¸¥¼ªÄáÑÇÈý½ÇÖÞÑÀ¿Æ°ü¹ÜÊý¾Ýй¶²¨¼°14.6ÍòÈË

Ðû²¼Ê±¼ä 2025-11-26

1. ¸¥¼ªÄáÑÇÈý½ÇÖÞÑÀ¿Æ°ü¹ÜÊý¾Ýй¶²¨¼°14.6ÍòÈË


11ÔÂ24ÈÕ£¬£¬ £¬ £¬£¬¸¥¼ªÄáÑÇÖÝÈý½ÇÖÞÑÀ¿Æ°ü¹Ü¹«Ë¾£¨DDVA£©¿ËÈÕÅû¶£¬£¬ £¬ £¬£¬ÆäÔ¼14.6ÍòÃû¿Í»§µÄСÎÒ˽¼Ò¼°¿µ½¡ÐÅÏ¢ÔÚ2025Äê3ÔÂ21ÈÕÖÁ4ÔÂ23ÈÕʱ´úµÄÊý¾Ýй¶ÊÂÎñÖÐÔâÇÔÈ¡¡£¡£¡£Æ¾Ö¤DDVAÏòÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒÌá½»µÄ֪ͨÐÅ£¬£¬ £¬ £¬£¬´Ë´ÎÊÂÎñÔ´ÓÚÆäµç×ÓÓʼþÕË»§±»²»·¨»á¼û£¬£¬ £¬ £¬£¬ÍþвÐÐΪÕß¿ÉÄÜÇÔÈ¡Á˰üÀ¨»¼ÕßÊý¾ÝµÄµç×ÓÓʼþ¼°¸½¼þ¡£¡£¡£Ð¹Â¶ÐÅÏ¢Éæ¼°Ãô¸ÐСÎÒ˽¼ÒÊý¾Ý£¬£¬ £¬ £¬£¬°üÀ¨ÐÕÃû¡¢Éç»á°ü¹ÜºÅÂë¡¢Õþ¸®½ÒÏþµÄÉí·ÝÖ¤ºÅÂëÒÔ¼°Êܱ£»£» £»£»£»£»¤µÄ¿µ½¡ÐÅÏ¢£¨ÈçÒ½ÁƼͼµÈ£©¡£¡£¡£¾­×ÔÁ¦ÍøÂçÇ徲ר¼ÒЭÖúÊÓ²ìÈ·ÈÏ£¬£¬ £¬ £¬£¬¹²ÓÐ145,918ÈËÊÜÓ°Ï죬£¬ £¬ £¬£¬DDVAÒѽ«ÊÂÎñÏêÇéת´ïî¿Ïµ»ú¹¹¡£¡£¡£Ö»¹ÜÏÖÔÚÉÐÎÞÖ¤¾ÝÅú×¢±»µÁÐÅÏ¢Òѱ»ÀÄÓûò±£´æÀÄÓÃÍýÏ룬£¬ £¬ £¬£¬µ«¸Ã¹«Ë¾ÈÔΪËùÓÐй¶Éç»á°ü¹ÜºÅÂë»ò¼ÝʻִÕÕÐÅÏ¢µÄСÎÒ˽¼ÒÌṩΪÆÚ12¸öÔµÄÃâ·ÑÉí·Ý±£»£» £»£»£»£»¤¼°ÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£


https://www.securityweek.com/146000-impacted-by-delta-dental-of-virginia-data-breach/


