MarimoÎó²îÅû¶½ö10СʱºóÔâºÚ¿ÍʹÓÃ
Ðû²¼Ê±¼ä 2026-04-131. MarimoÎó²îÅû¶½ö10СʱºóÔâºÚ¿ÍʹÓÃ
4ÔÂ12ÈÕ£¬£¬£¬MarimoÊÇÒ»¸ö±¸ÊܽӴýµÄ¿ªÔ´ÏìӦʽPython notebookƽ̨£¬£¬£¬ÆäÒ»¸öÑÏÖØÎó²îÔÚ¹ûÕæÅû¶½ö10Сʱºó¾Í±»ºÚ¿ÍÆð¾¢Ê¹Óᣡ£¡£¡£¸ÃÎó²î±àºÅΪCVE-2026-39987£¬£¬£¬GitHub¶ÔÆäÑÏÖØË®Æ½ÆÀ·ÖΪ9.3·Ö£¬£¬£¬ÔÊÐí¹¥»÷ÕßÔÚMarimo 0.20.4¼°¸üÔç°æ±¾ÖÐÎÞÐèÈκÎÉí·ÝÑéÖ¤¼´¿ÉÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£¡£Marimoͨ³£±»Êý¾Ý¿ÆÑ§¼Ò¡¢»úеѧϰ´ÓÒµÕß¡¢Ñо¿Ö°Ô±ºÍ¿ª·¢Ö°Ô±ÓÃÓÚ¹¹½¨Êý¾ÝÓ¦ÓóÌÐò»òÒDZí°å£¬£¬£¬ÔÚGitHubÉÏÓµÓÐ20,000¸östarºÍ1,000¸öfork£¬£¬£¬Óû§»ù´¡ÆÕ±é¡£¡£¡£¡£¸ÃÎó²îµÄ»ù´¡Ôµ¹ÊÔÓÉÔÚÓÚWebSocket¶Ëµã¡°/terminal/ws¡±Ì»Â¶Á˽»»¥Ê½ÖÕ¶Ë£¬£¬£¬µ«Î´¾ÙÐÐÊʵ±µÄÉí·ÝÑéÖ¤¼ì²é£¬£¬£¬Ê¹µÃÈκÎδ¾Éí·ÝÑéÖ¤µÄ¿Í»§¶Ë¶¼¿ÉÒÔÖ±½ÓÅþÁ¬£¬£¬£¬»ñµÃÓëMarimoÀú³ÌÏàͬȨÏÞµÄÍêÕû½»»¥Ê½shell¡£¡£¡£¡£MarimoÓÚ4ÔÂ8ÈÕÅû¶Á˸ÃÎó²î£¬£¬£¬²¢ÓÚ×òÈÕÐû²¼ÁË0.23.0°æ±¾¾ÙÐÐÐÞ¸´¡£¡£¡£¡£¿£¿£¿ª·¢ÕßÖ¸³ö£¬£¬£¬¸ÃÎó²îÖ÷ÒªÓ°Ï콫Marimo°²ÅÅΪ¿É±à¼Ìõ¼Ç±¾µÄÓû§£¬£¬£¬ÒÔ¼°ÔÚ±à¼Ä£Ê½ÏÂʹÓÃ--host 0.0.0.0½«Marimo̻¶ÓÚ¹²ÏíÍøÂçµÄÓû§¡£¡£¡£¡£¾ÝÔÆÇå¾²¹«Ë¾SysdigµÄÑо¿Ö°Ô±³Æ£¬£¬£¬ÔÚÎó²îÏêÇéÅû¶ºóµÄǰ12СʱÄÚ£¬£¬£¬¾ÍÓÐ125¸öIPµØµã×îÏȾÙÐÐÕì̽»î¶¯¡£¡£¡£¡£Åû¶ºó²»µ½10Сʱ£¬£¬£¬Ñо¿Ö°Ô±¾ÍÊӲ쵽Á˵ÚÒ»´ÎʹÓÃʵÑé¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/critical-marimo-pre-auth-rce-flaw-now-under-active-exploitation/
