÷è÷ëÀÕË÷Èí¼þ¹¥»÷CornerstoneÈËÁ¦×ÊÔ´¹«Ë¾

Ðû²¼Ê±¼ä 2025-11-18

1. ÷è÷ëÀÕË÷Èí¼þ¹¥»÷CornerstoneÈËÁ¦×ÊÔ´¹«Ë¾


11ÔÂ15ÈÕ£¬£¬£¬ÃÀ¹ú¿Æ¼¼ÕÐÆ¸¾ÞÍ·Cornerstone Staffing Solutions¿ËÈÕÔâ÷è÷ëÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬£¬¸Ã×éÖ¯Ðû³ÆÇÔÈ¡ÁËÁè¼Ý12Íò·ÝÇóÖ°Õß¼òÀú¼°³¬100Íò·Ý¹«Ë¾Îļþ¡£¡£¡£¡£÷è÷ëÍÅ»ïÔÚ°µÍøÐ¹Â¶²©¿Í¹ûÕæ300GBÃô¸ÐÊý¾Ý£¬£¬£¬°üÀ¨ÒÔ¡°ÐÕÃû+Resume.pdf¡±ÃûÌô洢µÄ12Íò·Ý¼òÀú£¬£¬£¬²¢Éù³ÆÕâЩÎļþÊôÓÚÔ¼100Íò·Ý°üÀ¨2400ÍòÌõСÎÒ˽¼ÒÐÅÏ¢µÄÎĵµµÄÒ»²¿·Ö¡£¡£¡£¡£Ð¹Â¶Êý¾Ýº­¸ÇÉç»á°ü¹ÜºÅÂë¡¢µØµã¡¢ÓÊÏä¡¢µç»°¡¢Ð½×ÊÐÅÏ¢¼°±£ÃÜЭÒéµÈ£¬£¬£¬Éæ¼°ÇóÖ°Õß¼°Ô±¹¤Éí·ÝÐÅÏ¢¡£¡£¡£¡£Cornerstone½¨ÉèÓÚ2003Ä꣬£¬£¬×ܲ¿Î»ÓھɽðɽÍåÇø£¬£¬£¬ÔÚÃÀ¹ú¶àÖÝÉèÓÐЧÀÍ´¦£¬£¬£¬×¨×¢ÊÖÒÕ¡¢¹¤³Ì¡¢ÎïÁ÷¡¢ÖÆÔìµÈÁìÓòÕÐÆ¸£¬£¬£¬Ã¿ÄêЭÖú³¬1ÍòÃûÇóÖ°Õß¾ÍÒµ¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬¸Ã¹«Ë¾ÉÐδ»ØÓ¦Ã½ÌåÎÊѯ¡£¡£¡£¡£÷è÷ëÀÕË÷Èí¼þ×éÖ¯½¨ÉèÓÚ2021Ä꣬£¬£¬2022Äê½øÈ빫ÖÚÊÓÒ°£¬£¬£¬2025Äê³ÉΪȫÇò×î»îÔ¾ÀÕË÷Èí¼þ×éÖ¯£¬£¬£¬°ëÄêÄÚ·¢¶¯³¬500Æð¹¥»÷¡£¡£¡£¡£


https://cybernews.com/security/cornerstone-staffing-ransomware-attack-qilin-group-exposes-resumes/


