½­É­×Ô¿Ø×îÏÈ֪ͨÊÜ2023ÄêÊý¾Ýй¶ÊÂÎñÓ°ÏìµÄÓû§

Ðû²¼Ê±¼ä 2025-07-03

1. ½­É­×Ô¿Ø×îÏÈ֪ͨÊÜ2023ÄêÊý¾Ýй¶ÊÂÎñÓ°ÏìµÄÓû§


7ÔÂ1ÈÕ£¬£¬£¬ £¬È«ÇòÂ¥Óî×Ô¶¯»¯¾ÞÍ·½­É­×Ô¿Ø¿ËÈÕÅû¶£¬£¬£¬ £¬Æä2023Äê9ÔÂÔâÊܵÄÀÕË÷Èí¼þ¹¥»÷µ¼ÖÂÁè¼Ý27TBÃô¸ÐÊý¾Ý±»µÁ£¬£¬£¬ £¬¹¥»÷ÕßÒªÇóÖ§¸¶5100ÍòÃÀÔªÊê½ðÒÔ»»È¡Êý¾Ý½âÃܺÍɾ³ý¡£¡£¡£¡£¡£¡£ ¡£´Ë´ÎÊÂÎñʼÓÚ2023Äê2ÔÂÑÇÖÞЧÀÍ´¦ÍøÂç±»ÈëÇÖ£¬£¬£¬ £¬¹¥»÷Õßͨ¹ýºáÏòÒÆ¶¯ÉøÍ¸ÖÁ½¹µãϵͳ£¬£¬£¬ £¬×îÖÕÔÚ9Ô°²ÅŶ¨ÖÆ»¯ÀÕË÷Èí¼þ£¬£¬£¬ £¬¼ÓÃÜVMware ESXiÐéÄâ»ú²¢Ì±»¾Òªº¦»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£ ¡£×÷Ϊ¿ç¹ú¹¤Òµ¼¯ÍÅ£¬£¬£¬ £¬½­É­×Ô¿ØÔÚ150¸ö¹ú¼ÒÓµÓÐ10ÍòÃûÔ±¹¤£¬£¬£¬ £¬Æä°²·À¡¢Å¯Í¨¿Õµ÷¼°Ïû·ÀϵͳÆÕ±éÓ¦ÓÃÓÚÈ«ÇòµØ±êÐÞ½¨¡£¡£¡£¡£¡£¡£ ¡£´Ë´Î¹¥»÷µ¼ÖÂÆäÈ«ÇòITϵͳ´ó¹æÄ£å´»ú£¬£¬£¬ £¬¿Í»§¶©µ¥´¦Öóͷ£¡¢×°±¸Î¬»¤µÈ½¹µãÓªÒµÖÐÖ¹ÊýÖÜ¡£¡£¡£¡£¡£¡£ ¡£¹«Ë¾ÏòÃÀ¹ú֤ȯÉúÒâίԱ»á£¨SEC£©Ìá½»µÄÎļþÏÔʾ£¬£¬£¬ £¬ÊÂÎñÏìÓ¦ÓëÐÞ¸´±¾Ç®ÒÑ´ï2700ÍòÃÀÔª£¬£¬£¬ £¬ÇÒÔ¤¼Æ½«Ò»Á¬ÅÊÉý¡£¡£¡£¡£¡£¡£ ¡£ÊӲ췢Ã÷£¬£¬£¬ £¬¹¥»÷ÕßÇÔÈ¡µÄÊý¾Ýº­¸ÇÔ±¹¤ÐÅÏ¢¡¢¿Í»§ÌõÔ¼¡¢²úÆ·Ñз¢×ÊÁϼ°ÉÌÒµÉñÃØ£¬£¬£¬ £¬²¿·ÖÎļþ±»ÉÏ´«ÖÁÃûΪ¡°Dunghill Leaks¡±µÄ°µÍøÐ¹ÃÜÆ½Ì¨¡£¡£¡£¡£¡£¡£ ¡£ÍøÂçÇ徲ר¼Ò½«´Ë´Î¹¥»÷¹éÒòÓÚDark AngelsÀÕË÷×éÖ¯¡£¡£¡£¡£¡£¡£ ¡£¹«Ë¾Ç¿µ÷£¬£¬£¬ £¬Ö»¹ÜÖ§¸¶ÁË2700ÍòÃÀÔªÓ¦¼±Óöȣ¬£¬£¬ £¬µ«¾Ü¾øÏòÀÕË÷ÕßÍ×Э£¬£¬£¬ £¬ËùÓÐϵͳÒÑͨ¹ý±¸·Ý»Ö¸´ÔËÐС£¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/johnson-controls-starts-notifying-people-affected-by-2023-breach/


