ÃÀ¶à³ÇÖÒÑÔÒÆ¶¯ÍøÂç´¹ÂÚ¶ÌÐÅð³äÍ£³µÎ¥¹æ·£¿£¿£¿£¿£¿£¿îÕ©Æ­

Ðû²¼Ê±¼ä 2025-03-10

1. ÃÀ¶à³ÇÖÒÑÔÒÆ¶¯ÍøÂç´¹ÂÚ¶ÌÐÅð³äÍ£³µÎ¥¹æ·£¿£¿£¿£¿£¿£¿îÕ©Æ­


3ÔÂ9ÈÕ£¬£¬£¬ £¬£¬½üÆÚ£¬£¬£¬ £¬£¬ÃÀ¹ú¶à¸ö¶¼»á°üÀ¨°²Äɲ¨Àû˹¡¢²¨Ê¿¶Ù¡¢¸ñÁÖÍþÖΡ¢µ¤·ð¡¢µ×ÌØÂÉ¡¢ÐÝ˹¶Ù¡¢ÃܶûÎÖ»ù¡¢Ñκþ³Ç¡¢ÏÄÂåÌØ¡¢Ê¥µØÑǸ硢¾É½ðɽµÈµØ·×·×·¢³öÖÒÑÔ£¬£¬£¬ £¬£¬Ö¸³öÓÐÒÆ¶¯ÍøÂç´¹Âڻͨ¹ýαװ³É¶¼»áÍ£³µÎ¥¹æ²¿·ÖµÄ¶ÌОÙÐÐÕ©Æ­¡£¡£¡£¡£¡£ÕâЩ¶ÌÐÅÉù³ÆÓû§ÓÐδ¸¶Í£³µ·Ñ£¬£¬£¬ £¬£¬²¢ÍþвÈô²»Ö§¸¶£¬£¬£¬ £¬£¬ÌìÌì½«ÌØÊâ·£¿£¿£¿£¿£¿£¿î35ÃÀÔª£¬£¬£¬ £¬£¬Í¬Ê±ÌṩÁ´½ÓÓÕµ¼Óû§µã»÷Ö§¸¶¡£¡£¡£¡£¡£¾ÝBleepingComputer±¨µÀ£¬£¬£¬ £¬£¬×ÔÈ¥Äê12ÔÂÆð£¬£¬£¬ £¬£¬´ËÀà¶ÌÐų±Ò»Á¬Ò»Ö±£¬£¬£¬ £¬£¬ÇÒ¶à¸ö¶¼»áÊÕµ½µÄÕ©Æ­¶ÌÐŽÓÄÉÁËÏàͬµÄÄ£°å¡£¡£¡£¡£¡£Õ©Æ­ÕßʹÓÃGoogle.comµÄ¿ª·ÅÖØ¶¨Ïò¹¦Ð§£¬£¬£¬ £¬£¬½«Óû§Öض¨ÏòÖÁð³äµÄ¶¼»á´¹ÂÚÍøÕ¾£¬£¬£¬ £¬£¬ÈçŦԼÊеÄnycparkclient[.]com¡£¡£¡£¡£¡£Ö»¹ÜÆ»¹ûÒÑÍÆ³öÇå¾²¹¦Ð§½ûÓÃÀ´×Ôδ֪·¢¼þÈ˺ͿÉÒÉÓòÃûµÄ¶ÌÐÅÁ´½Ó£¬£¬£¬ £¬£¬µ«ÓÉÓÚGoogle.comÊÇÊÜÐÅÈÎÓòÃû£¬£¬£¬ £¬£¬ÕâÒ»Îó²îʹµÃÕ©Æ­Õ߸üÒ×µ½ÊÖ¡£¡£¡£¡£¡£Óû§µã»÷Á´½Óºó»á±»Ö¸µ¼ÖÁð³äµÄ¡°Å¦Ô¼ÊвÆÎñ²¿£ºÍ£³µºÍÉãÏñÍ·Î¥¹æÐÐΪ¡±ÍøÕ¾£¬£¬£¬ £¬£¬ÒªÇóÊäÈëСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬ £¬£¬½ø¶øÃæÁÙÊý¾ÝÇÔȡΣº¦£¬£¬£¬ £¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþ¼°ÐÅÓÿ¨ÐÅÏ¢µÈ¡£¡£¡£¡£¡£ÕâЩÐÅÏ¢¿ÉÄܱ»ÓÃÓÚ½øÒ»²½µÄÍøÂç´¹ÂÚ¹¥»÷¡¢Éí·Ý͵ÇÔ¡¢½ðÈÚڲƭ»ò½«Êý¾Ý³öÊÛ¸øÆäËûÍþвÐÐΪÕß¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-cities-warn-of-wave-of-unpaid-parking-phishing-texts/


