»¥ÁªÍøµµ°¸¹Ý£¨Archive.org£©Òò¶Ïµçµ¼ÖÂЧÀÍÖÜÈ«ÖÐÖ¹
Ðû²¼Ê±¼ä 2025-03-271. »¥ÁªÍøµµ°¸¹Ý£¨Archive.org£©Òò¶Ïµçµ¼ÖÂЧÀÍÖÜÈ«ÖÐÖ¹
3ÔÂ26ÈÕ£¬£¬£¬»¥ÁªÍøµµ°¸¹Ý£¨Internet Archive£©×÷Ϊ³ÐÔØWayback MachineµÄÊý×ÖÀúÊ·±¦¿â£¬£¬£¬¿ËÈÕÒòÍ»·¢¶Ïµçµ¼ÖÂЧÀÍÖÜÈ«ÖÐÖ¹£¬£¬£¬Òý·¢È«ÇòÓû§¹Ø×¢¡£¡£¡£¡£¡£¸Ã»ú¹¹Í¨¹ýÉ罻ýÌå֤ʵ£¬£¬£¬¹¤³ÌʦÍŶÓÕýÔÚ½ôÆÈÇÀÐÞµçÁ¦¹ÊÕÏÒÔ»Ö¸´»á¼û£¬£¬£¬µ«´Ë´ÎÊÂÎñµÄʱ¼ä½ÚµãÇ¡·êÆäÇ徲Σ»£»£»£»£»úÃô¸ÐÆÚ£¬£¬£¬Òý·¢Íâ½ç¶ÔÊÂÎñ¹ØÁªÐÔµÄÒܲ⡣¡£¡£¡£¡£×÷ΪÉúÑÄ»¥ÁªÍøÓ°ÏóµÄ½¹µã»ù´¡ÉèÊ©£¬£¬£¬»¥ÁªÍøµµ°¸¹Ý²»µ«´æ´¢×ź£Á¿ÀúÊ·ÍøÒ³¡¢Êé¼®¡¢ÒôÊÓÆµ×ÊÁÏ£¬£¬£¬¸ü¼ç¸º×ÅÊý×ÖÎÄ»¯ÒŲú±£»£»£»£»£»¤µÄÖ÷ҪʹÃü¡£¡£¡£¡£¡£´Ë´Îå´»úÊÂÎñÖ±½ÓÓ°ÏìÑо¿Ö°Ô±¡¢ÀúʷѧÕß¼°ÒÀÀµÆäÊý¾Ý¾ÙÐÐÎÄ»¯Ñо¿µÄÈ«ÇòÓû§ÈºÌå¡£¡£¡£¡£¡£¹Ù·½Ðû²¼µÄ"ÔÝʱÀëÏß"ÉùÃ÷Ë佫Ե¹ÊÔÓÉÃ÷È·¹éÒòÓÚµçÁ¦¹©Ó¦ÎÊÌ⣬£¬£¬µ«±¬·¢Ôڸûú¹¹¸ÕÂÄÀú´ó¹æÄ£DDoS¹¥»÷£¨2024Äê10Ô£©¼°3100ÍòÓû§ÕË»§Êý¾Ýй¶ÊÂÎñÖ®ºó£¬£¬£¬ÈÔÄÑÃâÒý·¢¶Ô»ù´¡ÉèÊ©Çå¾²ÈÍÐÔµÄÉî¶ÈÌÖÂÛ¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬´Ë´ÎµçÁ¦¹ÊÕÏÓëǰÆÚÍøÂç¹¥»÷ÊÇ·ñ×é³ÉÒò¹ûÁ´ÉÐδ»ñµÃ¹Ù·½Ö¤Êµ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬°üÀ¨Wayback MachineÔÚÄڵĽ¹µãЧÀÍÒѻָ´ÔËÐУ¬£¬£¬µ«´Ë´ÎÊÂÎñÔÙ´ÎÇÃÏìÊý×Ö´æµµ»ú¹¹Çå¾²·À»¤µÄ¾¯ÖÓ¡£¡£¡£¡£¡£
https://hackread.com/internet-archive-archive-org-down-power-outage/
2. StreamElementsÒòÀúÊ·ÏàÖú·½Îó²îÖÂÓû§Êý¾Ýй¶
