˹¿°ÄáÑÇÆóÒµ°ü¹Ü²¿·ÖÒÉÔâÈëÇÖ£¬£¬£¬£¬£¬£¬£¬3.4Íò·ÝÎļþ±»µÁ
Ðû²¼Ê±¼ä 2025-06-181. ˹¿°ÄáÑÇÆóÒµ°ü¹Ü²¿·ÖÒÉÔâÈëÇÖ£¬£¬£¬£¬£¬£¬£¬3.4Íò·ÝÎļþ±»µÁ
6ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬ÈðµäÖ÷ÒªÉÌÓóµÖÆÔìÉÌ˹¿°ÄáÑÇÒÉËÆÔâÓöÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÒ»¸öÈÈÃÅ¡°½öÏÞÔ¼Ç롱µÄºÚ¿ÍÂÛ̳ÉÏÐû²¼ÈëÇÖÁË˹¿°ÄáÑÇµÄÆóÒµ°ü¹Ü²¿·Ö£¬£¬£¬£¬£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁË3.4Íò·Ý´Ëǰ´Óδ¹ûÕæ¹ýµÄÎļþ¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÕâЩÎļþ°üÀ¨µÄÏêϸÐÅÏ¢Éв»Ã÷È·¡£¡£¡£¡£¡£²»¹ý£¬£¬£¬£¬£¬£¬£¬¼øÓÚ˹¿°ÄáÑǹ«Ë¾°ü¹Üº¸ÇÉÌÓóµÁ¾£¬£¬£¬£¬£¬£¬£¬Ì»Â¶µÄÎļþ¼«ÓпÉÄÜÉæ¼°¿Í»§ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬Èç¿Í»§Éí·ÝÒÔ¼°ËûÃÇËùÓµÓеijµÁ¾ÐÅÏ¢£¨Í¨¹ý³µÁ¾Ê¶ÓÖÃûÂëVIN£©¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÉù³ÆÇÔÈ¡Êý¾ÝµÄ˹¿°ÄáÑÇÍøÕ¾ÒÑÎÞ·¨»á¼û£¬£¬£¬£¬£¬£¬£¬·Ã¿ÍÖ»ÄÜ¿´µ½ÏµÍ³Î¬»¤ÏÂÏßµÄÐÂÎÅ£¬£¬£¬£¬£¬£¬£¬µ«Éв»ÇåÎú´Ë´Îά»¤ÊÇ·ñÓëºÚ¿Í¹¥»÷Óйء£¡£¡£¡£¡£Ë¹¿°ÄáÑÇ×÷Ϊ´óÐÍÉÌÓóµÖÆÔìÉÌ£¬£¬£¬£¬£¬£¬£¬ÔÚÅ·ÖÞÉÌÓóµÊг¡Õ¼Óнü19%µÄ·Ý¶î£¬£¬£¬£¬£¬£¬£¬ÓµÓÐ5.9ÍòÃûÔ±¹¤£¬£¬£¬£¬£¬£¬£¬2024ÄêÓªÊÕÔ¤¼Æ³¬220ÒÚÃÀÔª¡£¡£¡£¡£¡£¹¥»÷Õß³£½«Æû³µÖÆÔìÉÌ×÷ΪĿµÄ£¬£¬£¬£¬£¬£¬£¬Ôµ¹ÊÔÓÉÔÚÓÚ´óÐÍ¿ç¹ú¹«Ë¾ÕÆÎÕ×Å´ó×ÚÃô¸ÐµÄ¹«Ë¾ºÍ¿Í»§Êý¾Ý£¬£¬£¬£¬£¬£¬£¬ÇÒÔÚÔâÊÜÀÕË÷ʱ¾ß±¸Ö§¸¶Êê½ðµÄÄÜÁ¦¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬£¬±¾ÔÂÔçЩʱ¼ä¹¥»÷Õß¾ÍÔøÉù³ÆÈëÇÖÁ˵¹úÆû³µ¾ÞÍ·¹«¹²Æû³µ¼¯ÍÅ¡£¡£¡£¡£¡£
https://cybernews.com/security/scania-insurance-data-breach-hackers/
2. °®¶ûÀ¼ÑÛ¿ÆÕչ˻¤Ê¿¹«Ë¾OcucoÊý¾Ýй¶ӰÏì24ÍòÈË
6ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬£¬×ܲ¿Î»ÓÚ°®¶ûÀ¼µÄÑÛ¿ÆÕչ˻¤Ê¿ÊÖÒÕ¹«Ë¾OcucoÏòÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿£¨HHS£©×ª´ïÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÓ°ÏìÁè¼Ý24ÍòÈË¡£¡£¡£¡£¡£Ocuco×Ô³ÆÊÇÈ«Çò×î´óµÄÑÛ¾µÁãÊÛÈí¼þÆóÒµ£¬£¬£¬£¬£¬£¬£¬ÆäÈí¼þЧÀÍÆÕ±éÁýÕÖ77¸ö¹ú¼Ò/µØÇøµÄ6000¸öЧÀ͵㡣¡£¡£¡£¡£Ö»¹ÜOcucoÉÐδ¹ûÕæÐû²¼ÊÂÎñͨ¸æ£¬£¬£¬£¬£¬£¬£¬µ«ÖÖÖÖ¼£ÏóÅú×¢£¬£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñºÜ¿ÉÄÜÓëÀÕË÷×éÖ¯KillSecµÄºÚ¿Í¹¥»÷Óйء£¡£¡£¡£¡£½ñÄêÔçЩʱ¼ä£¬£¬£¬£¬£¬£¬£¬KillSecÐû³Æ´ÓOcucoÇÔÈ¡ÁË´ó×ÚÎļþ£¬£¬£¬£¬£¬£¬£¬4Ô³õ£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÔÚÆä»ùÓÚTorµÄÐ¹Â¶ÍøÕ¾ÉÏÐû²¼ÁËOcucoµÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬²¢Ðû²¼Á˶àÕŽØÍ¼×÷Ϊ¹¥»÷ÐÐΪµÄ×ôÖ¤¡£¡£¡£¡£¡£ÆäÖÐÒ»ÕŽØÍ¼ÏÔʾ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÖÁÉÙÇÔÈ¡ÁË67Íò·ÝÎļþ£¬£¬£¬£¬£¬£¬£¬×ܼÆ340GBÊý¾Ý¡£¡£¡£¡£¡£ËäÈ»ºÚ¿ÍÍøÕ¾Éù³Æ±»µÁÊý¾ÝÒѹûÕæ£¬£¬£¬£¬£¬£¬£¬µ«×èÖ¹·¢¸åʱ£¬£¬£¬£¬£¬£¬£¬OcucoµÄÊý¾ÝÉÐδ·ºÆðÔÚKillSecÍøÕ¾µÄ¿ÉÏÂÔØÁбíÖС£¡£¡£¡£¡£
https://www.securityweek.com/240000-impacted-by-data-breach-at-eyecare-tech-firm-ocuco/
3. ¡°ÂÓʳÂéȸ¡±¹¥»÷ÒÁÀÊÈüÅÁÒøÐУ¬£¬£¬£¬£¬£¬£¬Í¹ÏÔÒÔÒÁ³åÍ»ÖÐÍøÂçÕ½Éý¼¶
6ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬ÒÁÀʹúÓÐÒøÐÐÈüÅÁÒøÐУ¨Bank Sepah£©ÍøÕ¾ÒòÔâºÚ¿Í×éÖ¯¡°ÂÓʳÂéȸ¡±£¨Predatory Sparrow£¬£¬£¬£¬£¬£¬£¬²¨Ë¹ÓïΪ¡°Gonjeshke Darande¡±£©¹¥»÷¶øÏÂÏß¡£¡£¡£¡£¡£¸Ã×éÖ¯ÖܶþÆÆÏþÔÚÉ罻ýÌåÐû³Æ¡°´Ý»ÙÁËÒÁÀʸïÃüÎÀ¶ÓÈüÅÁÒøÐеÄÊý¾Ý¡±¡£¡£¡£¡£¡£¾ÝÒÁÀÊýÌ屨µÀ£¬£¬£¬£¬£¬£¬£¬ÈüÅÁÒøÐзÖÐйرգ¬£¬£¬£¬£¬£¬£¬¿Í»§ÎÞ·¨»á¼ûÕË»§£¬£¬£¬£¬£¬£¬£¬Ö§¸¶´¦Öóͷ£ÖÐÖ¹£¬£¬£¬£¬£¬£¬£¬ÒÁÀÊ·¨¶û˹ͨѶÉçҲ֤ʵÆä»ù´¡ÉèÊ©ÔâÊÜÍøÂç¹¥»÷ÖÂЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£´Ë´ÎÕë¶ÔÒÁÀÊ×î´ó½ðÈÚ»ú¹¹Ö®Ò»µÄÏ®»÷£¬£¬