2. NTT Com֤ʵ½ü18000¼ÒÆóÒµ¿Í»§Êý¾ÝÔâºÚ¿Í»á¼û


3ÔÂ7ÈÕ£¬£¬£¬ £¬£¬ÈÕ±¾µçОÞÍ·NTTͨѶ£¨NTT Com£©Ö¤Êµ£¬£¬£¬ £¬£¬ÔÚ2Ô·ݵÄÍøÂç¹¥»÷ÖУ¬£¬£¬ £¬£¬½ü18,000¼ÒÆóÒµ¿Í»§µÄÊý¾ÝÔâµ½ºÚ¿Í»á¼û£¬£¬£¬ £¬£¬µ«ÊÜÓ°ÏìСÎÒ˽¼ÒµÄÏêϸÊýÄ¿Éв»ÇåÎú¡£¡£¡£¡£¡£NTT ComΪȫÇò70¸ö¹ú¼ÒµÄÁè¼Ý100,000¸öÆóÒµÌṩµç»°ºÍÍøÂçÊÖÒÕЧÀÍ£¬£¬£¬ £¬£¬´Ë´Îй¶µÄÊý¾Ý°üÀ¨17,891¸ö×éÖ¯µÄ¿Í»§ÐÕÃû¡¢ÌõÔ¼ºÅ¡¢µç»°ºÅÂë¡¢µç×ÓÓʼþµØµã¡¢ÏÖʵµØµãºÍЧÀÍʹÓÃÐÅÏ¢¡£¡£¡£¡£¡£Ö»¹ÜNTT ComÔÚ2ÔÂ5ÈÕ·¢Ã÷ÄÚ²¿ÏµÍ³±»¡°Î´¾­ÊÚȨ»á¼û¡±ºóÁ¬Ã¦ÏÞÖÆÁËÊÜѬȾװ±¸µÄ»á¼û£¬£¬£¬ £¬£¬µ«2ÔÂ15ÈÕÓÖ·¢Ã÷¹¥»÷ÕßÒÑÈëÇÖÆäÄÚ²¿ÍøÂçÖеÄÁíһ̨װ±¸²¢Á¬Ã¦¶Ï¿ªÅþÁ¬¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬ £¬£¬ºÚ¿Í¹¥»÷ÊÂÎñ±³ºóµÄÈËÎïºÍÍøÂç¹¥»÷µÄÏêϸÐÔ×ÓÉв»ÇåÎú£¬£¬£¬ £¬£¬Ò²Ã»ÓÐÈκδóÐÍÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´ËÈÏÕæ¡£¡£¡£¡£¡£½üÄêÀ´£¬£¬£¬ £¬£¬µçÐÅ×éÖ¯ÒѳÉÎªÍøÂç·¸·¨·Ö×Ӻ͹ú¼ÒÖ§³ÖµÄºÚ¿ÍµÄÖ÷Òª¹¥»÷Ä¿µÄ£¬£¬£¬ £¬£¬ÍøÂç·¸·¨·Ö×Ó»¹»á¹¥»÷µçОÞÍ·´æ´¢µÄµç»°¼Í¼¿âÒÔ·¢¶¯½øÒ»²½µÄÍøÂç¹¥»÷¡£¡£¡£¡£¡£


https://techcrunch.com/2025/03/07/japanese-telco-giant-ntt-com-says-hackers-accessed-details-of-almost-18000-organizations/