2. AIPACÊý¾Ýй¶£ºµÚÈý·½ÈëÇÖÖÂ810ÈËÐÅϢй¶


11ÔÂ17ÈÕ£¬£¬£¬ÃÀ¹úÒÔÉ«Áй«¹²ÊÂÎñίԱ»á£¨AIPAC£©Åû¶£¬£¬£¬ÒòµÚÈý·½¹«Ë¾ÏµÍ³ÔâÍⲿÈëÇÖ£¬£¬£¬Æä´æ´¢µÄ810ÈËСÎÒ˽¼ÒÐÅÏ¢ÓÚ2024Äê10ÔÂ20ÈÕÖÁ2025Äê2ÔÂ6ÈÕʱ´ú±»²»·¨»á¼û¡£¡£¡£¡£´Ë´ÎÊÂÎñÉæ¼°Ò»ÃûÃåÒòÖÝסÃñ£¬£¬£¬Ð¹Â¶Êý¾Ý¿ÉÄܰüÀ¨ÐÕÃû¡¢Éç»á°ü¹ÜºÅÂë¡¢»¤ÕÕºÅÂë¡¢¼Òͥסַ¡¢ÁªÏµ·½·¨¡¢Ö§¸¶¿¨ÐÅÏ¢¼°ÒøÐÐÕË»§µÈÃô¸ÐСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¡£¡£¡£¡£AIPACÓÚ11ÔÂ13ÈÕͨ¹ýµç×ÓÓʼþ֪ͨÊÜÓ°ÏìÕߣ¬£¬£¬²¢Ç¿µ÷δ·¢Ã÷Êý¾ÝÀÄÓü£Ï󣬣¬£¬ÏÖÔÚÎÞ×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ¡£¡£¡£¡£ÎªÓ¦¶ÔΣº¦£¬£¬£¬AIPACΪÊÜÓ°ÏìÕßÌṩΪÆÚ12¸öÔµÄIDXÉí·Ý±£»£»£»£»¤Ð§ÀÍ£¬£¬£¬º­¸ÇÐÅÓÃ¼à¿Ø¡¢ÍøÂçɨÃè¡¢°ü¹ÜÅâ³¥¼°Éí·Ý»Ö¸´Ö§³Ö¡£¡£¡£¡£ÊÂÎñºó£¬£¬£¬¸Ã×éÖ¯ÒÑʵÑé¶àÏîÇå¾²Éý¼¶²½·¥£¬£¬£¬°üÀ¨×ËÊÆ¿ØÖÆ¡¢·ÇÈËÀàÉí·ÝÑéÖ¤¡¢µç×ÓÓʼþÊý¾Ý·À×ß©¡¢Microsoft 365»á¼ûȨÏ޹ܿء¢ÌØÈ¨¾¯±¨¡¢µØÀíλÖÃÏÞÖÆ¡¢É󼯹¦Ð§ÒÔ¼°ÔöÇ¿¼à¿ØÁ¦¶È¡£¡£¡£¡£


