÉÒɵÄÓ¦ÓóÌÐò¼°GitHub ActionsÊÂÇéÁ÷¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬½¨ÒéÂÖ»»ÄúµÄƾ֤ºÍÊÚȨÁîÅÆÒÔÔöÇ¿ÕË»§Çå¾²¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/


2. ÃÜ¿ËÂÞÄáÎ÷ÑÇÑÅÆÖÖÝÕþ¸®ÎÀÉúÆø¹¹ÔâÀÕË÷Èí¼þ¹¥»÷ÖÂЧÀÍÖÐÖ¹


3ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬ÃÜ¿ËÂÞÄáÎ÷ÑÇÑÅÆÖÖÝ£¬£¬£¬£¬£¬£¬×÷Ϊ̫ƽÑ󵺹úÃÜ¿ËÂÞÄáÎ÷ÑÇÁª°îµÄËĸöÖÝÖ®Ò»£¬£¬£¬£¬£¬£¬½üÆÚÔâÓöÁËÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£2025Äê3ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬ÑÅÆÖµºÎÀÉú²¿¼ì²âµ½ÕâÒ»¹¥»÷£¬£¬£¬£¬£¬£¬²¢Á¬Ã¦¹Ø±ÕÁËÆäÍøÂçºÍÊý×ÖÒ½ÁÆÏµÍ³ÒÔ±ÜÃâÍþвÀ©É¢¡£¡£¡£¡£¸ÃÖÝÕþ¸®Í¨¹ýFacebookÐû²¼ÁËÇå¾²Îó²î֪ͨ£¬£¬£¬£¬£¬£¬Ðû²¼ËäȻЧÀÍÈÔÔÚ¼ÌÐø£¬£¬£¬£¬£¬£¬µ«ËÙÂʽÏÂý¡£¡£¡£¡£Í¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬Õû¸öÍøÂçÒѱ»ÍÑ»ú£¬£¬£¬£¬£¬£¬ËùÓÐÅÌËã»ú¶¼ÒѹرÕ£¬£¬£¬£¬£¬£¬ÁìÍÁÇå¾²²¿ÕýÓëÏà¹Ø²¿·Ö¼°Ë½ÈËIT³Ð°üÉÌÏàÖú£¬£¬£¬£¬£¬£¬ÆÀ¹ÀÉøÍ¸Ë®Æ½£¬£¬£¬£¬£¬£¬È·¶¨Ãü¾Ýй¶ÇéÐΣ¬£¬£¬£¬£¬£¬²¢Æð¾¢»Ö¸´Ð§ÀÍ¡£¡£¡£¡£ÑÅÆÖÎÀÉú¾ÖÕýÔÚÆäËûÕþ¸®»ú¹¹ºÍÍⲿIT³Ð°üÉ̵ÄЭÖúÏÂÊÓ²ì´Ë´ÎÊÂÎñ£¬£¬£¬£¬£¬£¬²¢Æð¾¢»Ö¸´ÊÜÓ°ÏìµÄϵͳºÍЧÀÍ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬Ì«Æ½ÑóµºÓìÒѶà´Î³ÉΪÀÕË÷Èí¼þ¹¥»÷µÄÄ¿µÄ£¬£¬£¬£¬£¬£¬°üÀ¨ÌÀ¼Ó¡¢ÍßŬ°¢Í¼ºÍ·ÆÂɱöµÈ¹ú¶¼ÔøÔâÊܹý´ËÀ๥»÷¡£¡£¡£¡£


https://securityaffairs.com/175445/cyber-crime/a-ransomware-attack-hit-the-micronesian-state-of-yap.html