3. YouTubeÐéα°æÈ¨ÍþÐ²ÍÆ¹ã¶ñÒâÍÚ¿óÈí¼þ


3ÔÂ8ÈÕ£¬£¬£¬ £¬£¬ÍøÂç·¸·¨·Ö×ÓʹÓÃYouTubeƽ̨£¬£¬£¬ £¬£¬Í¨¹ý·¢ËÍÐéα°æÈ¨ÉùÃ÷£¬£¬£¬ £¬£¬Ç¿ÆÈ´´×÷ÕßÔÚÊÓÆµÖÐÐû´«¶ñÒâÈí¼þºÍ¼ÓÃÜÇ®±Ò¿ó¹¤¡£¡£¡£¡£¡£ËûÃÇÃé×¼ÁËÐû²¼ÓйØWindowsÊý¾Ý°üת·¢£¨WPD£©¹¤¾ß½Ì³ÌµÄ´´×÷Õߣ¬£¬£¬ £¬£¬ÕâЩ¹¤¾ßÔÚ¶íÂÞ˹¹ãÊܽӴý£¬£¬£¬ £¬£¬ÒòÆäÄÜÈÆ¹ý»¥ÁªÍøÉó²é¡£¡£¡£¡£¡£·¸·¨·Ö×Óð³ä¹¤¾ß°æÈ¨³ÖÓÐÕߣ¬£¬£¬ £¬£¬ÏòYouTubeÌá³öÊéȨͶËߣ¬£¬£¬ £¬£¬²¢Íþв´´×÷ÕßÈô²»ÏàÖú½«ÃæÁÙÆµµÀ·â½û¡£¡£¡£¡£¡£Ðí¶à´´×÷ÕßÒòµ£ÐÄʧȥƵµÀ¶øÇü·þ£¬£¬£¬ £¬£¬Ìí¼ÓÁËÖ¸Ïò¶ñÒâGitHub´æ´¢¿âµÄÁ´½Ó£¬£¬£¬ £¬£¬ÕâЩÁ´½ÓÏÖʵÉϰüÀ¨¼ÓÃÜÇ®±ÒÍÚ¿óÈí¼þµÄľÂí°æ±¾¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿¨°Í˹»ù·¢Ã÷£¬£¬£¬ £¬£¬Ïà¹ØÊÓÆµµÄԢĿ¼ÊýÁè¼Ý40Íò´Î£¬£¬£¬ £¬£¬¶ñÒâÁ´½ÓÔÚ±»É¾³ýǰÒѱ»ÏÂÔØ4Íò´Î¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬Ò»¸öÓµÓÐ34Íò¶©ÔÄÕßµÄTelegramƵµÀÒ²¼ÓÈëÁ˶ñÒâÈí¼þµÄÍÆ¹ã¡£¡£¡£¡£¡£¾Ý¿¨°Í˹»ùÒ£²â£¬£¬£¬ £¬£¬¸Ã¶ñÒâÈí¼þÒÑÓ°Ïì¶íÂÞ˹2000¶àÃûÊܺ¦Õߣ¬£¬£¬ £¬£¬µ«ÏÖʵÊý×Ö¿ÉÄܸü¸ß¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýPython¼ÓÔØÆ÷Æô¶¯£¬£¬£¬ £¬£¬Õë¶Ô¶íÂÞ˹IPµØµãÖ´ÐУ¬£¬£¬ £¬£¬¾ßÓÐÌӱܷÀ²¡¶¾ÆÊÎöºÍ·´É³ºÐ¹¦Ð§£¬£¬£¬ £¬£¬×îÖÕÏÂÔØSilentCryptoMinerÍÚ¿ó»ú£¬£¬£¬ £¬£¬ÍÚ¾ò¶àÖÖ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¸ÃÍÚ¿ó»ú°´ÆÚ¸üÐÂÉèÖ㬣¬£¬ £¬£¬²¢Ê¹ÓÃÀú³ÌÍÚ¿ÕÊÖÒÕÌӱܼì²â¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚÖ÷ÒªÕë¶Ô¶íÂÞ˹Óû§£¬£¬£¬ £¬£¬µ«´ËÀ๥»÷Õ½ÂÔ¿ÉÄܱ»ÓÃÓÚ¸üÆÕ±éµÄ¹æÄ££¬£¬£¬ £¬£¬Èö²¥¸ß·çа¶ñÒâÈí¼þ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/youtubers-extorted-via-copyright-strikes-to-spread-malware/