2. À¶ÑÀ¶ú»ú¸ßΣÎó²îÆØ¹â£¬£¬£¬ £¬Ë÷ÄáµÈÆ·ÅÆ×°±¸ÃæÁÙ¼àÌýΣº¦


7ÔÂ1ÈÕ£¬£¬£¬ £¬µÂ¹úÍøÂçÇå¾²¹«Ë¾ERNW¿ËÈÕÅû¶£¬£¬£¬ £¬È«ÇòÊý°ÙÍǫ̀ʹÓÃAiroha SystemsоƬµÄÀ¶ÑÀ¶ú»ú±£´æÑÏÖØÇå¾²Îó²î£¬£¬£¬ £¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚÎÞÐèÅä¶Ô»òÈÏÖ¤µÄÇéÐÎÏÂÍêÈ«¿ØÖÆ×°±¸£¬£¬£¬ £¬Ö±½ÓÍþвÓû§Òþ˽Çå¾²¡£¡£¡£¡£¡£¡£ ¡£´Ë´ÎÎó²îÓ°Ïì¹æÄ£ÆÕ±é£¬£¬£¬ £¬º­¸ÇË÷Äá¡¢Bose¡¢Marshall¡¢Jabra¡¢JBLµÈÊ®Óà¸öÖ÷Á÷Æ·ÅÆµÄÊýÊ®¿îÈÈÃÅÐͺţ¬£¬£¬ £¬°üÀ¨Ë÷ÄáWH-1000XMϵÁнµÔë¶ú»ú¡¢Bose QuietComfort¶úÈû¡¢Marshall STANMORE IIIÒôÏäµÈÊг¡ÍÑÏú²úÆ·¡£¡£¡£¡£¡£¡£ ¡£Ñо¿ÏÔʾ£¬£¬£¬ £¬Îó²î½¹µãÔ´ÓÚAirohaÀ¶ÑÀоƬµÄ×Ô½ç˵ЭÒéȱÏÝ£¨CVE-2025-20702£©¡£¡£¡£¡£¡£¡£ ¡£¹¥»÷Õß½öÐè´¦ÓÚÀ¶ÑÀÐźÅÁýÕÖ¹æÄ££¨Ô¼10Ã×ÄÚ£©£¬£¬£¬ £¬¼´¿Éͨ¹ý¸ÃЭÒéÖ±½Ó¶Áдװ±¸ÄÚ´æ»ò¹Ì¼þ£¬£¬£¬ £¬ÊµÏÖ¶ñÒâ´úÂë×¢Èë¡¢¹Ì¼þ¸Ä¶¯µÈ²Ù×÷¡£¡£¡£¡£¡£¡£ ¡£¸üÑÏËàµÄÊÇ£¬£¬£¬ £¬ºÚ¿Í¿Éð³äÒÑÅä¶Ô×°±¸ÏòÓû§ÊÖ»ú·¢ËÍÖ¸Á£¬£¬ £¬ÀýÈçÇÔȡͨ»°¼Í¼¡¢ÁªÏµÈËÐÅÏ¢£¬£¬£¬ £¬ÉõÖÁÔ¶³Ì²Ù¿ØÂó¿Ë·ç¾ÙÐÐʵʱ¼àÌý¡£¡£¡£¡£¡£¡£ ¡£Ö»¹ÜÏÖʵ¹¥»÷Ðè½Ï¸ßÊÖÒÕˮƽÇÒÒÀÀµÎïÀíÏà½üÐÔ£¬£¬£¬ £¬µ«Õë¶ÔÕþÒª¡¢¼ÇÕß¡¢ÆóÒµ¸ß¹ÜµÈ¸ß¼ÛֵĿµÄµÄDZÔÚΣº¦ÈÔÒý·¢µ£ÐÄ¡£¡£¡£¡£¡£¡£ ¡£AirohaËäÒÑÓÚ2025Äê6ÔÂÏò³§ÉÌÌṩÐÞ¸´²¹¶¡£¡£¡£¡£¡£¡£ ¡£¬£¬£¬ £¬µ«×°±¸ÖÆÔìÉ̵Ĺ̼þ¸üнø¶ÈÀǼ®²»Æë¡£¡£¡£¡£¡£¡£ ¡£


https://cybernews.com/security/millions-of-headphones-vulnerable-to-bluetooth-hacks/


