¹ûÕæµÄGitLab´úÂë¿âй¶ÁËÁè¼Ý17,000¸öÃÜÔ¿
Ðû²¼Ê±¼ä 2025-12-011. ¹ûÕæµÄGitLab´úÂë¿âй¶ÁËÁè¼Ý17,000¸öÃÜÔ¿
11ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬Çå¾²¹¤³ÌʦLuke Marshallͨ¹ýϵͳÐÔɨÃèGitLab CloudµÄ560Íò¸ö¹«¹²´æ´¢¿â£¬£¬£¬£¬£¬£¬£¬½ÒÆÆÁË´ó¹æÄ£Ãô¸ÐÐÅϢй¶ÎÊÌâ¡£¡£¡£¡£¡£¡£´Ë´ÎÐж¯½ÓÄÉTruffleHog¿ªÔ´¹¤¾ßÁ¬ÏµGitLab¹«¹²API¶Ëµã£¬£¬£¬£¬£¬£¬£¬ÅäºÏ×Ô½ç˵Python¾ç±¾ÊµÏÖ´æ´¢¿â·ÖÒ³ÅÅÐò£¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýAWS SQSÓëLambdaº¯Êý¼Ü¹¹ÊµÏÖ²¢ÐÐɨÃ裬£¬£¬£¬£¬£¬£¬×îÖÕ½öºÄʱ24Сʱ¡¢±¾Ç®770ÃÀÔª¼´ÍêÓñ³ÉÁ¿É¨Ãè¡£¡£¡£¡£¡£¡£ÊӲ췢Ã÷£¬£¬£¬£¬£¬£¬£¬ÔÚ2800Óà¸ö²î±ðÓòÃûÖб£´æ17,430¸öÓÐÓûîÔ¾ÃÜÔ¿£¬£¬£¬£¬£¬£¬£¬ÊýÄ¿ÊÇ´ËǰBitbucketɨÃèЧ¹û£¨6212¸ö£©µÄ½üÈý±¶£¬£¬£¬£¬£¬£¬£¬ÇÒÃÜÔ¿ÃܶȺá¿ç35%¡£¡£¡£¡£¡£¡£ÀúÊ·Êý¾ÝÏÔʾ£¬£¬£¬£¬£¬£¬£¬´ó¶¼Ð¹Â¶ÃÜÔ¿±¬·¢ÓÚ2018Äêºó£¬£¬£¬£¬£¬£¬£¬µ«²¿·Ö2009ÄêÆðµÄ¹ÅÀÏÃÜÔ¿ÈÔ¾ßЧÁ¦¡£¡£¡£¡£¡£¡£°´ÀàÐÍ»®·Ö£¬£¬£¬£¬£¬£¬£¬Google Cloud Platformƾ֤ռ±È×î¸ß£¨³¬5200¸ö£©£¬£¬£¬£¬£¬£¬£¬Æä´ÎΪMongoDBÃÜÔ¿¡¢Telegram»úеÈËÁîÅÆ¼°OpenAIÃÜÔ¿£¬£¬£¬£¬£¬£¬£¬Áí·¢Ã÷400Óà¸öGitLab×ÔÉíÃÜԿй¶¡£¡£¡£¡£¡£¡£Marshall×ñÕÕÈÏÕæÈÎÅû¶ÔÔò£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃClaude Sonnet 3.7µÄÍøÂçËÑË÷¹¦Ð§ÓëPython¾ç±¾×Ô¶¯»¯ÌìÉú֪ͨÓʼþ£¬£¬£¬£¬£¬£¬£¬ÀÖ³ÉÁªÏµÊÜÓ°Ïì·½²¢Íƶ¯ÃÜÔ¿×÷·Ï¡£¡£¡£¡£¡£¡£´Ë¾Ù²»µ«»ñµÃ9000ÃÀÔªÎó²îÉͽ𣬣¬£¬£¬£¬£¬£¬¸ü´Ùʹ´ó×Ú×éÖ¯½ôÆÈ³·»ØÃô¸Ðƾ֤¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬ÈÔÓв¿·ÖÃÜÔ¿Ò»Á¬´¦ÓÚ̻¶״̬¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/public-gitlab-repositories-exposed-more-than-17-000-secrets/
2. ·¨¹ú×ãÇòÁªºÏ»áÅûÂ¶ÍøÂç¹¥»÷ºóÊý¾Ýй¶ÊÂÎñ
11ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬·¨¹ú×ãÇòлᣨFFF£©ÓÚÖÜÎåÅû¶һÆðÑÏÖØÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý±»µÁÕË»§²»·¨»á¼û×ãÇò¾ãÀÖ²¿ÖÎÀíÈí¼þ£¬£¬£¬£¬£¬£¬£¬ÔÚϵͳɨ³ýǰÀÖ³ÉÇÔÈ¡´ó×Ú»áԱСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£¡£¡£¾Çå¾²ÍŶӼì²â£¬£¬£¬£¬£¬£¬£¬FFFÁ¬Ã¦½ûÓñ»ÈëÇÖÕË»§²¢Ç¿ÖÆÖØÖÃËùÓÐÓû§ÃÜÂ룬£¬£¬£¬£¬£¬£¬µ«Ð¹Â¶¹æÄ£ÒѺ¸ÇÐÕÃû¡¢ÐԱ𡢳öÉúÈÕÆÚ¼°ËùÔÚ¡¢¹ú¼®¡¢ÓÊÕþµØµã¡¢µç×ÓÓÊÏä¡¢µç»°ºÅÂëºÍ¼ÝÕÕºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£Æ¾Ö¤Å·ÖÞÊý¾Ý±£»£»£»£»£»£»£»¤¹æÔò£¬£¬£¬£¬£¬£¬£¬FFFÒÑÆô¶¯ÐÌÊÂËßËϳÌÐò£¬£¬£¬£¬£¬£¬£¬²¢Ïò·¨¹ú¹ú¼ÒÍøÂçÇå¾²¾Ö£¨ANSSI£©ºÍ¹ú¼ÒÐÅÏ¢Óë×ÔÓÉίԱ»á£¨CNIL£©Õýʽ±¨±¸¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÔÊÐí½«Ö±½Óͨ¹ýµç×ÓÓʼþ֪ͨËùÓÐÊÜÓ°ÏìСÎÒ˽¼Ò£¬£¬£¬£¬£¬£¬£¬²¢ÌØÊâÌáÐÑ»áԱСÐÄÈκÎÒªÇóÌṩÕË»§Æ¾Ö¤¡¢ÃÜÂë»òÒøÐÐÐÅÏ¢µÄ¿ÉÒÉͨѶ£¬£¬£¬£¬£¬£¬£¬°üÀ¨Éù³ÆÀ´×ÔÁªºÏ»á¡¢¾ãÀÖ²¿»òÆäËû·¢¼þÈ˵ÄÕ©ÆÓʼþ¡£¡£¡£¡£¡£¡£FFFÌåÏÖ½«Í¨¹ýÊÖÒÕÉý¼¶ºÍÁ÷³ÌÓÅ»¯ÌáÉý·ÀÓùÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬Í¬Ê±ºôÓõ»áÔ±¼á³ÖСÐÄ£¬£¬£¬£¬£¬£¬£¬×èÖ¹µã»÷¿ÉÒɸ½¼þ»ò͸¶Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/french-football-federation-fff-discloses-data-breach-after-cyberattack/
3. ºÚ¿ÍÐ®ÖÆÃÀ¹úÎÞÏßµç×°±¸·¢ËÍÐéα¾¯±¨
11ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÁª°îͨѶίԱ»á£¨FCC£©¿ËÈÕÐû²¼½ôÆÈ֪ͨ£¬£¬£¬£¬£¬£¬£¬Åû¶ºÚ¿Íͨ¹ýÐ®ÖÆBarixÍøÂçÒôƵװ±¸£¬£¬£¬£¬£¬£¬£¬ÔÚÃÀ¹ú¶àµØ¹ã²¥ÏµÍ³Öв»·¨²¥·ÅÐéαӦ¼±¾¯±¨Òô¼°Ã°·¸ÐÔÄÚÈÝ£¬£¬£¬£¬£¬£¬£¬Òý·¢ÑÏÖØ¹«¹²Ç徲Σº¦¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷¾Û½¹µÂ¿ËÈøË¹ÖÝÓ븥¼ªÄáÑÇÖÝ£¬£¬£¬£¬£¬£¬£¬ºÚ¿