4. ̨±±ÂíÙɼÍÄîÒ½ÔºÔâÍøÂç¹¥»÷ÖÂÐÅϢй¶²¢ÖÂǸ


3ÔÂ6ÈÕ£¬£¬£¬ £¬£¬Ì¨±±ÂíÙɼÍÄîÒ½Ôº¿ËÈվͱ¾Ô³õÔâÊÜÃûΪ¡°Crazy Hunter¡±µÄÀÕË÷Èí¼þ¹¥»÷µ¼ÖµÄÐÅϢй¶ÊÂÎñÏò¹«ÖÚÖÂǸ¡£¡£¡£¡£¡£¾Ý±¨µÀ£¬£¬£¬ £¬£¬´Ë´Î¹¥»÷µ¼Ö¸ÃÒ½Ôº500¶ą̀ÅÌËã»úÍ߽⣬£¬£¬ £¬£¬²¢Óиߴï32.5GBµÄÐÅÏ¢±»µÁ£¬£¬£¬ £¬£¬ÆäÖаüÀ¨À´×Ǫ̂Íå¸÷µØÂíÙÉ·ÖÔºµÄ1660ÍòÃû»¼ÕßµÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬ £¬£¬Ò»ÃûºÚ¿ÍÔÚÍøÂçÂÛ̳ÉÏÉù³ÆÓµÓд˴ι¥»÷µÄÊý¾Ý²¢ÔÚÍøÉϳöÊÛ¡£¡£¡£¡£¡£Õë¶Ô´Ë´ÎÊÂÎñ£¬£¬£¬ £¬£¬Ò½ÔºÌåÏÖÒÑ×ñÕÕ½ôÆÈЭÒ飬£¬£¬ £¬£¬²¢Ê¹ÓÃÎÀÉú²¿µÄÍøÂçÇ徲ƽ̨Ìá½»±¨¸æ¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬ £¬£¬Ò½ÔºÒ²³ÎÇåÁËÏà¹ØÇéÐΣ¬£¬£¬ £¬£¬²¢½¨Ò鹫ÖÚÌá¸ßСÐÄ£¬£¬£¬ £¬£¬²»ÒªÌý´Óָʾ´Ó×Ô¶¯È¡¿î»úȡǮ»òÔÚ¿ÉÒɵ绰ÖÐÌṩСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£ÎªÌá·ÀÀàËÆÊÂÎñÔٴα¬·¢£¬£¬£¬ £¬£¬Ò½Ôº½«ÔöÇ¿ÍøÂçÇ徲ϵͳ£¬£¬£¬ £¬£¬²¢°´ÆÚ¾ÙÐÐϵͳ¼ì²é¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬ÎÀÉú¸£Àû²¿×ÊѶÖÎÀí˾˾³¤ÀÕÃÌåÏÖ£¬£¬£¬ £¬£¬ËäÈ»±»ÏúÊÛµÄ×ÊÁÏ¿´ËÆÒ½ÁÆ×ÊѶ£¬£¬£¬ £¬£¬¿ÉÊÇ·ñÀ´×ÔÂíÙÉÒ½ÔºÈÔÐèÈ·ÈÏ¡£¡£¡£¡£¡£Ëûͬʱָ³ö£¬£¬£¬ £¬£¬Õû¯»ù¶½½ÌÒ½Ôº×î½üÒ²Ôâµ½ºÚ¿Í¹¥»÷£¬£¬£¬ £¬£¬¹¥»÷Õß»ñµÃÁËÖÎÀíԱȨÏÞ£¬£¬£¬ £¬£¬Òò´ËºôÓõ¸÷Ò½ÔºÔöÇ¿ÍøÂçÇå¾²²½·¥£¬£¬£¬ £¬£¬È·± £»£»£»¼ÕßÐÅÏ¢µÄÇå¾²¡£¡£¡£¡£¡£