2. ºÚ¿ÍÉù³Æ¿ØÖÆÁËÍþÄá˹ʥÂí¿É¹ã³¡µÄ·Àºé±Ãϵͳ
4ÔÂ12ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬Òâ´óÀûÍþÄá˹ʥÂí¿É¹ã³¡µÄ·ÀºéҺѹ±ÃϵͳÔâµ½ÍøÂç¹¥»÷£¬£¬£¬Ò»¸ö×Գơ°»ù´¡ÉèÊ©ÆÆËðС×顱»ò¡°ÆáºÚÒýÇæ¡±µÄ×éÖ¯Éù³ÆÒÑ»ñµÃϵͳÖÎÀíȨÏÞ£¬£¬£¬²¢ÑïÑÔ¿ÉÒÔ¡°Ì±»¾·ÀÓùϵͳ²¢ÑÍÃ»ÑØº£µØÇø¡±£¬£¬£¬½«ÍøÂçÈëÇÖÑݱäΪDZÔÚµÄÎïÀíÔÖÄÑ¡£¡£¡£¡£¸Ã×éÖ¯ÔÚÆäTelegramƵµÀÉÏÐû²¼ÖÐÎÄÌû×Ó£¬£¬£¬Ðû³ÆÒÑÍêÈ«¿ØÖÆÒâ´óÀû»ù´¡ÉèÊ©ºÍ½»Í¨ÊÖÏÂÊôµÄ·Àºéϵͳ£¬£¬£¬²¢¹ûÕæÒÔ600ÃÀÔªµÄ¼ÛÇ®³öÊÛϵͳµÄÍêÈ«rootȨÏÞ¡£¡£¡£¡£ËäÈ»Õþ¸®È·Èϱ£»£»£»¤Ê¥Âí¿É´ó½ÌÌõÄÒªº¦ÏµÍ³Î´ÊÜÓ°Ï죬£¬£¬µ«¸ÃÊÂÎñ̻¶ÁËÒ»¸öÁîÈ˵£ÐĵÄÏÖʵ£º×ÝÈ»ÊǾßÓи߶ÈÏóÕ÷ÒâÒåºÍÕ½ÂÔÒâÒåµÄ»ù´¡ÉèÊ©£¬£¬£¬Ò²¿ÉÄܱ»Ì½²â¡¢»á¼ûºÍʹÓᣡ£¡£¡£Óë¹Å°åITϵͳ²î±ð£¬£¬£¬OTϵͳֱ½ÓÓëÎïÀíÀú³Ì½»»¥¡£¡£¡£¡£Ò»µ©Ôâµ½ÆÆË𣬣¬£¬Ð§¹û²»µ«ÊÇÊý¾Ýɥʧ£¬£¬£¬»¹»áµ¼ÖÂЧÀÍÖÐÖ¹¡¢¾¼ÃËðʧ£¬£¬£¬ÉõÖÁÍþв¹«¹²Çå¾²¡£¡£¡£¡£´Ë´Î¹¥»÷ʼÓÚ3ÔÂÏÂÑ®£¬£¬£¬¹¥»÷ÕßÈëÇÖÁËϵͳ¿ØÖƽçÃæ£¬£¬£¬4Ô³õ×îÏÈÐû²¼¿ØÖÆÃæ°å½ØÍ¼¡¢ÏµÍ³½á¹¹Í¼ºÍ·§ÃÅ״̬ͼµÈÖ¤¾Ý¡£¡£¡£¡£
https://securityaffairs.com/190679/hacktivism/hackers-claim-control-over-venice-san-marco-anti-flood-pumps.html
3. ½ü4000̨ÃÀ¹ú¹¤Òµ×°±¸ÔâÊÜÒÁÀÊÍøÂç¹¥»÷