2. ÃÀ¸ÖÆó¿âçêÔâÀÕË÷¹¥»÷£¬£¬ £¬ £¬£¬330GB½¹µãÊý¾Ý±»ÊÛ


11ÔÂ24ÈÕ£¬£¬ £¬ £¬£¬¿ËÈÕ£¬£¬ £¬ £¬£¬ÍþвÐÐΪÕßÐû³ÆÒÑÈëÇÖÃÀ¹úÒ»¼¶½á¹¹¸ÖÖÆÔì¾ÞÍ·¿âçê¸ÖÌúÖÆÔ칫˾£¨Cooper Steel Fabricators£©£¬£¬ £¬ £¬£¬²¢½«¸Ã¹«Ë¾FTPЧÀÍÆ÷µÄ¡°ÍêÕû¾µÏñÊý¾Ý¡±ÒÔ2.85ÍòÃÀÔª¼ÓÃÜÇ®±ÒÀÕË÷³öÊÛ¡£¡£¡£¾Ý°µÍøÌûÎÄÅû¶£¬£¬ £¬ £¬£¬±»µÁÊý¾Ý×ÜÁ¿´ï330GB£¬£¬ £¬ £¬£¬°üÀ¨¡°ÎÞÈκÎɾ³ý»òÎÞ¹ØÎļþ¡±µÄ¸ß¶ÈÏêϸÊÖÒÕÎĵµ¡¢×¨ÓÐÏîÄ¿ÐÅÏ¢¼°¹ýÍù/ÔÚÑÐÏîÄ¿µÄÖÖÖÖÄ£×Ó¡¢¿ò¼ÜͼºÍÉè¼ÆÍ¼Ö½¡£¡£¡£ÏêÏ¸Éæ¼°ÏîÄ¿°üÀ¨£º2022ÄêÍ깤µÄÆÕ²¼Àû¿Ë˹¸ñÁÖ˹²®ÀÕÀ䲨ÅäËÍÖÐÐÄÈ«Ì×ЭͬÉè¼ÆÍ¼Ö½£¨º­¸ÇÐÞ½¨¡¢½á¹¹¡¢»úе¼°ÖÆÀä¹ÜµÀϵͳ£©£»£» £»£»£»£»ÑÇÂíÑ·¶íº¥¶íÖÝÊý¾ÝÖÐÐÄ£¨±ð³Æ¡°ÆßÒ¶Ê÷ÖÝ¡±ÊýÊ®×ùÊý¾ÝÖÐÐÄÖ®Ò»£©µÄ½á¹¹¹æ¸ñ²ÎÊý£»£» £»£»£»£»ÂíÈøÖîÈûÖÝÑÇÂíÑ··Ö¼ðÖÐÐĵĸֽṹʩ¹¤ÐÅÏ¢£»£» £»£»£»£»ÒÔ¼°ÎÖ¶ûÂêÅäËÍÖÐÐÄ¡¢À䲨²Ö´¢ÉèÊ©µÈÅäÌ×ÐÞ½¨µÄÉè¼ÆÍ¼Ö½Óë3DÄ£×Ó¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬£¬ £¬ £¬£¬ÍþвÐÐΪÕßÇ¿µ÷Êý¾Ý¡°ÍêÕû¾µÏñ¡±ÌØÕ÷£¬£¬ £¬ £¬£¬ÊÔͼͨ¹ýй¶Ãô¸ÐÏîĿϸ½ÚʩѹÆóÒµÖ§¸¶Êê½ð¡£¡£¡£