Íͨ¹ýÖØÐÂÉèÖÃ×°±¸Ê¹ÆäÎüÊÕ¹¥»÷Õß¿ØÖƵÄÁ÷ýÌåÄÚÈÝ£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÕý³£½ÚÄ¿±»Ä£Ä⾯±¨Òô¡¢EAS"×¢ÖØÐźÅ"¼°Òù»àÓïÑÔÖÐÖ¹¡£¡£¡£¡£¡£¡£¸Ã"×¢ÖØÐźÅ"±¾Ó¦½öÓÃÓÚÁú¾í·ç¡¢ì«·çµÈ½ôÆÈÍþвԤ¾¯£¬£¬£¬£¬£¬£¬£¬ÆäÀÄÓÃÑÏÖØÈÅÂÒ¹«¹²Ó¦¼±ÏµÍ³¡£¡£¡£¡£¡£¡£FCCÆÊÎöÖ¸³ö£¬£¬£¬£¬£¬£¬£¬ÊÂÎñȪԴÔÚÓڹ㲥װ±¸Çå¾²·À»¤±¡Èõ£¬£¬£¬£¬£¬£¬£¬Î´ÊÚȨÓû§¿ÉÈÝÒ×ÇÖÈë´«Êä·¾¶¡£¡£¡£¡£¡£¡£²¿·Öµç̨ÉõÖÁÔÚÌýÖÚ±¨¸æÊÕµ½¼ÐÔÓÆ«Ö´ÑÔÂÛµÄÒì³£¾¯±¨ºó£¬£¬£¬£¬£¬£¬£¬²Å²ì¾õ×°±¸ÔâÈëÇÖ¡£¡£¡£¡£¡£¡£Îª×èÖ¹ÀàËÆÊÂÎñ£¬£¬£¬£¬£¬£¬£¬FCCÔÚ±àºÅDA 25-996µÄ֪ͨÖÐÃ÷È·ÒªÇó¹ã²¥»ú¹¹Ç¿»¯»ù´¡Çå¾²²½·¥£ºÁ¬Ã¦×°Öó§ÉÌÇå¾²²¹¶¡²¢Éý¼¶¹Ì¼þ£»£»£»£»£»£»£»½«Ä¬ÈÏÃÜÂëÌæ»»Îª¸ßÇ¿¶ÈÃÜÂë²¢°´ÆÚ¸üУ»£»£»£»£»£»£»½«EAS¼°Barix×°±¸°²ÅÅÔÚ·À»ðǽºó£¬£¬£¬£¬£¬£¬£¬Í¨¹ýVPNÏÞÖÆ»á¼ûȨÏÞ£»£»£»£»£»£»£»Ò»Á¬¼à¿Ø×°±¸ÈÕÖ¾ÒÔ·¢Ã÷δÊÚȨÐÐΪ£»£»£»£»£»£»£»²Î¿¼CSRIC×î¼Ñʵ¼ùÖ¸ÄÏ¡£¡£¡£¡£¡£¡£ÕâЩ²½·¥Óë2016ÄêBarix¹«Ë¾ÉùÃ÷Æä×°±¸"׼ȷÉèÖøßÇ¿¶ÈÃÜÂë¼´Çå¾²"µÄ̬¶ÈÒ»Ö¡£¡£¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/fcc-hackers-hijacking-radio/
4. ×ôÖÎÑÇÖÝGSCCCAÔâÀÕË÷Èí¼þ¹¥»÷ÖÂϵͳ̱»¾
11ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬£¬×ôÖÎÑÇÖݸߵȷ¨ÔºÊé¼ÇÔ±ÏàÖúÖÎÀí¾Ö£¨GSCCCA£©ÒòÔâÓö¿ÉÐÅÇÒÒ»Á¬µÄÍøÂçÇå¾²Íþв£¬£¬£¬£¬£¬£¬£¬×ÔÖÜÎåÆðÏÝÈë̱»¾×´Ì¬£¬£¬£¬£¬£¬£¬£¬ÆäÍøÕ¾¼°Ð§ÀÍ»á¼û±»ÔÝʱÏÞÖÆ¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹ÈÏÕæÖÎÀíÈ«ÖÝ159¸öÏØµÄÉÌÒµ±¸°¸¡¢·¿µØ²ú¼°Ð¡ÎÒ˽¼Ò¹¤Òµ¼Í¼Ë÷Òý¡¢¹«Ö¤Ô±ÖÐÑëÊý¾Ý¿â¼°Ãñʰ¸¼þ±¸°¸µÈ½¹µãÖ°ÄÜ£¬£¬£¬£¬£¬£¬£¬Æä̱»¾Ö±½ÓÓ°ÏìÈ«ÖÝ·¿µØ²úÉúÒâ¡¢Ö´·¨Îļþ´¦Öóͷ£¼°¹«Ö¤Ð§ÀÍ¡£¡£¡£¡£¡£¡£GSCCCAÍøÕ¾×Ô¹¥»÷±¬·¢ºóÒ»Á¬ÏÔʾ¡°ÏµÍ³Î¬»¤¾ÙÐÐÖС±ºá·ù£¬£¬£¬£¬£¬£¬£¬ÖÜÒ»Íí¸üÐÂÈ·ÈÏÕýÔÚ´¦Öóͷ£ÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£»£»£»£»£»£»£»ú¹¹ÉùÃ÷³Æ£¬£¬£¬£¬£¬£¬£¬ÍŶÓÕýÒ¹ÒÔ¼ÌÈÕÆÀ¹À²âÊÔϵͳ£¬£¬£¬£¬£¬£¬£¬È·±£»£»£»£»£»£»£»Ö¸´Ê¹ÓÃǰµÖ´ï×î¸ßÇå¾²±ê×¼¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷µ¼Ö¸ûú¹¹´æ´¢µÄº£Á¿Êý¾ÝÃæÁÙΣº¦£¬£¬£¬£¬£¬£¬£¬°üÀ¨·¿µØ²ú×óȯ¡¢µäÖʼͼ¡¢µØÍ¼Êý¾Ý¡¢ÃñÊÂÐÌʰ¸¼þµµ°¸µÈ¡£¡£¡£¡£¡£¡£ÀÕË÷Èí¼þÍÅ»ïDevmanÒѽ«GSCCCAÌí¼ÓÖÁÆäÐ¹Â¶ÍøÕ¾£¬£¬£¬£¬£¬£¬£¬Éù³ÆÇÔÈ¡500GBÊý¾Ý²¢ÒªÇó11ÔÂ27ÈÕǰ֧¸¶40ÍòÃÀÔªÊê½ð¡£¡£¡£¡£¡£¡£DevmanΪ½ñÄê4ÔÂзºÆðµÄ×éÖ¯£¬£¬£¬£¬£¬£¬£¬Æä³ÉÔ±´ËǰΪQilin¡¢DragonForceµÈÍÅ»ïÁ¥Êô£¬£¬£¬£¬£¬£¬£¬9ÔÂתÐÍΪÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©×éÖ¯¡£¡£¡£¡£¡£¡£
https://therecord.media/georgia-court-filing-org-ransomware-warning
5. ¶ñÒâLLMÖúÍø·¸Éý¼¶£ºWormGPTÓëKawaiiGPTʵ²âÍþÄÜ
11ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬Palo Alto Networks Unit 42Ñо¿ÍŶÓÕ¹ÏÖ£¬£¬£¬£¬£¬£¬£¬Î´ÊÜÏÞÖÆµÄ¶ñÒâ´óÐÍÓïÑÔÄ£×Ó£¨LLM£©ÈçWormGPT 4ºÍKawaiiGPTÕýÏÔÖøÌáÉýÍøÂç·¸·¨ÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÌìÉú¸ß¹¦Ð§ÐÔ¶ñÒâ´úÂë½µµÍ¹¥»÷Ãż÷¡£¡£¡£¡£¡£¡£WormGPT 4×÷Ϊ2023Äê¡°ÖØÉú¡±ÏîÄ¿£¬£¬£¬£¬£¬£¬£¬ÌṩÔ·Ñ50ÃÀÔª»òÖÕÉí220ÃÀÔª¶©ÔÄЧÀÍ£¬£¬£¬£¬£¬£¬£¬×¨Îª·¸·¨»î¶¯ÑµÁ·£¬£¬£¬£¬£¬£¬£¬¿ÉÌìÉúÀÕË÷Èí¼þ¼ÓÃܾ籾¡£¡£¡£¡£¡£¡£¸ÃÄ£×Ó»¹Äܰ´Ö¸ÁîÌìÉú¡°¾üÓü¶¼ÓÃÜ¡±Êê½ðÐÅ£¬£¬£¬£¬£¬£¬£¬ÉèÖÃ72Сʱ¸¶¿îÏÞÆÚ£¬£¬£¬£¬£¬£¬£¬Ç¿»¯ÀÕË÷¹¥»÷ÐÄÀíÍþÉå¡£¡£¡£¡£¡£¡£KawaiiGPTÔòΪÃâ·ÑÉçÇøÇý¶¯ÐÍLLM£¬£¬£¬£¬£¬£¬£¬2.5°æ±¾ÔÚLinuxϵͳÎå·ÖÖÓ¼´¿É°²ÅÅ¡£¡£¡£¡£¡£¡£ÆäÄÜÁ¦°üÀ¨ÌìÉúº¬±ÆÕæÓòÃûÓÕÆµÄ´¹ÂÚÓʼþ¡¢Ê¹ÓÃParamiko