4ÔÂ10ÈÕ£¬£¬£¬ÓëÒÁÀÊÓйØÁªµÄºÚ¿Í×éÖ¯ÕýÒ»Á¬¶ÔÃÀ¹úÒªº¦»ù´¡ÉèÊ©ÍøÂçÌᳫ¹¥»÷£¬£¬£¬Ä¿µÄ°üÀ¨Êýǧ̨ÓÉÂÞ¿ËΤ¶û×Ô¶¯»¯¹«Ë¾ÖÆÔìµÄ¡¢Ì»Â¶ÔÚ»¥ÁªÍøÉϵĿɱà³ÌÂß¼¿ØÖÆÆ÷£¨PLC£©¡£¡£¡£¡£Æ¾Ö¤ÃÀ¹ú¶à¸öÁª°î»ú¹¹ÖܶþÐû²¼µÄÁªºÏͨ¸æ£¬£¬£¬×Ô2026Äê3ÔÂÒÔÀ´£¬£¬£¬ÒÁÀʹú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯Ò»Ö±ÒÔRockwell Automation/Allen-Bradley PLC×°±¸ÎªÄ¿µÄ£¬£¬£¬ÒÑÔì³ÉÔËÓªÖÐÖ¹ºÍ¾¼ÃËðʧ¡£¡£¡£¡£±¨¸æ»ú¹¹ÖÒÑԳƣ¬£¬£¬ÕâЩ¹¥»÷»î¶¯×î½üÓÐËùÉý¼¶£¬£¬£¬ºÜ¿ÉÄÜÊǶÔÒÁÀÊÓëÃÀ¹úºÍÒÔÉ«ÁÐÖ®¼ä³ðÊÓÐж¯µÄ»ØÓ¦¡£¡£¡£¡£Áª°îÊÓ²ì¾ÖÈ϶¨£¬£¬£¬¹¥»÷ÐÐΪÒѵ¼ÖÂ×°±¸ÏîÄ¿Îļþ±»ÌáÈ¡£¬£¬£¬ÒÔ¼°ÈË»ú½çÃæºÍ¼à¿ØÏµÍ³ÏÔʾÆÁÉϵÄÊý¾ÝÔâµ½¸Ä¶¯¡£¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾CensysÔ½ÈÕ±¨¸æ³Æ£¬£¬£¬ÔÚÈ«Çò·¢Ã÷µÄ5200¶à¸ö̻¶ÔÚ»¥ÁªÍøÉϵĴËÀ๤ҵ¿ØÖÆÏµÍ³ÖУ¬£¬£¬ËÄ·ÖÖ®ÈýÀ´×ÔÃÀ¹ú¡£¡£¡£¡£Êý¾ÝÏÔʾ£¬£¬£¬È«ÇòÓÐ5,219¸ö̻¶ÓÚ»¥ÁªÍøµÄÖ÷»úÏìÓ¦EtherNet/IPÐÒé²¢×Ô³ÆÎªÂÞ¿ËΤ¶û×Ô¶¯»¯×°±¸£¬£¬£¬ÆäÖÐÃÀ¹úռȫÇò̻¶Á¿µÄ74.6%£¬£¬£¬¹²3,891¸öÖ÷»ú¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬·äÎÑÔËÓªÉÌASNµÄ·Ý¶î²»¿É±ÈÀýµØ¸ß£¬£¬£¬Åú×¢ÏÖ³¡°²ÅŵÄ×°±¸Î»ÓÚ·äÎѵ÷ÖÆ½âµ÷Æ÷ÉÏ£¬£¬£¬½øÒ»²½À©´óÁ˹¥»÷Ãæ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/nearly-4-000-us-industrial-devices-exposed-to-iranian-cyberattacks/