3. ¶íÂÞ˹¹ú·À¾ÞÍ·NPO MarsÔâºÚ¿Í¹¥»÷£¬£¬£¬ £¬Ë®Ê¦ÉñÃØÊý¾Ýй¶


7ÔÂ1ÈÕ£¬£¬£¬ £¬¶íÂÞ˹Áª°î¼¶¹ú·À³Ð°üÉÌNPO Mars¿ËÈÕÔâÓöÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ £¬¹¥»÷ÕßÐû³ÆÇÔÈ¡ÁË250GBÃô¸Ð¾üÊÂÎļþ£¬£¬£¬ £¬Éæ¼°¶íÂÞ˹ˮʦ½¹µãÖ¸»Ó¿ØÖÆÏµÍ³¡£¡£¡£¡£¡£¡£ ¡£Æ¾Ö¤Ñо¿ÍŶӵÄÊӲ죬£¬£¬ £¬Ð¹Â¶Êý¾Ý°üÀ¨´ó×Ú±êעΪ¡°¾øÃÜ¡±µÄPDFÎļþºÍÊÖÒÕÊֲᣬ£¬£¬ £¬²¿·ÖÎļþ¸üÐÂÖÁ2025Äê3Ô£¬£¬£¬ £¬Ö¤Êµ¹¥»÷¾ßÓи߶ÈʱЧÐÔ¡£¡£¡£¡£¡£¡£ ¡£ÆäÖУ¬£¬£¬ £¬ÃûΪ¡°SIGMA-20385¡±µÄ×÷Õ½ÐÅÏ¢Óë¿ØÖÆÏµÍ³ÊÖ²áÓÈΪҪº¦£¬£¬£¬ £¬¸ÃϵͳÈÏÕæ¶íÂÞ˹ˮʦ½¢Í§µÄÎÞа¿ØÖÆ¡¢·´Ç±·ÀÓù¼°µ¼µ¯ÎäÆ÷Эͬ¡£¡£¡£¡£¡£¡£ ¡£¹¥»÷ÕßÐû²¼µÄÊÓÆµ¹ã¸æ¸üÉù³ÆÒÑÈëÇÖ¡°TRASSA¡±×ÛºÏÖ¸»Óϵͳ¼°¡°DIEZ¡±É¨À×ͧ×Ô¶¯¿ØÖÆÏµÍ³£¬£¬£¬ £¬ÉõÖÁÑÝʾ¸Ä¶¯¶í¾ü½¢Í§×ø±êÊý¾ÝµÄ²Ù×÷½çÃæ£¬£¬£¬ £¬ÌåÏÖÆä¾ß±¸ÊµÊ±×ÌÈÅÄÜÁ¦¡£¡£¡£¡£¡£¡£ ¡£NPO Mars×÷Ϊ¶íÂÞ˹¾üÊ¿Ƽ¼½¹µãÆóÒµ£¬£¬£¬ £¬ÆäÓªÒµÁýÕÖ×Ô¶¯»¯Ö¸»Óϵͳ¡¢×°¼×³µÁ¾¿ØÖÆÆ½Ì¨¼°Ë®Ê¦½¢Í§µç×Ó×°±¸Ñз¢£¬£¬£¬ £¬Ô±¹¤¹æÄ£³¬1100ÈË¡£¡£¡£¡£¡£¡£ ¡£ÊÖÒÕÆÊÎöÏÔʾ£¬£¬£¬ £¬¹¥»÷Õß¿ÉÄÜͨ¹ý´¹ÂÚ¹¥»÷»ñÈ¡³õʼ»á¼ûȨÏÞ£¬£¬£¬ £¬¼Ì¶øÉøÍ¸ÖÁÄÚÍøÇÔÈ¡ÉñÃØÎĵµ¡£¡£¡£¡£¡£¡£ ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬ £¬Ð¹Â¶Êý¾ÝÑù±¾ÖмȰüÀ¨2017ÄêµÄÀúÊ·Îļþ£¬£¬£¬ £¬Ò²º­¸Ç2024Äê¸üеÄÊÖÒÕÊֲᣬ£¬£¬ £¬Åú×¢¹¥»÷Õ߾߱¸ºã¾ÃDZÔÚÄÜÁ¦¡£¡£¡£¡£¡£¡£ ¡£