3. Çå¾²Ñо¿Ô±Ðû²¼AkiraÀÕË÷Èí¼þLinux±äÖÖGPU½âÃÜÆ÷


3ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬Çå¾²Ñо¿Ô±Yohanes NugrohoÀÖ³ÉÐû²¼ÁËAkiraÀÕË÷Èí¼þLinux±äÖֵĽâÃÜÆ÷¡£¡£¡£¡£¸Ã½âÃÜÆ÷ʹÓÃGPUÄÜÁ¦¼ìË÷½âÃÜÃÜÔ¿£¬£¬£¬£¬£¬£¬ÎÞÐèÓû§ÌṩÃÜÔ¿¼´¿ÉÃ⺬»ìËøÎļþ¡£¡£¡£¡£NugrohoºÍÅó٭ƾ֤AkiraʹÓÃʱ¼ä´ÁÌìÉú¼ÓÃÜÃÜÔ¿µÄ·½·¨£¬£¬£¬£¬£¬£¬Ô­±¾Ô¤¼ÆÒ»ÖÜÄÚÆÆ½â£¬£¬£¬£¬£¬£¬µ«ÒòÖØ´óÐÔÔöÌí£¬£¬£¬£¬£¬£¬×îÖÕºÄʱÈýÖÜ£¬£¬£¬£¬£¬£¬ÆÆ·Ñ1,200ÃÀÔª¹ºÖÃGPU×ÊÔ´¡£¡£¡£¡£AkiraÀÕË÷Èí¼þʹÓÃËĸö²î±ðµÄʱ¼ä´ÁÖÖ×ÓÒÔÄÉÃ뾫¶ÈΪÿ¸öÎļþÌìÉúΨһµÄ¼ÓÃÜÃÜÔ¿£¬£¬£¬£¬£¬£¬²¢Í¨¹ý1,500ÂÖSHA-256¾ÙÐйþÏ£´¦Öóͷ££¬£¬£¬£¬£¬£¬Ê¹ÓÃRSA-4096¼ÓÃܲ¢¸½¼ÓÔÚ¼ÓÃÜÎļþĩβ¡£¡£¡£¡£Ñо¿Ö°Ô±Í¨¹ýÉó²éÈÕÖ¾ÎļþËõСÁ˱©Á¦ÆÆ½âµÄ¿ÉÄÜʱ¼ä´Á¹æÄ££¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃRunPodºÍVast.aiÔÆGPUЧÀÍ£¬£¬£¬£¬£¬£¬×îÖÕʹÓÃ16¿éRTX 4090 GPUÔÚԼĪ10СʱÄÚÇ¿ÐÐÆÆ½âÏàʶÃÜÃÜÔ¿¡£¡£¡£¡£µ«»Ö¸´¼ÓÃÜÎļþÊýÄ¿¶àµÄ»°£¬£¬£¬£¬£¬£¬¸ÃÀú³Ì¿ÉÄÜÐèÒª¼¸Ììʱ¼ä¡£¡£¡£¡£NugrohoÒÑÔÚGitHubÉÏÌṩ½âÃÜÆ÷ºÍ»Ö¸´ÎļþµÄ˵Ã÷£¬£¬£¬£¬£¬£¬µ«Ê¹ÓÃʱÐè×ÔÐм縺Σº¦£¬£¬£¬£¬£¬£¬ÓÉÓÚBleepingComputerÉÐδ²âÊԸù¤¾ßµÄÇå¾²ÐÔ»òÓÐÓÃÐÔ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/gpu-powered-akira-ransomware-decryptor-released-on-github/