4. CPUIDÔâÈëÇÖ£¬£¬£¬CPU-Z/HWMonitorÏÂÔØÁ´½Ó±»¸Ä¶¯
4ÔÂ10ÈÕ£¬£¬£¬ºÚ¿ÍÀֳɻñµÃÁËCPUIDÏîÄ¿µÄAPI»á¼ûȨÏÞ£¬£¬£¬²¢¸Ä¶¯Á˹ٷ½ÍøÕ¾ÉϵÄÏÂÔØÁ´½Ó£¬£¬£¬½«Ê¢ÐеÄÓ²¼þ¼ì²â¹¤¾ßCPU-ZºÍHWMonitorµÄ×°ÖóÌÐòÌæ»»Îª¶ñÒâ¿ÉÖ´ÐÐÎļþ¡£¡£¡£¡£ÕâÁ½¸öÊÊÓóÌÐòÓµÓÐÊý°ÙÍòÓû§£¬£¬£¬ËûÃÇÒÀÀµÕâЩ¹¤¾ßÀ´¸ú×ÙÅÌËã»úÄÚ²¿Ó²¼þµÄÎïÀí¿µ½¡×´Ì¬ºÍϵͳÖÜÈ«¹æ¸ñ¡£¡£¡£¡£½üÆÚ£¬£¬£¬ÔÚRedditÉÏÏÂÔØÕâÁ½¿î¹¤¾ßµÄÓû§±¨¸æ³Æ£¬£¬£¬¹Ù·½ÏÂÔØÃÅ»§Ö¸ÏòCloudflare R2´æ´¢Ð§ÀÍ£¬£¬£¬»ñÈ¡µÄÈ´ÊÇÁíÒ»¿îÕï¶Ï¹¤¾ßHWiNFOµÄľÂí°æ±¾¡£¡£¡£¡£CPUID½²»°ÈËÌṩÉùÃ÷³Æ£¬£¬£¬ÊÓ²ìÈÔÔÚ¾ÙÐÐÖУ¬£¬£¬µ«ÆðÔ´ÅжÏ4ÔÂ9ÈÕÖÁ10ÈÕʱ´ú£¬£¬£¬Ò»¸ö¸¨Öú¹¦Ð§£¨ÍⲿAPI£©Ôâµ½ÈëÇÖ£¬£¬£¬Ò»Á¬Ê±¼äÔ¼6Сʱ£¬£¬£¬µ¼ÖÂÖ÷ÍøÕ¾Ëæ»úÏÔʾ¶ñÒâÁ´½Ó£¬£¬£¬µ«¹Ù·½ÊðÃûµÄÔʼÎļþδÊÜÓ°Ïì¡£¡£¡£¡£ÈëÇÖ±»·¢Ã÷ºóÒÑÐÞ¸´¡£¡£¡£¡£¿£¿£¿¨°Í˹»ùÑо¿Ö°Ô±ÆÊÎöÖ¸³ö£¬£¬£¬´Ë´ÎÈëÇÖ´Ó4ÔÂ9ÈÕ15:00 UTCÒ»Á¬µ½4ÔÂ10ÈÕ10:00 UTC×óÓÒ£¬£¬£¬¹¥»÷ÕßÉ¢²¼ÁËCPU-Z 2.19¡¢HWMonitor Pro 1.57¡¢HWMonitor 1.63ºÍPerfMonitor 2.04µÄ¶ñÒâ°æ±¾¡£¡£¡£¡£Æ¾Ö¤¿¨°Í˹»ù¼à²â£¬£¬£¬Áè¼Ý150ÃûÓû§ÏÂÔØÁ˶ñÒâ±äÖÖ£¬£¬£¬³ýСÎÒ˽¼ÒÓû§Í⣬£¬£¬Ö÷ҪλÓÚ°ÍÎ÷¡¢¶íÂÞ˹ºÍÖйúµÄÁãÊÛ¡¢ÖÆÔì¡¢×Éѯ¡¢µçÐźÍũҵµÈÐÐÒµµÄÆóÒµÒ²Êܵ½Ó°Ïì¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/supply-chain-attack-at-cpuid-pushes-malware-with-cpu-z-hwmonitor/