https://cybernews.com/security/cooper-steel-fabrication-data-breach-amazon/


3. Crisis24ÔâÍøÂç¹¥»÷Ö½ôÆÈ֪ͨϵͳ̱»¾


11ÔÂ25ÈÕ£¬£¬ £¬ £¬£¬Î£º¦ÖÎÀí¹«Ë¾Crisis24֤ʵÆäOnSolve CodeREDƽ̨ÔâÍøÂç¹¥»÷£¬£¬ £¬ £¬£¬µ¼ÖÂÃÀ¹ú¶àµØÖÝÕþ¸®¡¢¾¯Ïû»ú¹¹½ôÆÈ֪ͨϵͳ̱»¾¡£¡£¡£¸Ãƽ̨ÈÏÕæÔÚ½ôÆÈÇéÐÎÏÂÏòסÃñ·¢Ë;¯±¨£¬£¬ £¬ £¬£¬´Ë´Î¹¥»÷ÆÈʹCrisis24Í£ÓùŰåÇéÐΣ¬£¬ £¬ £¬£¬Ôì³É½ôÆÈ֪ͨ¡¢ÌìÆø¾¯±¨µÈ¹¦Ð§ÖÐÖ¹¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬ £¬ £¬£¬¹¥»÷½öÓ°ÏìCodeREDÇéÐΣ¬£¬ £¬ £¬£¬Î´²¨¼°ÆäËûϵͳ£¬£¬ £¬ £¬£¬µ«Æ½Ì¨Êý¾ÝÔâÇÔ£¬£¬ £¬ £¬£¬°üÀ¨Óû§ÐÕÃû¡¢µØµã¡¢ÓÊÏä¡¢µç»°¼°ÃÜÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¡£Crisis24Ç¿µ÷δ·¢Ã÷±»µÁÊý¾Ý±»¹ûÕæ£¬£¬ £¬ £¬£¬µ«µÂ¿ËÈøË¹ÖÝ´óѧ³ÇµÈ»ú¹¹ÖÒÑÔ±£´æÊý¾Ýй¶Σº¦¡£¡£¡£Îª»Ö¸´Ð§ÀÍ£¬£¬ £¬ £¬£¬Crisis24Õý½«2025Äê3ÔÂ31Èյı¸·ÝÊý¾ÝǨáãÖÁÐÂϵͳ£¬£¬ £¬ £¬£¬µ«²¿·ÖÕË»§¿ÉÄÜȱʧ¡£¡£¡£ÌìÏÂ¶àµØ¹«¹²Çå¾²»ú¹¹±¨¸æÖÐÖ¹ÊÂÎñ£¬£¬ £¬ £¬£¬²¢Æð¾¢»Ö¸´¾¯±¨ÏµÍ³¡£¡£¡£ÀÕË÷×éÖ¯INCÉù³Æ¶Ô´ËÈÏÕæ£¬£¬ £¬ £¬£¬ÆäTorÊý¾ÝÐ¹Â¶ÍøÕ¾ÏÔʾ£¬£¬ £¬ £¬£¬¸ÃÍÅ»ïÓÚ11ÔÂ1ÈÕÈëÇÖϵͳ£¬£¬ £¬ £¬£¬11ÔÂ10ÈÕ¼ÓÃÜÎļþ£¬£¬ £¬ £¬£¬Òòδ»ñÊê½ðת¶ø³öÊÛÊý¾Ý¡£¡£¡£½ØÍ¼ÏÔʾ¿Í»§Êý¾Ýº¬Ã÷ÎÄÃÜÂ룬£¬ £¬ £¬£¬×¨¼Ò½¨ÒéÓû§Á¬Ã¦ÖØÖÃÖØ¸´Ê¹ÓõÄÃÜÂë¡£¡£¡£


https://www.bleepingcomputer.com/news/security/onsolve-codered-cyberattack-disrupts-emergency-alert-systems-nationwide/


4. FlexibleFerret¶ñÒâÈí¼þÁ´Ê¹ÓÃGoºóÃŹ¥»÷macOS


11ÔÂ25ÈÕ£¬£¬ £¬ £¬£¬¾ÝJamf Threat Labs×îÐÂÅû¶£¬£¬ £¬ £¬£¬Ò»ÖÖÐÂÐÍmacOS¶ñÒâÈí¼þÁ´Õý̫ͨ¹ý½×¶Î¾ç±¾¡¢Æ¾Ö¤ÇÔÈ¡ÓÕ¶üºÍ»ùÓÚGoµÄ³¤ÆÚºóÃÅ£¬£¬ £¬ £¬£¬ÈƹýÓû§Çå¾²²½·¥ÊµÏÖºã¾Ãϵͳ»á¼û¡£¡£¡£¸Ã¹¥»÷Á´°üÀ¨Èý½×¶Î²Ù×÷£ºµÚ¶þ½×¶Îshell¾ç±¾Æ¾Ö¤ÏµÍ³Ð¾Æ¬ÀàÐÍ£¨arm64»òIntel£©¶¯Ì¬»ñÈ¡ÓÐÓÃÔØºÉ£¬£¬ £¬ £¬£¬ÖØÐÞÏÂÔØÂ·¾¶ºó½âѹÖÁÔÝʱĿ¼²¢ºǫ́Æô¶¯£»£» £»£»£»£»Í¨¹ý½¨ÉèLaunchAgentʵÏֵǼʱ×Ô¶¯¼ÓÔØ£¬£¬ £¬ £¬£¬Í¬Ê±Î±×°ChromeȨÏÞÌáÐѵ¯´°£¬£¬ £¬ £¬£¬ÓÕµ¼Óû§ÊäÈëÆ¾Ö¤ºóͨ¹ýÆ´½ÓDropboxÖ÷»úµØµãË鯬£¬£¬ £¬ £¬£¬Ê¹ÓÃÕýµ±APIÉÏ´«ÖÁÖ¸¶¨ÕË»§£¬£¬ £¬ £¬£¬²¢ÅÌÎÊapi.ipify.org»ñÈ¡Êܺ¦Õß¹«ÍøIP¡£¡£¡£µÚÈý½×¶ÎÆô¶¯ÃûΪCDriversµÄGoÓïÑÔºóÃÅ£¬£¬ £¬ £¬£¬ÌìÉúΨһ»úе±êʶ·ûÅþÁ¬Ó²±àÂëÏÂÁîЧÀÍÆ÷£¬£¬ £¬ £¬£¬½øÈ볤ÆÚÑ­»·Ö´ÐÐϵͳÐÅÏ¢ÍøÂç¡¢ÎļþÉÏ´«ÏÂÔØ¡¢ShellÏÂÁîÖ´ÐС¢ChromeÉèÖÃÎļþÌáÈ¡¼°×Ô¶¯Æ¾Ö¤ÇÔÈ¡µÈʹÃü¡£¡£¡£ÈôÓö¹ýʧ£¬£¬ £¬ £¬£¬¶ñÒâÈí¼þ»á»ØÍËÖ´ÐÐϵͳÐÅÏ¢ÏÂÁî²¢ÔÝÍ£Îå·ÖÖÓÔÙ»Ö¸´£¬£¬ £¬ £¬£¬×èÖ¹µ¥µã¹ÊÕϵ¼Ö²Ù×÷ÖÐÖ¹¡£¡£¡£Jamf½«´Ë´Î¹¥»÷¹éÒòÓÚFlexibleFerretÔËÓªÉÌ£¬£¬ £¬ £¬£¬¸Ã×éÖ¯Ò»Á¬Ë¢ÐÂÓÕ¶üÉè¼Æ£¬£¬ £¬ £¬£¬ÓÕʹĿµÄÊÖ¶¯ÔËÐо籾¡£¡£¡£