https://cybernews.com/security/russian-defense-contractor-mars-breach-navy/


4. CISA½«TeleMessage TM SGNL¸ßΣÎó²îÄÉÈëKEVĿ¼


7ÔÂ2ÈÕ£¬£¬£¬ £¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Õýʽ½«TeleMessage TM SGNLͨѶƽ̨ÖеÄÁ½ÏîÑÏÖØÎó²î£¨CVE-2025-48927¡¢CVE-2025-48928£©ÁÐÈë¡°ÒÑÖª±»Ê¹ÓÃÎó²îĿ¼¡±£¨KEV£©£¬£¬£¬ £¬ÒªÇóÁª°î»ú¹¹ÓÚ2025Äê7ÔÂ22ÈÕǰÍê³ÉÐÞ¸´£¬£¬£¬ £¬²¢ºôÓõ˽Ӫ²¿·Öͬ²½×Բ顣¡£¡£¡£¡£¡£ ¡£CVE-2025-48927£¨CVSSÆÀ·Ö5.3£©Ô´ÓÚTeleMessage TM SGNLµÄSpring Boot Actuator×é¼þÉèÖùýʧ£¬£¬£¬ £¬µ¼ÖÂÃô¸ÐµÄ/heapdump¶Ñת´¢¶Ëµã̻¶¡£¡£¡£¡£¡£¡£ ¡£¹¥»÷Õß¿ÉʹÓøÃÎó²îÖ±½Ó»á¼ûÄÚ´æ¿ìÕÕ£¬£¬£¬ £¬ÇÔȡδ¼ÓÃܵį¾Ö¤¡¢»á»°ÁîÅÆµÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£ ¡£CVE-2025-48928£¨CVSSÆÀ·Ö4.0£©ÔòÉæ¼°½¹µãת´¢Îļþ̻¶ÎÊÌ⣬£¬£¬ £¬TeleMessageЧÀ͵ÄJSPÓ¦ÓÃÔÚ´¦Öóͷ£HTTPÇëÇóʱ£¬£¬£¬ £¬½«Óû§ÃÜÂëµÈÃ÷ÎÄÐÅÏ¢Ö±½ÓдÈë¶ÑÄÚ´æ¿ìÕÕ£¬£¬£¬ £¬ÇÒÎļþȨÏÞ¿ØÖÆÈ±Ê§£¬£¬£¬ £¬Ê¹µÃδ¾­ÊÚȨµÄ¹¥»÷Õß¾ù¿É»ñÈ¡ÕâЩÊý¾Ý¡£¡£¡£¡£¡£¡£ ¡£CISAÔÚͨ¸æÖÐÇ¿µ÷£¬£¬£¬ £¬ÕâÁ½¸öÎó²îµÄ×éºÏʹÓÿÉÄÜÐγÉÍêÕû¹¥»÷Á´£º¹¥»÷ÕßÊ×ÏÈͨ¹ýCVE-2025-48927»ñȡϵͳÄÚ´æÊý¾Ý£¬£¬£¬ £¬ÔÙʹÓÃCVE-2025-48928ÌáÈ¡´æ´¢µÄÃÜÂ룬£¬£¬ £¬´Ó¶øºáÏòÉøÍ¸ÖÁÄÚ²¿ÍøÂç¡£¡£¡£¡£¡£¡£ ¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬ £¬TeleMessage TM SGNL×÷ΪÆóÒµ¼¶Í¨Ñ¶Æ½Ì¨£¬£¬£¬ £¬±»¶à¼ÒÁª°î»ú¹¹ÓÃÓÚÃô¸ÐÐÅÏ¢´«Ê䣬£¬£¬ £¬Îó²îʹÓÿÉÄܵ¼ÖÂÉñÃØÊý¾Ýй¶»ò¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£¡£¡£ ¡£


https://securityaffairs.com/179542/hacking/u-s-cisa-adds-telemessage-tm-sgnl-flaws-to-its-known-exploited-vulnerabilities-catalog.html