5. Storm-2755·¢¶¯ÈËÎªÐ®ÖÆ¹¥»÷ÇÔÈ¡¼ÓÄôóÔ±¹¤ÈËΪ
4ÔÂ10ÈÕ£¬£¬£¬Ò»¸öÃûΪStorm-2755µÄ¡¢ÒÔ¾¼ÃÀûÒæÎªÄ¿µÄµÄÍþвÐÐΪÕߣ¬£¬£¬Õýͨ¹ýÐ®ÖÆ¼ÓÄôóÔ±¹¤µÄÕË»§£¬£¬£¬·¢¶¯ÈËÎªÖØ¶¨Ïò£¨ÓÖ³ÆÈËÎªÐ®ÖÆ£©¹¥»÷£¬£¬£¬ÇÔȡԱ¹¤µÄÈËΪ¡£¡£¡£¡£¹¥»÷ÕßʹÓöñÒâMicrosoft 365µÇÂ¼Ò³Ãæ£¬£¬£¬Í¨¹ý¶ñÒâ¹ã¸æ»òSEOͶ¶¾½«ÕâÐ©Ò³ÃæÍÆÖÁËÑË÷ÒýÇæÐ§¹û¶¥²¿£¬£¬£¬ÓÕÆÊܺ¦ÕßÊäÈëÆ¾Ö¤¡£¡£¡£¡£ÕâЩαװ³ÉMicrosoft 365µÇ¼±íµ¥µÄ¶ñÒâÍøÒ³£¬£¬£¬Äܹ»²¶»ñÊܺ¦ÕßµÄÉí·ÝÑéÖ¤ÁîÅÆºÍ»á»°cookie¡£¡£¡£¡£Storm-2755ͨ¹ýÖØ·Å±»µÁµÄ»á»°ÁîÅÆ¶ø·ÇÖØÐ¾ÙÐÐÉí·ÝÑéÖ¤£¬£¬£¬ÀÖ³ÉÈÆ¹ýÁËÖÐÐÄÈ˹¥»÷ÖеĶàÒòËØÉí·ÝÑéÖ¤±£»£»£»¤¡£¡£¡£¡£»£»£»ñȡԱ¹¤ÕË»§»á¼ûȨÏ޺󣬣¬£¬¹¥»÷ÕßÊ×ÏȽ¨ÉèÊÕ¼þÏ乿Ôò£¬£¬£¬×Ô¶¯½«ÈËÁ¦×ÊÔ´²¿·Ö·¢Ë͵İüÀ¨¡°Ö±½Ó´æ¿î¡±»ò¡°ÒøÐС±×ÖÑùµÄÓʼþÒÆ¶¯µ½Òþ²ØÎļþ¼Ð£¬£¬£¬×èÖ¹Êܺ¦ÕßÉó²éÕâЩÓʼþ¡£¡£¡£¡£Ëæºó£¬£¬£¬ËûÃÇËÑË÷¡°ÈËΪ¡±¡¢¡°ÈËÁ¦×ÊÔ´¡±¡¢¡°Ö±½Ó´æ¿î¡±ºÍ¡°²ÆÎñ¡±µÈÒªº¦´Ê£¬£¬£¬ÏòÈËÁ¦×ÊÔ´²¿·ÖÔ±¹¤·¢ËÍÖ÷ÌâΪ¡°¹ØÓÚÖ±½Ó´æ¿îµÄÎÊÌ⡱µÄ´¹ÂÚÓʼþ£¬£¬£¬ÓÕÆÔ±¹¤¸üÐÂÒøÐÐÐÅÏ¢¡£¡£¡£¡£µ±Éç½»¹¤³Ì¹¥»÷ʧ°Üºó£¬£¬£¬¹¥»÷ÕßÖ±½ÓµÇ¼WorkdayµÈÈËÁ¦×ÊÔ´Èí¼þƽ̨£¬£¬£¬Ê¹ÓÃÇÔÈ¡µÄ»á»°ÊÖ¶¯¸üÐÂÖ±½Ó´æ¿îÏêÇ飬£¬£¬½«ÈËΪתÈë×Ô¼º¿ØÖƵÄÕË»§¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-canadian-employees-targeted-in-payroll-pirate-attacks/