3ÔÂ26ÈÕ£¬£¬£¬ÔÆÁ÷ýÌåЧÀÍÆ½Ì¨StreamElementsÈ·ÈÏÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬Ð¹Â¶Ô´Í·ÎªÒÑÖÕÖ¹ÏàÖúµÄµÚÈý·½Ð§ÀÍÌṩÉÌ¡£¡£¡£¡£¡£¹«Ë¾½ôÆÈÉùÃ÷Ç¿µ÷×ÔÉíЧÀÍÆ÷δ±»ÈëÇÖ£¬£¬£¬µ«ÈÏ¿É2020-2024Äê¼äͨ¹ý¾ÉÏàÖúͬ°é´æ´¢µÄÓû§Êý¾ÝÔ⵽й¶£¬£¬£¬ÊÜÓ°ÏìÐÅÏ¢°üÀ¨Óû§È«Ãû¡¢µØµã¡¢µç»°¼°µç×ÓÓÊÏäµÈÃô¸Ð×ÊÁÏ¡£¡£¡£¡£¡£ºÚ¿Í×éÖ¯Éù³ÆÍ¨¹ý¶ñÒâÈí¼þѬȾԱ¹¤×°±¸£¬£¬£¬½ø¶ø½ÓÊÜÄÚ²¿ÕË»§²¢»á¼û¶©µ¥ÖÎÀíϵͳʵÑéÊý¾ÝÇÔÈ¡¡£¡£¡£¡£¡£Ö»¹ÜÏêϸй¶¹æÄ£ÉÐδ¾¹Ù·½È·ÈÏ£¬£¬£¬µ«Æ½Ì¨ÒÑÏòÓû§·¢³öÍøÂç´¹ÂÚ¹¥»÷Ô¤¾¯£¬£¬£¬ÌØÊâÖ¸³ö²»·¨·Ö×Ó¿ÉÄÜʹÓô˴ÎÊÂÎñαÔì"Êý¾Ýй¶֪ͨ"ÓʼþʵÑéÕ©Æ¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÒý¿¯ÐÐÒµ¶Ô¹©Ó¦Á´Çå¾²µÄ¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£¹«Ë¾ÌåÏÖÕýÔÚÁªºÏµÚÈý·½Õö¿ªÊӲ죬£¬£¬µ«ÉÐδÆô¶¯ÕýʽµÄÓû§Í¨ÖªÁ÷³Ì¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ºÚ¿ÍÔÚBreachForumsÐû²¼µÄй¶ÉùÃ÷Òѱ»É¾³ý£¬£¬£¬ÊÂÎñºóÐøÉú³¤ÈÔÐèÒ»Á¬×·×Ù¡£¡£¡£¡£¡£Ç徲ר¼Ò½¨ÒéÏà¹ØÊ±¶Î×¢²áÓû§Á¬Ã¦ÌáÉýÕË»§Ç徲Ʒ¼¶£¬£¬£¬ÆôÓöàÒòËØÈÏÖ¤²¢¼à¿ØÒì³£µÇ¼ÐÐΪ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/streamelements-discloses-third-party-data-breach-after-hacker-leaks-data/
3. ÍøÂç·¸·¨Æ½Ì¨Atlantis AIO×Ô¶¯»¯¹¥»÷Íþв140¶à¸öÔÚÏßЧÀÍ
3ÔÂ26ÈÕ£¬£¬£¬ÐÂÐÍÍøÂç·¸·¨Æ½Ì¨"Atlantis AIO"µÄ¸¡ÏÖÕ¹ÏÖÍøÂçºÚ²úÕý¼ÓËÙÏòЧÀÍ»¯×ªÐÍ¡£¡£¡£¡£¡£¸Ã·¸·¨¼´Ð§ÀÍ(CSaaS)¹¤¾ßÕë¶ÔÈ«Çò140Óà¸ö¸ß¼ÛÖµÔÚÏßЧÀÍÌṩ×Ô¶¯»¯¹¥»÷½â¾ö¼Æ»®£¬£¬£¬º¸Çµç×ÓÓʼþ¡¢µçÉÌ¡¢½ðÈÚ¼°VPNµÈÃô¸ÐÁìÓò¡£¡£¡£¡£¡£Æä½¹µã¹¦Ð§°üÀ¨Èý´ó¹¥»÷Ä£¿£¿£¿é£ºÍ¨¹ý±©Á¦ÆÆ½âºÍÕË»§»Ö¸´Á÷³Ì×Ô¶¯»¯ÊµÑ鯾֤Ìî³ä¹¥»÷£¬£¬£¬Á¬ÏµCAPTCHAÈÆ¹ýÊÖÒÕÌáÉý¹¥»÷ЧÂÊ£¬£¬£¬×îÖÕ½«±»µÁÕË»§ÅúÁ¿×ªÊÛÓÚµØÏÂÊг¡Ä²Àû¡£¡£¡£¡£¡£Æ¾Ö¤Ìî³ä¹¥»÷×÷Ϊ×îÆÕ±éµÄÍøÂç·¸·¨ÊֶΣ¬£¬£¬ºã¾ÃÀ§ÈÅOkta¡¢PayPalµÈ´óÐÍÆóÒµ¡£¡£¡£¡£¡£Atlantis