https://www.taiwannews.com.tw/news/6053546


5. Edimax IC-7100ÉãÏñ»úÑÏÖØÎó²îÔâ½©Ê¬ÍøÂç¹¥»÷ʹÓÃ


3ÔÂ7ÈÕ£¬£¬£¬ £¬£¬Ò»¸öÓ°ÏìEdimax IC-7100 IPÉãÏñ»úµÄÑÏÖØÏÂÁî×¢ÈëÎó²î£¨CVE-2025-1316£©ÕýÔÚ±»½©Ê¬ÍøÂç¶ñÒâÈí¼þʹÓ㬣¬£¬ £¬£¬µ¼ÖÂ×°±¸ÊÜË𡣡£¡£¡£¡£¸ÃÎó²îÓÉAkamaiµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬ £¬£¬²¢Òѱ¨¸æ¸øÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©¾Ö(CISA)£¬£¬£¬ £¬£¬µ«¹©Ó¦ÉÌEdimaxδ»ØÓ¦¡£¡£¡£¡£¡£Edimax IC-7100ÊÇÒ»¿îÓÃÓÚÔ¶³Ì¼à¿ØµÄIPÇå¾²ÉãÏñ»ú£¬£¬£¬ £¬£¬ËäÈ»ÒÑÍ£²ú£¬£¬£¬ £¬£¬µ«ÈÔ¿ÉÄÜÔÚÈ«Çò¹æÄ£ÄÚʹÓᣡ£¡£¡£¡£Ô¶³Ì¹¥»÷Õß¿ÉÒÔͨ¹ý·¢ËÍÌØÖÆÇëÇóÀ´»ñµÃÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬ £¬£¬Ê¹ÓôËÎó²îÆÆËð×°±¸¡£¡£¡£¡£¡£½©Ê¬ÍøÂçͨ³£Ê¹ÓÃÕâЩװ±¸ÌᳫÂþÑÜʽ¾Ü¾øÐ§ÀÍ(DDoS)¹¥»÷¡¢ÊðÀí¶ñÒâÁ÷Á¿»ò¹¥»÷Í³Ò»ÍøÂçÉÏµÄÆäËû×°±¸¡£¡£¡£¡£¡£CISA½¨ÒéÓû§½«ÊÜÓ°Ïì×°±¸ÏÂÏß¡¢ÖÃÓÚ·À»ðǽºóÃæ¡¢ÓëÒªº¦ÓªÒµÍøÂç¸ôÀ룬£¬£¬ £¬£¬²¢ÔÚÐèҪʱʹÓÃ×îеÄVPN²úƷʵÏÖÇå¾²µÄÔ¶³Ì»á¼û¡£¡£¡£¡£¡£ÎïÁªÍø×°±¸ÊÜËðµÄ³£¼û¼£Ïó°üÀ¨ÐÔÄÜϽµ¡¢¹ýÈÈ¡¢×°±¸ÉèÖÃÒâÍâת±äÒÔ¼°·Çµä·¶/Òì³£µÄÍøÂçÁ÷Á¿¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/unpatched-edimax-ip-camera-flaw-actively-exploited-in-botnet-attacks/