SSH¿âʵÏÖºáÏòÒÆ¶¯µÄPython¾ç±¾£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Í¨¹ýsmtplib¿â´ò°üÊý¾ÝÍâйµÄ¶ñÒâ³ÌÐò¡£¡£¡£¡£¡£¡£Ëäδֱ½ÓÌìÉú¼ÓÃÜÀý³Ì£¬£¬£¬£¬£¬£¬£¬µ«ÆäÏÂÁîÖ´ÐÐÄÜÁ¦Ö§³ÖȨÏÞÌáÉý¡¢Êý¾ÝÇÔÈ¡¼°ÓÐÓÃÔØºÉͶ·Å¡£¡£¡£¡£¡£¡£¶þÕß¾ùÔÚTelegramÓµÓÐÊý°Ù³ÉԱƵµÀ£¬£¬£¬£¬£¬£¬£¬ÐγÉÊÖÒÕ½»Á÷ÉçÇø¡£¡£¡£¡£¡£¡£Ñо¿Ö¤Êµ£¬£¬£¬£¬£¬£¬£¬ÕâЩģ×ÓÒÑ´ÓÀíÂÛÍþвת»¯ÎªÏÖʵ¹¥»÷¹¤¾ß£ºµÍÊÖÒÕ¹¥»÷Õ߿ɿìËÙÌá³«ÖØ´ó¹¥»÷£¬£¬£¬£¬£¬£¬£¬Èç×Ô¶¯»¯ºáÏòÒÆ¶¯¡¢¶¨ÖÆ»¯´¹ÂÚÓÕ¶ü£¬£¬£¬£¬£¬£¬£¬²¢Ëõ¶Ì¹¤¾ß¿ª·¢ÖÜÆÚ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/malicious-llms-empower-inexperienced-hackers-with-advanced-tools/
6. PyPI¹©Ó¦Á´Çå¾²¾¯±¨£ºÒÅÁôPython°üÒý·¢ÓòÃû½ÓÊÜΣº¦
11ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±ÔÚÆÊÎöÒÅÁôPython°üʱ·¢Ã÷£¬£¬£¬£¬£¬£¬£¬¶à¸ö×ÅÃûPyPIÈí¼þ°ü±£´æÒòÓòÃû½ÓÊܵ¼ÖµĹ©Ó¦Á´Çå¾²Îó²î¡£¡£¡£¡£¡£¡£ReversingLabsÔÚ¹¹½¨¹¤¾ßzc.buildoutµÄÖ¸µ¼¾ç±¾Öмì²âµ½Òªº¦Îó²î£¬£¬£¬£¬£¬£¬£¬¸Ã¾ç±¾»á´ÓÒÑʧЧµÄ¾ÉÓòÃûpython-distribute.orgÏÂÔØDistributeÈí¼þ°ü×°ÖóÌÐò£¬£¬£¬£¬£¬£¬£¬¶ø¸ÃÓòÃûÏÖÔÚ´¦ÓÚ¿ª·Å×¢²á״̬£¬£¬£¬£¬£¬£¬£¬¿É±»¹¥»÷Õß½ÓÊܲ¢Ö²Èë¶ñÒâ´úÂë¡£¡£¡£¡£¡£¡£ÊÜÓ°ÏìµÄPyPI°ü°üÀ¨tornado¡¢pypiserver¡¢slapos.coreµÈ£¬£¬£¬£¬£¬£¬£¬ÆäÖ¸µ¼¾ç±¾bootstrap.pyÔÚÌØ¶¨Ìõ¼þÏ»ᴥ·¢ÓòÃû»á¼û¡£¡£¡£¡£¡£¡£ÎÊÌâȪԴÔÚÓÚDistribute¹¤¾ßµÄÀúÊ·ÒÅÁôÎÊÌ⣺×÷ÎªÔø¶ÌÔݱ£´æµÄSetuptools·ÖÖ§£¬£¬£¬£¬£¬£¬£¬DistributeÔÚ2013Äê±»ÖØÐÂÕûºÏºóÖð½¥ïÔÌ£¬£¬£¬£¬£¬£¬£¬µ«²¿·ÖÈí¼þ°üÈÔ±£´æÁ˾ɰæÖ¸µ¼¾ç±¾¡£¡£¡£¡£¡£¡£ÕâЩ¾ç±¾½ÓÄÉÓ²±àÂëÓòÃûÏÂÔØ»úÖÆ£¬£¬£¬£¬£¬£¬£¬Óë¶ñÒâÈí¼þÏÂÔØÆ÷ÐÐΪ¸ß¶ÈÏàËÆ£¬£¬£¬£¬£¬£¬£¬Ðγɡ°²»ÐëÒªµÄ¹¥»÷Ãæ¡±¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2025/11/legacy-python-bootstrap-scripts-create.html


¾©¹«Íø°²±¸11010802024551ºÅ