AIO½«´ËÀ๥»÷ÎäÆ÷»¯£¬£¬£¬Ìṩģ¿£¿£¿é»¯¶¨ÖÆÐ§ÀÍ£¬£¬£¬Ê¹µÍÊÖÒÕÃż÷·¸·¨ÕßÒà¿ÉʵÑ龫׼¹¥»÷¡£¡£¡£¡£¡£Æä¹¥»÷Á´ÏÔʾ£¬£¬£¬¹¥»÷ÕßÊ×ÏÈʹÓÃй¶Êý¾Ý¿âÖÐµÄÆ¾Ö¤ÊµÑéÅúÁ¿µÇ¼ʵÑ飬£¬£¬Á¬ÏµÈõÃÜÂë×ֵ䱩Á¦ÆÆ½â£¬£¬£¬¼Ì¶øÀÄÓÃÕË»§»Ö¸´»úÖÆ½ÓÊÜδÆôÓöàÒòËØÈÏÖ¤µÄÕË»§¡£¡£¡£¡£¡£µ½Êֺ󣬣¬£¬±»µÁÕË»§ÒÔÿ¸ö0.5ÃÀÔªÆð¼ÛÔÚ°µÍø×ªÊÛ£¬£¬£¬ÐγÉÍêÕûµÄÐþÉ«¹¤ÒµÁ´¡£¡£¡£¡£¡£Ç徲ר¼Ò½¨ÒéΪСÎÒ˽¼ÒÕË»§ÉèÖÃÇ¿ÃÜÂë+¶àÒòËØÈÏÖ¤Ë«ÖØ°ü¹Ü£¬£¬£¬ÊµÊ±ÏìÓ¦Òì³£µÇ¼Ԥ¾¯£»£»£»£»£»ÆóÒµÔòÐè°²ÅÅËÙÂÊÏÞÖÆ¡¢ÐÐΪÆÊÎöµÈÊÖÒÕÊֶΣ¬£¬£¬Éý¼¶CAPTCHA·À»¤ÏµÍ³£¬£¬£¬¹¹½¨×Ô¶¯·ÀÓù»úÖÆ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-atlantis-aio-automates-credential-stuffing-on-140-services/
4. ArkanaÀÕË÷×éÖ¯ÈëÇÖÃÀ¹úµçÐÅÌṩÉÌWideOpenWest
3ÔÂ26ÈÕ£¬£¬£¬ÐÂÐÍÀÕË÷Èí¼þ×éÖ¯"Arkana Security"Ìᳫ¸ßΣº¦ÐÔÍøÂç¹¥»÷£¬£¬£¬Ä¿µÄÖ±Ö¸ÃÀ¹úµÚÁù´óµçÐÅÔËÓªÉÌWideOpenWest£¨WOW!£©¡£¡£¡£¡£¡£¹¥»÷ÕßÉù³ÆÒÑÉøÍ¸ÆóÒµ½¹µãϵͳ£¬£¬£¬²»µ«ÇÔÈ¡°üÀ¨403,000¼°220ÍòÌõÓû§ÕË»§µÄÃô¸ÐÊý¾Ý¿â£¬£¬£¬¸üʵÏÖ¶ÔÒªº¦ÔËӪϵͳ£¨AppianCloudÓëSymphonica£©µÄÍêÈ«¿ØÖÆ¡£¡£¡£¡£¡£±»µÁÊý¾Ýº¸ÇÓû§Æ¾Ö¤¡¢Çå¾²ÐÅÏ¢¡¢È¨ÏÞÉèÖõȽ¹µã×ʲú£¬£¬£¬ÆäչʾµÄ¹¥»÷ÄÜÁ¦ÏÔʾ¿ÉʵÑé¶ñÒâÈí¼þ°²ÅÅ¡¢½ðÈÚÉúÒâ¸Ä¶¯µÈÉî¶ÈÆÆË𡣡£¡£¡£¡£¸Ã×éÖ¯½ÓÄÉË«ÖØÀÕË÷Õ½ÂÔ£ºÒ»·½ÃæÔÚTor°µÍø¹ûÕæ²¿·ÖÊý¾ÝÑù±¾Ê©Ñ¹£¬£¬£¬ÍþвÈô²»Öª×ãÊê½ðÒªÇó½«È«Á¿³öÊÛÊý¾Ý£»£»£»£»£»ÁíÒ»·½ÃæÊµÑé"ÈËÈâËÑË÷"£¬£¬£¬Ð¹Â¶ÆóÒµ¸ß¹ÜСÎÒ˽¼ÒÐÅÏ¢¾ÙÐÐÐßÈè¹¥»÷¡£¡£¡£¡£¡£Çå¾²ÆÊÎöÖ¸³ö£¬£¬£¬´ËÀ๥»÷¶ÔµçÐÅЧÀÍÉÌµÄÆÆËð¾ßÓÐÁ¬ËøÐ§Ó¦¡ª¡ª¿Í»§ÐÅÈαÀËú½«Ö±½Ó¹¥»÷ЧÀÍÐø¶©ÂÊ£¬£¬£¬¶øÖ´·¨ºÏ¹æ±¾Ç®¿ÉÄÜÍ»ÆÆÍòÍòÃÀÔªÁ¿¼¶¡£¡£¡£¡£¡£