6. ³¬10ÒÚ×°±¸Ê¹ÓõÄSP32΢оƬ±»ÆØº¬Î´¼Í¼¡°ºóÃÅ¡±ÏÂÁî


3ÔÂ8ÈÕ£¬£¬£¬ £¬£¬ÀÖöÎ(Espressif)Éú²úµÄESP32΢оƬ£¬£¬£¬ £¬£¬×÷ΪȫÇòÎïÁªÍø×°±¸ÖÐÓÃÓÚWi-FiºÍÀ¶ÑÀÅþÁ¬µÄ×îÆÕ±éʹÓõÄоƬ֮һ£¬£¬£¬ £¬£¬Òѱ»Áè¼Ý10ÒŲ́װ±¸½ÓÄÉ¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬ £¬£¬Î÷°àÑÀTarlogic SecurityµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬ £¬£¬ESP32Öб£´æ29Ìõδ¼Í¼µÄÏÂÁ£¬£¬ £¬£¬ÕâЩÏÂÁî¿ÉÄܱ»ÓÃ×÷¡°ºóÃÅ¡±£¬£¬£¬ £¬£¬ÔÊÐí¹¥»÷Õß¾ÙÐÐð³ä¹¥»÷¡¢Î´¾­ÊÚȨµÄÊý¾Ý»á¼û¡¢×ªÏòÍøÂçÉÏµÄÆäËû×°±¸£¬£¬£¬ £¬£¬²¢½¨Éèºã¾Ã³¤ÆÚÐÔ¡£¡£¡£¡£¡£ÕâЩÏÂÁî°üÀ¨ÄÚ´æ²Ù×÷¡¢MACµØµãÓÕÆ­ºÍLMP/LLCPÊý¾Ý°ü×¢ÈëµÈ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚÂíµÂÀïµÄRootedCONÉÏչʾÁËËûÃǵÄÑо¿Ð§¹û£¬£¬£¬ £¬£¬²¢ÖÒÑԳƣ¬£¬£¬ £¬£¬ÓÉÓÚESP32µÄÆÕ±éÓ¦Ó㬣¬£¬ £¬£¬Î£º¦ºÜ´ó¡£¡£¡£¡£¡£´ËÎÊÌâÏÖÔÚÒÑÔÚCVE-2025-27840ϾÙÐиú×Ù¡£¡£¡£¡£¡£ÀÖöÎÉÐδ¹ûÕæ¼Í¼ÕâЩÏÂÁ£¬£¬ £¬£¬Òò´ËÕâЩÏÂÁî¿ÉÄÜÊDZ»¹ýʧµØÒÅ©»òÔ­À´¾ÍÎÞ·¨»á¼û¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¸³ö£¬£¬£¬ £¬£¬ÕâЩÏÂÁî´øÀ´µÄΣº¦°üÀ¨OEM¼¶±ðµÄ¶ñÒâʵÑéºÍ¹©Ó¦Á´¹¥»÷£¬£¬£¬ £¬£¬ÓÈÆäÊǵ±¹¥»÷ÕßÒѾ­ÓµÓÐÎïÆÊÎö¼û×°±¸µÄUSB»òUART½Ó¿Úʱ¡£¡£¡£¡£¡£ÈôÊǹ¥»÷ÕßÄܹ»Ê¹ÓÃÕâЩÏÂÁ£¬£¬ £¬£¬ËûÃǽ«Äܹ»ÍêÈ«¿ØÖÆESP32оƬ£¬£¬£¬ £¬£¬²¢Í¨¹ýÔÊÐíRAMºÍFlashÐ޸ĵÄÏÂÁî»ñµÃоƬµÄ³¤ÆÚÐÔ£¬£¬£¬ £¬£¬´Ó¶ø¶ÔÆäËû×°±¸Ö´ÐÐÀ¶ÑÀ»òWi-Fi¹¥»÷¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/