https://hackread.com/aipac-data-breach-hundreds-affected/


3. ¶íÂÞ˹¿Ú°¶ÔËÓªÉÌPort AllianceÔâÍøÂç¹¥»÷


11ÔÂ15ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬¶íÂÞ˹¿Ú°¶ÔËÓªÉÌ¡°¿Ú°¶Í¬ÃË¡±£¨Port Alliance£©ÔâÓö¾³ÍâÍøÂç¹¥»÷£¬£¬£¬ÔËÓªÖÐÖ¹½øÈëµÚÈýÌ죬£¬£¬³ÉΪ¶íÎÚ³åÍ»Åä¾°ÏÂÒªº¦ÉèÊ©ÍøÂçÇå¾²ÊÂÎñµÄ×îа¸Àý¡£¡£¡£¡£¾Ý¸Ã¹«Ë¾ÖÜËÄÉùÃ÷£¬£¬£¬¹¥»÷ÕßÌᳫÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷²¢ÊÔͼÈëÇÖÆäÍøÂ磬£¬£¬Ä¿µÄֱָͨ¹ý²¨Â޵ĺ£¡¢ÑÇËÙ-ºÚº£¡¢Ô¶¶«¼°±±¼«µØÇøº£¸Û¿ªÕ¹µÄú̿ºÍ¿óÎï·ÊÁϳö¿ÚÓªÒµ£¬£¬£¬ÒâͼÈÅÂÒÔËÓªÖÈÐò¡£¡£¡£¡£Ö»¹Ü¹¥»÷¹æÄ£´ó¡¢Ç¿¶È¸ß£¬£¬£¬¿Ú°¶Í¬ÃËÇ¿µ÷ÆìÏÂ6¸öº£ÔËÂëÍ·¼°Òªº¦ÏµÍ³ÈÔÕý³£ÔËת£¬£¬£¬ÃºÌ¿ºÍ¿óÎï·ÊÁÏÄê»õÔËÁ¿³¬5000Íò¶ÖµÄӪҵδÊÜÓ°Ïì¡£¡£¡£¡£´Ë´Î¹¥»÷ÌØÕ÷ÏÔÖø£ººÚ¿Í¶¯ÓÃÁ˰üÀ¨1.5Íò¸öÈ«ÇòΨһIPµØµãµÄ½©Ê¬ÍøÂ磬£¬£¬²¿·ÖIPÔ´×Ô¶íÂÞ˹¾³ÄÚ£¬£¬£¬ÇÒÒ»Ö±±ä»»¹¥»÷Õ½ÂÔÒÔ¹æ±ÜÇå¾²·ÀÓù¡£¡£¡£¡£¹«Ë¾Î´Ö¸Ã÷¹¥»÷ȪԴ£¬£¬£¬µ«Á¬ÏµÅä¾°¿ÉÖª£¬£¬£¬×Ô2022Äê¶íÎÚ³åÍ»Éý¼¶ÒÔÀ´£¬£¬£¬Õë¶Ô½»Í¨ÎïÁ÷ÍøÂçµÄÍøÂç¹¥»÷³ÊƵ·¢Ì¬ÊÆ£¬£¬£¬¶íÎÚË«·½ºÚ¿ÍƵÈÔʹÓÃDDoS¹¥»÷×ÌÈŶԷ½»ù´¡ÉèÊ©¡£¡£¡£¡£


https://therecord.media/cyberattack-on-russian-port-operator


4. ÈýÐÇÒòµÚÈý·½Îó²î£¬£¬£¬Ãô¸ÐÊý¾Ý±»ºÚ¿Í¹ÒÅÆ³öÊÛ


11ÔÂ14ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬ÍøÂç·¸·¨ÂÛ̳¾ªÏÖºÚ¿Í·¢Ìû³ÆÒÑÀÖ³ÉÈëÇÖÈýÐÇ£¬£¬£¬²¢¹ûÕæ³öÊ۾ݳÆÀ´×Ըù«Ë¾µÄÄÚ²¿Êý¾Ý¡£¡£¡£¡£¾­²é£¬£¬£¬´Ë´ÎÊÂÎñÔ´ÓںڿͶÔÒ»¼ÒΪ¶à¼Ò´óÐÍÆóÒµÌṩЧÀ͵ĵÚÈý·½³Ð°üÉ̵ÄÈëÇÖ£¬£¬£¬Í¨¹ý¸Ã³Ð°üÉ̵Ļá¼ûȨÏÞ£¬£¬£¬¹¥»÷ÕßÉøÍ¸ÖÁÈýÐDz¿·Ö»ù´¡ÉèÊ©£¬£¬£¬°üÀ¨MSSQLÊý¾Ý¿â¼°AWS S3´æ´¢Í°£¬£¬£¬ÇÔÈ¡Á˰üÀ¨Ô´´úÂ롢˽Կ¡¢SMTPƾ֤¡¢ÉèÖÃÎļþ¡¢Ó²±àÂëÆ¾Ö¤¡¢Óû§Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢µÈÔÚÄÚµÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£CybernewsÑо¿ÍŶÓÑéÖ¤Á˺ڿÍÐû²¼µÄÊý¾ÝÑù±¾£¬£¬£¬È·ÈÏÆäÖаüÀ¨ÈýÐÇÂóµÏÑ·£¨ÈýÐǵç×ÓÆìÏÂÒ½ÁÆ×°±¸×Ó¹«Ë¾£©µÄÄÚ²¿JavaÏîÄ¿½á¹¹ÎļþÊ÷£¬£¬£¬ÌåÏÖÔ´´úÂë¼°Ó²±àÂëÆ¾Ö¤¿ÉÄÜй¶¡£¡£¡£¡£±ðµÄ£¬£¬£¬±»ÇÔÊý¾Ý¿â½ØÍ¼ÏÔʾԱ¹¤ÁªÏµÐÅÏ¢£¨Èçµç×ÓÓʼþ¡¢Óû§Ãû£©£¬£¬£¬±íÃûÌáÐÑ¿ÉÄܱ£´æÖÎÀíԱƾ֤£¬£¬£¬Õ⽫ÔöÌíÔ±¹¤ÔâÊÜ´¹ÂÚ¹¥»÷»òƾ֤Ìî³ä¹¥»÷µÄΣº¦¡£¡£¡£¡£ºÚ¿ÍÒÔ¡°Ò»´ÎÐÔÂò¶Ï¡±ÎªÓÕ¶ü£¬£¬£¬ÒªÇóʹÓÃÃÅÂÞ±ÒÖ§¸¶£¬£¬£¬µ«ÊÛ¼ÛÉÐδÐû²¼¡£¡£¡£¡£