https://www.securityweek.com/new-ransomware-group-claims-attack-on-us-telecom-firm-wideopenwest/
5. Sydney ToolsÊý¾Ý¿âй¶¿Í»§¶©µ¥ÓëÔ±¹¤Ãô¸ÐÐÅÏ¢
3ÔÂ25ÈÕ£¬£¬£¬°Ä´óÀûÑÇרҵ¹¤¾ßÁãÊÛÉÌSydney ToolsÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬Ì»Â¶µÄδ¼ÓÃÜÊý¾Ý¿âÒ»Á¬Ð¹Â¶Ô±¹¤¼°¿Í»§Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨5000ÓàÃûÏÖÖ°¼°È¥Ö°Ô±¹¤µÄÐÕÃû¡¢²¿·Ö¡¢Ð½×ʼ°ÏúÊÛÄ¿µÄµÈ½¹µãÈËÁ¦×ÊÔ´ÐÅÏ¢£¬£¬£¬Í¬Ê±Éæ¼°³¬3400ÍòÌõ¿Í»§ÔÚÏß¶©µ¥¼Í¼£¬£¬£¬º¸ÇÐÕÃû¡¢×¡Ö·¡¢µç»°¡¢ÓÊÏä¼°¹ºÖÃÃ÷ϸµÈСÎÒ˽¼ÒÒþ˽¡£¡£¡£¡£¡£Çå¾²Ñо¿Ö°Ô±ÖÒÑÔ£¬£¬£¬´Ë´Îй¶ÐγÉË«ÖØ¹¥»÷Ãæ£ºÔ±¹¤Êý¾Ý¿É±»ÓÃÓڲ߻®¸ß¹ÜÓã²æÊ½´¹ÂÚ¹¥»÷£¬£¬£¬¶ø¿Í»§¹ºÖüͼÖеĸ߼ÛÉÌÆ·ÐÅÏ¢ÔòÎªÍøÂç·¸·¨·Ö×ÓÌṩÁ˾«×¼Õ©ÆÄ¿µÄ¡£¡£¡£¡£¡£¹¥»÷Õß¿Éͨ¹ýαÔì¶©µ¥È·ÈÏÓʼþ»òÎïÁ÷֪ͨ£¬£¬£¬ÓÕµ¼Êܺ¦Õß½øÒ»²½Ð¹Â¶Ãô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¸üÑÏËàµÄÊÇ£¬£¬£¬Ö»¹ÜÒÑ·¢Ã÷Îó²î£¬£¬£¬Ì»Â¶Êý¾Ý¿âÈÔδ¹Ø±Õ£¬£¬£¬Êý¾ÝÒ»Á¬Íâй״̬¼Ó¾çÁËΣº¦¡£¡£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬ÆóÒµ¹Ù·½×ª´ïµÄǧÃûÔ±¹¤¹æÄ£Óëй¶Êý¾ÝÖеÄ5000È˼ͼ±£´æÏÔÖøÃ¬¶Ü£¬£¬£¬ÌåÏÖÈ¥Ö°Ô±¹¤ÐÅÏ¢ÒàÔâ̻¶¡£¡£¡£¡£¡£´ËÀà°üÀ¨Ð½×ÊˮƽµÄÃô¸ÐÊý¾Ý£¬£¬£¬Á¬Ïµ¼ÒͥסַµÈµØÀíÐÅÏ¢£¬£¬£¬½«¼«´óÌáÉýÉí·Ý͵ÇÔ·¸·¨µÄÀÖ³ÉÂÊ¡£¡£¡£¡£¡£×¨¼Ò½¨ÒéÊÜÓ°ÏìÓû§Á¬Ã¦¼ì²éÕË»§Òì³££¬£¬£¬ÆôÓöàÒòËØÈÏÖ¤£¬£¬£¬²¢¼à¿ØÐ¡ÎÒ˽¼ÒÕ÷Ðű¨¸æ×ª±ä¡£¡£¡£¡£¡£ÆóÒµÔòÐèÖÜÈ«Éó²éÊý¾ÝȨÏÞÖÎÀí£¬£¬£¬ÊµÑéÊý¾Ý¿â¼ÓÃܺͻá¼ûÉ󼯣¬£¬£¬½¨Éè×Ô¶¯»¯Îó²îɨÃè»úÖÆ¡£¡£¡£¡£¡£