https://www.infosecurity-magazine.com/news/flexibleferret-malware-macos-go/


5. ÔÚÏß´úÂ빤¾ß¡°×î½üÁ´½Ó¡±¹¦Ð§Ð¹Â¶³¬8ÍòÌõÃô¸ÐÊý¾Ý


11ÔÂ25ÈÕ£¬£¬ £¬ £¬£¬¾ÝÍøÂçÇå¾²Ñо¿Ö°Ô±Åû¶£¬£¬ £¬ £¬£¬ÔÚÏß´úÂëÃûÌû¯¹¤¾ßJSONFormatterºÍCodeBeautifyµÄ¡°×î½üÁ´½Ó¡±¹¦Ð§Òò±£´æ¹ûÕæ¿É»á¼ûÎó²î£¬£¬ £¬ £¬£¬µ¼ÖÂÁè¼Ý8ÍòÌõÓû§Õ³ÌùÄÚÈÝ£¨×ܼƳ¬5GB£©±»Ð¹Â¶£¬£¬ £¬ £¬£¬Éæ¼°Õþ¸®¡¢Òªº¦»ù´¡ÉèÊ©¡¢ÒøÐС¢°ü¹Ü¡¢º½¿Õº½Ìì¡¢Ò½ÁƱ£½¡¡¢½ÌÓý¡¢ÍøÂçÇå¾²¡¢µçÐŵȸßΣº¦ÐÐÒµ¡£¡£¡£ÕâЩÊý¾Ý°üÀ¨Active Directoryƾ֤¡¢Êý¾Ý¿âºÍÔÆÆ¾Ö¤¡¢Ë½Ô¿¡¢´úÂë¿âÁîÅÆ¡¢CI/CDÇÏÃÅ¡¢Ö§¸¶Íø¹ØÃÜÔ¿¡¢APIÁîÅÆ¡¢SSH»á»°Â¼ÖƼ°´ó×ÚСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©ºÍKYCÊý¾ÝµÈÃô¸ÐÐÅÏ¢¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬ £¬ £¬£¬ÕâÁ½¸öƽ̨µÄ¡°×î½üÁ´½Ó¡±¹¦Ð§ÔÊÐíÓû§»á¼ûÉúÑÄÔÚЧÀÍЧÀÍÆ÷ÉϵÄJSONƬ¶Ï£¬£¬ £¬ £¬£¬µã»÷¡°ÉúÑÄ¡±°´Å¥ºó£¬£¬ £¬ £¬£¬Æ½Ì¨»áÌìÉúÒ»¸öΨһURL²¢Ìí¼Óµ½Óû§µÄ¡°×î½üÁ´½Ó¡±Ò³ÃæÖС£¡£¡£ÓÉÓÚ¸ÃÒ³ÃæÃ»ÓÐÈκα£»£» £»£»£»£»¤²ã£¬£¬ £¬ £¬£¬ÇÒURL×ñÕսṹ»¯¡¢¿ÉÕ¹ÍûµÄÃûÌ㬣¬ £¬ £¬£¬¹¥»÷Õß¿Éͨ¹ý¼òÆÓÅÀ³æ³ÌÐòÇáËɼìË÷URL²¢ÌáȡԭʼÊý¾Ý¡£¡£¡£Ñо¿»¹·¢Ã÷£¬£¬ £¬ £¬£¬ÍþвÐÐΪÕßÒÑ×îÏÈɨÃè¹ûÕæ¿É»á¼ûµÄJSONÊý¾Ý¡£¡£¡£