https://cybernews.com/security/samsung-data-third-party-breach/


5. Aisuru½©Ê¬ÍøÂçÏÆÆð³¬´ó¹æÄ£DDoS¹¥»÷·ç±©


11ÔÂ17ÈÕ£¬£¬£¬Î¢ÈíÅû¶£¬£¬£¬Aisuru½©Ê¬ÍøÂç½üÆÚ¶ÔAzureÍøÂçÌᳫ·åÖµ´ï15.72TbpsµÄDDoS¹¥»÷£¬£¬£¬½ÓÄÉUDPºéË®¹¥»÷ģʽ£¬£¬£¬Ä¿µÄÖ±Ö¸°Ä´óÀûÑÇij¹«¹²IP£¬£¬£¬Êý¾Ý°üËÙÂʸߴï36.4ÒÚbps¡£¡£¡£¡£¸ÃÍøÂçÓÉTurbo Mirai¼¶ÎïÁªÍø½©Ê¬ÍøÂçÇý¶¯£¬£¬£¬Ö÷ҪʹÓñ»ÈëÇֵļÒͥ·ÓÉÆ÷¡¢ÉãÏñÍ·µÈ×°±¸£¬£¬£¬ºã¾ÃÕë¶ÔÃÀ¹ú¼°ÆäËû¹ú¼ÒסլISPÌá³«ÆÆ¼Í¼¹¥»÷¡£¡£¡£¡£AzureÇ徲ר¼ÒÖ¸³ö£¬£¬£¬¹¥»÷Á÷Á¿ÌØÕ÷ÏÔ×Å£¬£¬£¬ÎÞÔ´µØµãÓÕÆ­ÇÒʹÓÃËæ»úÔ´¶Ë¿Ú£¬£¬£¬±ãÓÚ×·×ÙÓëЧÀÍÌṩÉÌ×èµ²¡£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬Cloudflare±¾Ô´ӹûÕæ¡°ÈÈÃÅÓòÃû¡±ÅÅÃûÖÐÒÆ³ý¶à¸öÓëAisuru½©Ê¬ÍøÂçÏà¹ØµÄÓòÃû£¬£¬£¬ÕâЩÓòÃûÔøÒòAisuruÏòDNSЧÀÍ1.1.1.1·¢ËͶñÒâÅÌÎÊÁ÷Á¿£¬£¬£¬µ¼Ö»á¼ûÁ¿Òì³£ì­Éý£¬£¬£¬ÉõÖÁÓâÔ½ÑÇÂíÑ·¡¢Î¢Èí¡¢¹È¸èµÈÕýµ±ÍøÕ¾¡£¡£¡£¡£Cloudflare CEO֤ʵ£¬£¬£¬´Ë¾ÙÖ¼ÔÚά»¤ÅÅÃûϵͳ¿ÉÐŶÈ£¬£¬£¬Î´À´½«Ò»Á¬¶ÔÒÉËÆ¶ñÒâÓòÃû¾ÙÐб༭»òÒþ²Ø¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-aisuru-botnet-used-500-000-ips-in-15-tbps-azure-ddos-attack/