https://cybernews.com/security/sydney-tools-exposed-data-leak/
6. ChromeÐÞ¸´¸ßΣÁãÈÕÎó²î£¬£¬£¬×è¶ÏÕë¶Ô¶í»ú¹¹Ìع¤¹¥»÷Á´
3ÔÂ26ÈÕ£¬£¬£¬¹È¸è½ôÆÈÐÞ¸´Á˱àºÅΪCVE-2025-2783µÄ¸ßΣChromeÁãÈÕÎó²î£¬£¬£¬¸ÃÎó²îÔÊÐí¹¥»÷ÕßÈÆ¹ýä¯ÀÀÆ÷ɳºÐ·À»¤£¬£¬£¬ÔÚÄ¿µÄϵͳִÐжñÒâ´úÂë¡£¡£¡£¡£¡£¸ÃÎó²îÓÉ¿¨°Í˹»ùÇå¾²ÍŶӷ¢Ã÷£¬£¬£¬ÆäʵÖÊΪWindowsϵͳMojo×é¼þÔÚ´¦Öóͷ£Î´Ã÷È·½ç˵µÄ²Ù×÷ʱ±¬·¢Î£ÏÕ¾ä±ú£¬£¬£¬¿É±»Ê¹ÓÃʵÏÖɳºÐÌÓÒÝ¡£¡£¡£¡£¡£¹È¸èÒÑΪ×ÀÃæÎȹ̰æÓû§ÍÆËÍ134.0.6998.178¸üУ¬£¬£¬Óû§Òà¿É¿ªÆô×Ô¶¯¸üй¦Ð§»ñÈ¡ÐÞ¸´¡£¡£¡£¡£¡£Çå¾²ÆÊÎöÏÔʾ£¬£¬£¬¸ÃÎó²îÕý±»ÓÃÓÚÕë¶Ô¶íÂÞ˹ýÌå¡¢½ÌÓý»ú¹¹µÄÍøÂçÌØ¹¤»î¶¯£¬£¬£¬¹¥»÷Õßͨ¹ýαÔì"ÆÕÀïÂí¿Æ·òÔĶÁ"¿ÆÑ§ÂÛ̳ԼÇ뺯ʵÑé´¹ÂÚ¹¥»÷£¬£¬£¬½«Êܺ¦ÕßÖØ¶¨ÏòÖÁ¶ñÒâÓòÃûprimakovreadings[.]info¡£¡£¡£¡£¡£¿£¿£¿¨°Í˹»ùÖ¸³ö£¬£¬£¬¹¥»÷ÕßʹÓôËÎó²îÁ´°²ÅÅÖØ´ó¶ñÒâÈí¼þ£¬£¬£¬ÆäÄ¿µÄÒÉÊÇÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬¹¥»÷Õß»¹Á¬ÏµÁ˵ڶþ¸öδ¹ûÕæÎó²îʵÏÖÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬ÐγÉË«ÖØ¹¥»÷Á´Â·¡£¡£¡£¡£¡£¹È¸èËäÈ·ÈÏÎó²î±£´æÇÒÒѱ»Ê¹Ó㬣¬£¬µ«Î´Åû¶Ïêϸ¹¥»÷ϸ½Ú£¬£¬£¬½öÌåÏÖÔÚ´ó¶¼Óû§Íê³É¸üÐÂǰ½«ÏÞÖÆÎó²îÐÅÏ¢À©É¢¡£¡£¡£¡£¡£Ç徲ר¼ÒÇ¿µ÷£¬£¬£¬ÊµÊ±×°ÖÃChrome¸üпÉ×è¶ÏÄ¿½ñÒÑÖªµÄ¹¥»÷Á´£¬£¬£¬ÓÐÓ÷ÀÓùDZÔÚÍþв¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/google-fixes-chrome-zero-day-exploited-in-espionage-campaign/