https://www.bleepingcomputer.com/news/security/code-beautifiers-expose-credentials-from-banks-govt-tech-orgs/


6. ´ïÌØÃ©Ë¹Ñ§ÔºÔâClopÍÅ»ïÁãÈÕ¹¥»÷ÖÂ1494ÈËÊý¾Ýй¶


11ÔÂ25ÈÕ£¬£¬ £¬ £¬£¬ÃÀ¹ú´ïÌØÃ©Ë¹Ñ§ÔºÅûÂ¶ÖØ´óÊý¾Ýй¶ÊÂÎñ£ºClopÀÕË÷ÍÅ»ïͨ¹ý°µÍøÐ¹Â¶¸ÃУOracle E-Business SuiteЧÀÍÆ÷ÇÔÈ¡µÄÃô¸ÐÊý¾Ý£¬£¬ £¬ £¬£¬Éæ¼°1494ÃûʦÉú¼°Ð£ÓѵÄÐÕÃû¡¢Éç»á°ü¹ÜºÅÂë¼°²ÆÎñÕË»§ÐÅÏ¢¡£¡£¡£¾­ÊӲ죬£¬ £¬ £¬£¬¹¥»÷ÕßʹÓÃCVE-2025-61882ÁãÈÕÎó²î£¬£¬ £¬ £¬£¬ÓÚ8ÔÂ9ÈÕÖÁ12ÈÕʱ´úÇÔÈ¡Îļþ£¬£¬ £¬ £¬£¬Ñ§ÔºÔÚ10ÔÂ30ÈÕÈ·ÈÏÊý¾Ý°üÀ¨Ð¡ÎÒ˽¼ÒÃô¸ÐÐÅÏ¢²¢Æô¶¯Í¨Öª³ÌÐò¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬ £¬ £¬£¬¸ÃУËäÏòÃåÒòÖÝ×ÜÉó²é³¤ÌύΥ¹æ±¨¸æ£¬£¬ £¬ £¬£¬µ«Î´Ïò×ܲ¿ËùÔÚµÄк±²¼Ê²¶ûÖÝÌá½»£¬£¬ £¬ £¬£¬ÏÖʵÊÜÓ°ÏìÈËÊý¿ÉÄÜÔ¶³¬1494ÈË¡£¡£¡£´Ë´ÎÊÂÎñÊÇClopÍÅ»ïÕë¶ÔOracle EBSƽ̨µÄ´ó¹æÄ£¹¥»÷µÄÒ»²¿·Ö¡£¡£¡£×Ô2025Äê8ÔÂÆð£¬£¬ £¬ £¬£¬¸ÃÍÅ»ïÒÑʹÓÃͳһÎó²îÈëÇÖÊýÊ®¼Ò»ú¹¹£¬£¬ £¬ £¬£¬°üÀ¨¹þ·ð´óѧ¡¢¡¶»ªÊ¢¶ÙÓʱ¨¡·¡¢ÂÞ¼¼¡¢GlobalLogic¼°ÃÀ¹úº½¿Õ¹«Ë¾×Ó¹«Ë¾Envoy Air£¬£¬ £¬ £¬£¬Ïà¹ØÊý¾ÝÒÑͨ¹ýTorrent¹ûÕæÏÂÔØ¡£¡£¡£


https://www.bleepingcomputer.com/news/security/dartmouth-college-confirms-data-breach-after-clop-extortion-attack/