6. ÆÕÁÖ˹¶Ù´óѧÊý¾Ýй¶£¬£¬£¬Ó°Ïì¾èÔùÕߺÍУÓÑ


11ÔÂ17ÈÕ£¬£¬£¬ÆÕÁÖ˹¶Ù´óѧ11ÔÂ10ÈÕÔâÓöÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬µ¼ÖÂУÓÑ¡¢¾èÔùÕß¡¢½ÌÖ°Ô±¹¤¼°Ñ§ÉúСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¾ÝУ·½Ðû²¼µÄ³£¼ûÎÊÌâ½â´ðÏÔʾ£¬£¬£¬¹¥»÷Õßͨ¹ý´¹ÂÚÓʼþÈëÇÖÒ»ÃûÔ±¹¤ÕË»§£¬£¬£¬½ø¶ø»á¼ûÁË´æ´¢³ï¿îÓëУÓѼÓÈë»î¶¯Êý¾ÝµÄÊý¾Ý¿â£¬£¬£¬Ð¹Â¶ÐÅÏ¢°üÀ¨ÐÕÃû¡¢µç×ÓÓÊÏä¡¢µç»°ºÅÂë¼°¼ÒÍ¥/°ì¹«µØµã¡£¡£¡£¡£¸ÃУǿµ÷£¬£¬£¬±»Ð¹Â¶Êý¾Ý¿âδ´æ´¢²ÆÎñÐÅÏ¢¡¢ÕË»§Æ¾Ö¤»òÊÜÁª°îÒþ˽·¨±£»£»£»£»¤µÄѧÉú/½ÌÖ°¹¤Ïêϸ¼Í¼£¬£¬£¬½öÉæ¼°Ð£ÓÑ¡¢¾èÔùÕß¼°¹ØÁªÈºÌ壨ÈçУÓÑÅäż¡¢Ñ§Éú¼Ò³¤µÈ£©µÄ»ù´¡ÁªÏµÐÅÏ¢¡£¡£¡£¡£±öϦ·¨ÄáÑÇ´óѧÔÚ10ÔÂÒ౬·¢ÀàËÆÊÂÎñ¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÇÔÈ¡µÄÔ±¹¤PennKeyµ¥µãµÇ¼ÕË»§£¬£¬£¬ÈëÇÖ¸ÃУSalesforce¾èÔùÕßÊý¾Ý¿â¡¢SAPÉÌÒµÖÇÄÜϵͳ¼°SharePointÎļþƽ̨£¬£¬£¬ÇÔÈ¡ÁË1.71GBÄÚ²¿Îĵµ£¬£¬£¬Éæ¼°120ÍòÌõ¼Í¼¡£¡£¡£¡£Á½ÆðÊÂÎñ¾ùÖ¸ÏòУÓѹØÏµÖÎÀíϵͳÎó²î£¬£¬£¬ÆÕÁÖ˹¶ÙµÄй¶ԴÓÚÔ±¹¤ÕË»§±»ÈëÇÖ£¬£¬£¬±ö´óÔòÒòÔ±¹¤ÕË»§È¨ÏÞ¹ý´óµ¼ÖÂϵͳ±»ºáÏòÉøÍ¸¡£¡£¡£¡£Ö»¹ÜÁ½ÆðÊÂÎñÊÖ·¨ÏàËÆ£¬£¬£¬ÆÕÁÖ˹¶Ù´óѧÉùÃ÷ÔÝÎÞÖ¤¾ÝÅú×¢¶þÕß±£´æ¹ØÁª¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/princeton-university-discloses-data-breach-affecting-donors-alumni/