£¬£¬£¬£¬£¬Í¹ÏÔÍøÂçÕ½ÔÚÒÔÉ«ÁкÍÒÁÀÊÒ»Ö±Éý¼¶µÄ³åÍ»ÖÐ×÷ÓÃÓú·¢Ö÷Òª£¬£¬£¬£¬£¬£¬£¬ÇÒ¶ÔÒÁÀÊÒªº¦»ù´¡ÉèÊ©±¬·¢Ö±½ÓÓ°Ïì¡£¡£¡£¡£¡£¡°ÂÓʳÂéȸ¡±×éÖ¯³Æ¹¥»÷ÈüÅÁÒøÐУ¬£¬£¬£¬£¬£¬£¬ÒòÆä¡°¹æ±Ü¹ú¼ÊÖÆ²Ã£¬£¬£¬£¬£¬£¬£¬ÓÃÒÁÀÊÈËÃñµÄÇ®×ÊÖúÕþȨµÄ¿Ö²ÀÖ÷ÒåÊðÀíÈË¡¢µ¯µÀµ¼µ¯ÍýÏëºÍ¾üʺËÍýÏ롱¡£¡£¡£¡£¡£¸Ã×éÖ¯´Ëǰ»¹Éù³Æ¶ÔÒÁÀʸÖÌú³§¡¢ÌúÂ·ÍøÂç¼°¼ÓÓÍÕ¾Ö§¸¶ÏµÍ³·¢¶¯¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÆäÔ¼®¹ú²»Ã÷£¬£¬£¬£¬£¬£¬£¬µ«Ò»Ö±Õë¶ÔÒÁÀÊÕþȨ²¢Ö§³ÖÒÔÉ«ÁÐÔÚÒÁÄ¿µÄ¡£¡£¡£¡£¡£
https://cyberscoop.com/iran-bank-sepah-cyberattack/
4. Cock.liÈ·ÈÏÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬³¬°ÙÍòÓû§ÐÅÏ¢ÔâÇÔ
6ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬µç×ÓÓʼþÍйÜÌṩÉÌCock.liÈ·ÈÏÔâÓöÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£ÍþвÐÐΪÕßʹÓÃÆäÒÑÍËÒÛµÄRoundcubeÍøÂçÓʼþƽ̨Îó²î£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡ÁËÁè¼ÝÒ»°ÙÍò¸öÓû§¼Í¼¡£¡£¡£¡£¡£´Ë´Îй¶̻¶ÁË×Ô2016ÄêÒÔÀ´µÇ¼¸ÃÓʼþЧÀ͵ÄËùÓÐÓû§£¨Ô¼1,023,800ÈË£©µÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°ÁíÍâ93,000ÃûÓû§µÄÁªÏµÈËÌõÄ¿¡£¡£¡£¡£¡£ÉÏÖÜÍíЩʱ¼ä£¬£¬£¬£¬£¬£¬£¬Cock.liЧÀÍÖÐÖ¹µ«Î´¹ûÕæÚ¹ÊÍ£¬£¬£¬£¬£¬£¬£¬ËæºóÍþвÐÐΪÕßÉù³ÆÒª³öÊÛ°üÀ¨Ãô¸ÐÓû§ÐÅÏ¢µÄÊý¾Ý¿â¡£¡£¡£¡£¡£Cock.li×òÌì½ÒÏþÉùÃ÷֤ʵÁË´Ë´ÎйÃÜÊÂÎñ¼°ÍþвÐÐΪÕßÖ¸¿ØµÄÓÐÓÃÐÔ£¬£¬£¬£¬£¬£¬£¬È·ÈÏÁË1,023,800¸öÓû§ÕÊ»§µÄµç×ÓÓʼþ¡¢µÇ¼ʱ¼ä´ÁµÈÐÅÏ¢Òѱ»Ð¹Â¶£¬£¬£¬£¬£¬£¬£¬µ«Óû§ÕÊ»§ÃÜÂë¡¢µç×ÓÓʼþÄÚÈݺÍIPµØµã²¢Î´Ð¹Â¶¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬£¬µÚÈý·½ÁªÏµÐÅÏ¢±»Ð¹Â¶µÄ10,400ÃûÕË»§³ÖÓÐÈ˽«ÊÕµ½µ¥¶À֪ͨ£¬£¬£¬£¬£¬£¬£¬½¨Òé×Ô2016ÄêÒÔÀ´Ê¹ÓøÃЧÀ͵ÄËùÓÐÈËÖØÖÃÃÜÂë¡£¡£¡£¡£¡£Cock.liÒÔΪÊý¾ÝÊÇʹÓþɵÄRoundCube