4. Coinbase ´¹ÂÚµç×ÓÓʼþʹÓÃÐéαǮ°üǨáãÓÕÆ­Óû§


3ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬Ò»Æð´ó¹æÄ£µÄÍøÂç´¹ÂÚ¹¥»÷Õë¶ÔCoinbaseÓû§£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý·¢ËÍαװµÄµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬Éù³ÆCoinbaseÒªÇóÓû§¹ý¶Éµ½×ÔÍйÜÇ®°ü£¬£¬£¬£¬£¬£¬²¢ÓÕµ¼Óû§Ê¹Óù¥»÷Õß¿ØÖƵÄÔ¤ÌìÉú»Ö¸´¶ÌÓïÉèÖÃÐÂÇ®°ü¡£¡£¡£¡£ÕâЩÓʼþÉù³ÆÀ´×ÔCoinbase£¬£¬£¬£¬£¬£¬µ«ÓʼþµÄ»Ø¸´µØµãºÍ·¢ËÍIPµØµãÈ´ÏÔʾÒì³£¡£¡£¡£¡£Ö»¹ÜÓʼþͨ¹ýÁ˶àÏîµç×ÓÓʼþÇå¾²¼ì²é£¬£¬£¬£¬£¬£¬µ«ÏÖʵÉÏÊÇÍøÂç´¹ÂÚÕ©Æ­¡£¡£¡£¡£´Ë´Î´¹ÂڻµÄÌØµãÊÇÓʼþÖÐûÓд¹ÂÚÁ´½Ó£¬£¬£¬£¬£¬£¬¶øÊǰüÀ¨Ò»¸ö»Ö¸´¶ÌÓ£¬£¬£¬£¬£¬ÓÕµ¼Óû§Ê¹ÓøöÌÓïÉèÖÃÐÂÇ®°ü¡£¡£¡£¡£»£» £»£»£»£»£»Ö¸´¶ÌÓïÊǼÓÃÜÇ®±ÒÇ®°ü˽ԿµÄÈËÀà¿É¶Á°æ±¾£¬£¬£¬£¬£¬£¬ÕÆÎոöÌÓïµÄÈË¿ÉÒÔ»á¼ûÇ®°üÖеļÓÃÜÇ®±ÒºÍNFTs¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬¹¥»÷Õß²¢Î´ÇÔÈ¡Óû§µÄ»Ö¸´¶ÌÓ£¬£¬£¬£¬£¬¶øÊÇÌṩÁËËûÃÇÒÑÖªºÍ¿ØÖƵĶÌÓï¡£¡£¡£¡£Ò»µ©Óû§Ê¹ÓøöÌÓïÉèÖÃÐÂÇ®°ü²¢×ªÈë×ʽ𣬣¬£¬£¬£¬£¬ËùÓÐ×ʲú¶¼½«±»¹¥»÷ÕßÇÔÈ¡¡£¡£¡£¡£CoinbaseÒÑÐû²¼ÖÒÑÔ£¬£¬£¬£¬£¬£¬³ÆËûÃÇÓÀÔ¶²»»áÏò¿Í»§·¢Ëͻָ´¶ÌÓ£¬£¬£¬£¬£¬²¢ÌáÐÑÓû§Ð¡ÐÄ´ËÀàÕ©Æ­¡£¡£¡£¡£¹ØÓÚÒÑÏÝÈëȦÌ×µÄÓû§£¬£¬£¬£¬£¬£¬½¨ÒéѸËÙ½«ÐÂÇ®°üÖеÄ×ʽðת»Ø×Ô¼ºµÄÇ®°ü¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬Óû§Ó¦Ìá¸ßСÐÄ£¬£¬£¬£¬£¬£¬ÓÀÔ¶²»ÒªÊ¹ÓÃͨ¹ýµç×ÓÓʼþºÍÍøÕ¾¹²ÏíµÄ»Ö¸´¶ÌÓ£¬£¬£¬£¬£¬ÒÔ°ü¹Ü×Ô¼ºµÄ¼ÓÃÜÇ®±ÒÇå¾²¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/coinbase-phishing-email-tricks-users-with-fake-wallet-migration/


5. ΪÆÚÒ»ÖܵÄExchange OnlineÖÐÖ¹µ¼Öµç×ÓÓʼþʧ°Ü»òÑÓ³Ù


3ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬Î¢Èí½üÆÚÔâÓöÁ˳¤´ïÒ»ÖܵÄExchange OnlineÖÐÖ¹ÎÊÌ⣬£¬£¬£¬£¬£¬µ¼ÖÂÈ«ÇòÓû§·¢ËÍ»òÎüÊÕµç×ÓÓʼþʱ·ºÆðÑÓ³Ù»òʧ°Ü¡£¡£¡£¡£ËäȻ΢Èíδ¹ûÕæÍ¸Â¶ÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬µ«È·ÈÏ´ËÊÂÎñΪMicrosoft 365ÖÎÀíÖÐÐĸú×ÙµÄÒªº¦Ð§ÀÍÎÊÌâEX1027675¡£¡£¡£¡£ÖÐÖ¹Ó°ÏìÁËʹÓÃÊÜÓ°Ïì»ù´¡ÉèʩЧÀ͵ÄËùÓÐÓû§£¬£¬£¬£¬£¬£¬Ðí¶à¿Í»§ÊÕµ½Î´Ëʹﱨ¸æ£¬£¬£¬£¬£¬£¬ÏÔʾ¡°554 5.6.0 ÓʼþÄÚÈÝË𻵡±¹ýʧ¡£¡£¡£¡£Î¢ÈíÔÚ3ÔÂ10ÈÕÊ×´ÎÈÏ¿ÉÎÊÌ⣬£¬£¬£¬£¬£¬µ«±¨¸æ³ÆÖÐֹʼÓÚ3ÔÂ7ÈÕ¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬£¬£¬£¬ÎÊÌâÔ´ÓÚÖ¼ÔÚ¸ÄÉÆÐÅÏ¢´«ÊäЧÀ͵ĸüÐÂÖеĴúÂë¹ýʧ£¬£¬£¬£¬£¬£¬Ó°ÏìÁ˲¿·ÖЧÀÍ»ù´¡ÉèÊ©¡£¡£¡£¡£Óû§·¢Ã÷ÎÞ·¨·¢ËÍ´ø¸½¼þµÄµç×ÓÓʼþ£¬£¬£¬£¬£¬£¬µ«Ê¹ÓÃZIPÎļþÐÎʽ·¢ËÍ¿ÉÈÆ¹ý´ËÎÊÌâ¡£¡£¡£¡£Ö»¹Ü΢ÈíÒÑÍÆ³öÐÞ¸´³ÌÐò»º½âÁËEX1027675ÎÊÌ⣬£¬£¬£¬£¬£¬µ«ÁíÒ»ÏÕЩÏàͬµÄÊÂÎñEX1030895ÈÔÔÚ±¬·¢£¬£¬£¬£¬£¬£¬´¥·¢Î´Ëʹﱨ¸æµÄ¹ýʧ½öÏÞÓÚһС²¿·ÖÐÂÎż°´øÓÐwinmail.dat¸½¼þµÄ¼äЪÐÔ´¿ÎĽñÈÕÀúÔ¼Çëµç×ÓÓʼþ¡£¡£¡£¡£Î¢ÈíÕýÔÚ²âÊÔDZÔÚÐÞ¸´³ÌÐò£¬£¬£¬£¬£¬£¬²¢¶Ô°üÀ¨ÐÞ¸´³ÌÐòµÄ»úе¾ÙÐÐÓÐÕë¶ÔÐÔµÄÖØÆô£¬£¬£¬£¬£¬£¬Í¬Ê±Ç×½ü¼à¿ØÕï¶ÏÒ£²âÊý¾ÝÒÔÕÒ³öÎÊÌâȪԴ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/week-long-exchange-online-outage-causes-email-failures-delays/