6. ¹ú¼ÊÖ´·¨Ðж¯È·Èϳ¬2ÍòÃû¼ÓÃÜÇ®±ÒÕ©ÆÊܺ¦Õß
4ÔÂ11ÈÕ£¬£¬£¬ÓÉÓ¢¹ú¹ú¼Ò·¸·¨ÊÓ²ì¾ÖǣͷµÄ¹ú¼ÊÖ´·¨Ðж¯¡°´óÎ÷ÑóÐж¯¡±ÒÑÈ·ÈÏ£¬£¬£¬ÔÚ¼ÓÄôó¡¢Ó¢¹úºÍÃÀ¹ú¾³ÄÚÓÐÁè¼Ý20,000Ãû¼ÓÃÜÇ®±ÒÕ©ÆÊܺ¦Õß¡£¡£¡£¡£ÕâÏîÁªºÏÐж¯ÓÚÉϸöÔÂÕö¿ª£¬£¬£¬¼ÓÈë·½°üÀ¨Ó¢¹ú¹ú¼Ò·¸·¨ÊÓ²ì¾Ö¡¢ÃÀ¹úÌØÇÚ¾Ö¡¢°²¼òªʡ¾¯Ô±¾Ö¡¢°²¼òªʡ֤ȯίԱ»áÒÔ¼°¶à¼Ò˽ӪÆóÒµÏàÖúͬ°é¡£¡£¡£¡£Ó¢¹ú¹ú¼Ò·¸·¨ÊÓ²ì¾ÖÌåÏÖ£¬£¬£¬ÔÚΪÆÚÒ»ÖܵÄÐж¯ÖУ¬£¬£¬¶à¸öÖ´·¨»ú¹¹ÔÚÆäÂ×¶Ø×ܲ¿Í¨¹ýʵʱÇ鱨¹²Ïí¡¢ÊÖÒÕÄÜÁ¦ºÍÊܺ¦ÕßÔ®Öú£¬£¬£¬ÔÚÈ«Çò¹æÄ£ÄÚµ·»ÙÁ˶à¸öÕ©ÆÍøÂ磬£¬£¬Â׶ؽðÈڳǾ¯Ô±¾Ö¡¢½ðÈÚÐÐΪî¿Ïµ¾ÖºÍÆäËû¹ú¼ÊÖ´·¨»ú¹¹Ò²¼ÓÈëÁË´Ë´ÎÐж¯¡£¡£¡£¡£ÊÓ²ìÖ°Ô±¶³½áÁËÁè¼Ý1200ÍòÃÀÔªµÄÉæÏÓ·¸·¨ËùµÃ£¬£¬£¬ÕâЩ¿î×ÓÊÇͨ¹ý¡°ÊÚȨ´¹ÂÚ¡±¹¥»÷»ñµÃµÄ¡£¡£¡£¡£ÔÚÕâÖÖ¹¥»÷ÖУ¬£¬£¬Õ©Æ·Ö×Óͨ³£Í¨¹ýͶ×ÊȦÌ×ÓÕÆÊܺ¦ÕßÊÚÓèÆä»á¼û¼ÓÃÜÇ®±ÒÇ®°üµÄȨÏÞ¡£¡£¡£¡£±ðµÄ£¬£¬£¬Ö´·¨Ö°Ô±»¹²éÃ÷ÎúÓëÈ«ÇòթƻÏà¹ØµÄÁè¼Ý4500ÍòÃÀÔªµÄ±»µÁ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¹ÙÔ±ÃÇÌåÏÖ£¬£¬£¬¡°´óÎ÷ÑóÐж¯¡±ÖÐʹÓõĹ«Ë½ÏàÖúģʽ½«³ÉΪӢ¹úÕþ¸®×î½üÐû²¼µÄ·´Ú²ÆÕ½ÂԵĽ¹µãÒªËØ£¬£¬£¬¸ÃÕ½ÂÔ½«ÐÐÒµÊý¾ÝºÍÖ´·¨×¨ÒµÖªÊ¶ÁªÏµÆðÀ´£¬£¬£¬ÒÔʵÏÖÚ²ÆÔ¤·À¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/police-identifies-20-000-victims-in-international-crypto-fraud-crackdown/


¾©¹«Íø°²±¸11010802024551ºÅ