SQL×¢ÈëÎó²îÇÔÈ¡µÄ£¬£¬£¬£¬£¬£¬£¬¶ø´Ë´Îй¶ÊÂÎñ±¬·¢Ö®¼Ê£¬£¬£¬£¬£¬£¬£¬ËûÃÇ¸ÕÆÊÎöÁËRoundcubeÖеÄÒ»¸öRCEÎó²î²¢ÒÔΪ¸ÃÎó²îÔÚ¹¥»÷Öб»Æð¾¢Ê¹Ó㬣¬£¬£¬£¬£¬£¬´ÙʹCock.liÓÚ2025Äê6Ô½«¸ÃÈí¼þ´ÓÆäƽ̨ÉÏÒÆ³ý£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖ½«²»ÔÙÌṩRoundcubeÍøÂçÓʼþ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hacker-steals-1-million-cockli-user-records-in-webmail-data-breach/
5. ºÚ¿ÍʹÓÃLangflowÑÏÖØÎó²îÊÍ·ÅFlodrix½©Ê¬ÍøÂç
6ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÕýÆð¾¢Ê¹ÓûùÓÚPythonµÄWebÓ¦ÓóÌÐòLangflowÖеÄÒ»¸öÑÏÖØÈ±ÏÝ£¨CVE-2025-3248£©·¢¶¯¹¥»÷£¬£¬£¬£¬£¬£¬£¬¸ÃȱÏݱ£´æÓÚLangflow 1.3.0֮ǰµÄ°æ±¾ÖС£¡£¡£¡£¡£LangflowÊÇÊðÀíAIÁìÓòÆÕ±é½ÓÄɵŤ¾ß£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÓû§¹¹½¨AIÇý¶¯µÄÊðÀíºÍÊÂÇéÁ÷£¬£¬£¬£¬£¬£¬£¬¶ø´ËÎó²îÊÇÒ»¸öÒ×ÓÚʹÓõÄÉí·ÝÑéÖ¤Îó²î£¬£¬£¬£¬£¬£¬£¬±£´æÓÚÆ½Ì¨µÄ´úÂëÑéÖ¤»úÖÆÖУ¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÍêÈ«½ÓÊÜLangflowЧÀÍÆ÷¡£¡£¡£¡£¡£Ç÷ÊÆ¿Æ¼¼Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÏò/api/v1/validate/code¶Ëµã·¢ËͶñÒâPOSTÇëÇóÀ´Ê¹ÓôËÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÚÊÜѬȾµÄЧÀÍÆ÷ÉÏÖ´ÐÐÏÂÔØÆ÷¾ç±¾£¬£¬£¬£¬£¬£¬£¬ÒÔ»ñÈ¡²¢×°ÖÃFlodrix¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬½ø¶øÊÍ·ÅǿʢµÄ½©Ê¬ÍøÂ磬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂϵͳ±»ÈëÇÖ¡¢DDoS¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Ãô¸ÐÐÅϢɥʧ»òй¶¡£¡£¡£¡£¡£¼øÓÚLangflowÔÚGitHubÉÏÓµÓÐÁè¼Ý7Íò¿ÅÐÇ£¬£¬£¬£¬£¬£¬£¬Åú×¢ÆäÊÜ¿ª·¢ÕßÈϿɶȸߣ¬£¬£¬£¬£¬£¬£¬ÇÒÔÚÖÇÄÜ×Ô¶¯»¯ÔÐÍÉè¼ÆºÍ°²ÅÅ·½ÃæÊ©Õ¹Ö÷Òª×÷Ó㬣¬£¬£¬£¬£¬£¬Ò×Êܹ¥»÷µÄLangflowЧÀÍÆ÷¶Ô¹¥»÷Õß¶øÑÔÊÇ¡°¼«¾ßÎüÒýÁ¦µÄÄ¿µÄ¡±¡£¡£¡£¡£¡£