6. ˼¿ÆÐÞ²¹¸ßÑÏÖØÐÔDoSÎó²î£¬£¬£¬£¬£¬£¬ÖÒÑÔBGPͬÃËÉèÖÃΣº¦


3ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬Ë¼¿Æ½üÆÚÐÞ²¹ÁËÒ»¸ö¾Ü¾øÐ§ÀÍ(DoS)Îó²î£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìIOS XR·ÓÉÆ÷ÉϵĽçÏßÍø¹ØÐ­Òé(BGP)Àú³Ì£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷Õßͨ¹ýµ¥¸öBGP¸üÐÂÐÂÎÅÆÆËðBGP¡£¡£¡£¡£´Ë¸ßÑÏÖØÐÔÎó²î£¨CVE-2025-20115£©½öÔÚÉèÖÃÁËBGPͬÃ˵ÄÇéÐÎÏÂÓ°ÏìCisco IOS XR×°±¸£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂBGPÀú³ÌÖØÆô²¢Ô¶³Ì¹Ø±Õ×°±¸¡£¡£¡£¡£Îó²îÔ´ÓÚBGP¸üÐÂʱÄÚ´æË𻵣¬£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ý·¢ËÍÈ«ÐÄÉè¼ÆµÄÐÂÎÅ»òÉè¼ÆÍøÂçʹAS_CONFED_SEQUENCEÊôÐÔÔöÌíµ½255¸ö×ÔÖÎϵͳ±àºÅ»ò¸ü¶àÀ´Ê¹ÓôËÎó²î¡£¡£¡£¡£Cisco IOS XRÈí¼þÓû§ÐèǨáãÖÁÀο¿°æ±¾ÒÔÐÞ¸´´ËÎÊÌ⣬£¬£¬£¬£¬£¬Í¬Ê±½¨Ò齫BGP AS_CONFED_SEQUENCEÊôÐÔÏÞÖÆÎª254¸ö»ò¸üÉÙµÄAS±àºÅÒÔ¼õÇáDZÔÚ¹¥»÷Ó°Ïì¡£¡£¡£¡£Ë¼¿ÆÎ´·¢Ã÷¸ÃÎó²îÒѱ»Ò°ÍâʹÓ㬣¬£¬£¬£¬£¬µ«APNIC²©¿ÍÉϵÄһƪÎÄÕÂÌṩÁ˸ü¶àÊÖÒÕϸ½Ú¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Ë¼¿Æ»¹ÖÒÑÔÁËWebex BroadWorksÖеÄÎó²îºÍCISA±ê¼ÇµÄÆð¾¢Ê¹ÓõÄVPN·ÓÉÆ÷Ô¶³ÌÏÂÁîÖ´ÐÐÎó²î£¬£¬£¬£¬£¬£¬²¢½¨Òé¿Í»§Éý¼¶Ó²¼þÒÔÐÞ¸´ÕâЩÎó²î¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisco-vulnerability-lets-attackers-crash-bgp-on-ios-xr-routers/