https://www.darkreading.com/vulnerabilities-threats/hackers-exploit-langflow-flaw-flodrix-botnet
6. CISA¾¯Ê¾TP-LinkÈÈõè¾¶ÓÉÆ÷Îó²îÕý±»Æð¾¢Ê¹ÓÃ
6ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¸üÐÂÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬£¬£¬£¬£¬£¬£¬½«TP-LinkÏÂÁî×¢ÈëÎó²îCVE-2023-33538ÄÉÈëÆäÖС£¡£¡£¡£¡£¸ÃÎó²îÁ½ÄêǰËäÒѱ»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬µ«½üÆÚ±»ÍøÂç·¸·¨·Ö×ÓÆð¾¢Ê¹Ó㬣¬£¬£¬£¬£¬£¬ÆÀ·Ö¸ß´ï8.8·Ö£¬£¬£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚδ¾ÊÚȨµÄÇéÐÎÏÂÔÚ·ÓÉÆ÷ÉÏÖ´ÐÐÏÂÁ£¬£¬£¬£¬£¬£¬×é³ÉÖØ´óΣº¦¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄTP-Link·ÓÉÆ÷ÐͺŰüÀ¨TL-WR940N V2/V4¡¢TL-WR841N V8/V10ÒÔ¼°TL-WR740N V1/V2µÈ£¬£¬£¬£¬£¬£¬£¬ÕâЩ·ÓÉÆ÷ÔÚÏûºÄÊг¡ÉϹãÊܽӴý£¬£¬£¬£¬£¬£¬£¬²¿·ÖÐͺÅÔÚÑÇÂíÑ·ÉÏÓµÓÐÊýÍòÌõ̸ÂÛ¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬ÕâЩÊÜÓ°ÏìµÄÓ²¼þ°æ±¾ÒѵִïʹÓÃÊÙÃü£¬£¬£¬£¬£¬£¬£¬²»ÔÙÎüÊÕÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÇÒ×îй̼þ°æ±¾Ðû²¼Ê±¼ä¾ÃÔ¶£¬£¬£¬£¬£¬£¬£¬ÈçTL-WR940N V2/V4µÄ×îй̼þ°æ±¾ÓÚ2016ÄêÐû²¼£¬£¬£¬£¬£¬£¬£¬TL-WR841N V8/V10µÄ×îºóÒ»´Î¹Ì¼þ¸üÐÂÔòÊÇÔÚ2015Äê¡£¡£¡£¡£¡£CISAÖÒÑԳƣ¬£¬£¬£¬£¬£¬£¬ÕâЩ·ÓÉÆ÷±£´æÑÏÖØÇå¾²Òþ»¼£¬£¬£¬£¬£¬£¬£¬Óû§Ó¦×èֹʹÓᣡ£¡£¡£¡£¸ÃÎó²î±£´æÓÚ·ÓÉÆ÷µÄWebÖÎÀí½çÃæÖУ¬£¬£¬£¬£¬£¬£¬ÒòÎÞ·¨×¼È·ÑéÖ¤Óû§ÊäÈ룬£¬£¬£¬£¬£¬£¬ºÚ¿ÍµÃÒÔ×¢Èë¶ñÒâÏÂÁî¡£¡£¡£¡£¡£ËäÈ»¾ßÓÐÔ¶³Ì»á¼û¹¦Ð§µÄ¹ûÕæÂ·ÓÉÆ÷ÉÏ´ËÀàȱÏÝ×îΪΣÏÕ£¬£¬£¬£¬£¬£¬£¬µ«¹¥»÷ÕßÒ²¿É´ÓͳһÍâµØÍøÂçÄÚʹÓᣡ£¡£¡£¡£Îª´Ë£¬£¬£¬£¬£¬£¬£¬CISAÒªÇóÁª°î»ú¹¹ÔÚ2025Äê7ÔÂ7ÈÕÇ°ÒÆ³ýÕâЩ·ÓÉÆ÷£¬£¬£¬£¬£¬£¬£¬²¢±Þ²ßËùÓÐ×é֯Ч·Â£¬£¬£¬£¬£¬£¬£¬ÒÔÈ·±£ÍøÂçÇå¾²¡£¡£¡£¡£¡£
https://cybernews.com/security/hackers-exploit-older-tp-link-routers-cisa-warns/