5. ³¯ÏʺڿͰ²ÅÅNimDoorÖØ´ó¶ñÒâÈí¼þ


7ÔÂ2ÈÕ£¬£¬£¬ £¬³¯ÏÊÕþ¸®Åä¾°µÄºÚ¿Í×éÖ¯ÕýʹÓÃÒ»¿îÃûΪNimDoorµÄÐÂÐÍmacOS¶ñÒâÈí¼þ£¬£¬£¬ £¬¶ÔÈ«Çòweb3¼°¼ÓÃÜÇ®±ÒÁìÓòÌᳫ¾«×¼¹¥»÷¡£¡£¡£¡£¡£¡£ ¡£ÍøÂçÇå¾²¹«Ë¾SentinelLabsÔÚ×îб¨¸æÖÐÅû¶£¬£¬£¬ £¬¸Ã¹¥»÷Á´Í¨¹ýTelegramÉç½»¹¤³ÌÓÕÆ­Êܺ¦ÕßÔËÐÐαװ³ÉZoom SDK¸üеĶñÒâ³ÌÐò£¬£¬£¬ £¬ÆäÊÖÒÕÖØÆ¯ºóÓëÒþ²ØÐԵִﳯÏʺڿ͹¤¾ß¿âµÄȫи߶È¡£¡£¡£¡£¡£¡£ ¡£Ñо¿ÏÔʾ£¬£¬£¬ £¬NimDoor½ÓÄÉC++ÓëNimÓïÑÔ»ìÏý±àÒëµÄ¶þ½øÖÆ×é¼þ£¬£¬£¬ £¬ÐγÉÄ£¿£¿£¿£¿é»¯¹¥»÷¿ò¼Ü¡£¡£¡£¡£¡£¡£ ¡£³õʼѬȾ½×¶Î£¬£¬£¬ £¬ÃûΪ"installer"µÄ¶þ½øÖÆÎļþÈÏÕæÏµÍ³ÇéÐΰ²ÅÅ£¬£¬£¬ £¬Ö²Èë"GoogIe LLC"ºÍ"CoreKitAgent"Á½¸ö½¹µãÄ£¿£¿£¿£¿é¡£¡£¡£¡£¡£¡£ ¡£×÷Ϊ½¹µãÔØºÉµÄCoreKitAgentÕ¹ÏÖ³ö¶àÏîÍ»ÆÆÐÔÊÖÒÕ£ºÆäÒ»£¬£¬£¬ £¬½ÓÄÉÊÂÎñÇý¶¯¼Ü¹¹£¬£¬£¬ £¬Í¨¹ýmacOSµÄkqueue»úÖÆÊµÏÖÒ첽ʹÃüÖÎÀí£»£»£»£» £»£»Æä¶þ£¬£¬£¬ £¬ÄÚÖÃ10Àý״̬»ú¿ØÖÆÁ÷£¬£¬£¬ £¬¿Éƾ֤ÔËÐÐʱÌõ¼þ¶¯Ì¬µ÷½â¹¥»÷Âß¼­£»£»£»£» £»£»ÆäÈý£¬£¬£¬ £¬¿ª´´ÐÔµØÊ¹ÓûùÓÚÐźŵij¤ÆÚ»¯»úÖÆ¡£¡£¡£¡£¡£¡£ ¡£ÔÚÊý¾ÝÇÔÈ¡²ãÃæ£¬£¬£¬ £¬NimDoor¹¹½¨ÁË˫ͨµÀ¹¥»÷Á´¡£¡£¡£¡£¡£¡£ ¡£Ö÷Á´Í¨¹ý½âÂëÊ®Áù½øÖÆAppleScript£¬£¬£¬ £¬Ã¿30ÃëÏòC2ЧÀÍÆ÷·¢ËÍϵͳÐű꣬£¬£¬ £¬²¢Ö´ÐÐÔ¶³ÌosascriptÏÂÁîʵÏÖÇáÁ¿¼¶ºóÃÅ¿ØÖÆ¡£¡£¡£¡£¡£¡£ ¡£¸¨ÖúÁ´ÔòʹÓÃ"zoom_sdk_support.scpt"¼ÓÔØÆ÷Æô¶¯WebSocketͨѶ£¬£¬£¬ £¬ÏÂÔØuplºÍtlgrmÁ½¸ö¾ç±¾£¬£¬£¬ £¬ÐγɴÓϵͳÐÅÏ¢µ½¼ÓÃÜÇ®±ÒÇ®°üµÄÍêÕûÇÔÈ¡Á´Â·¡£¡£¡£¡£¡£¡£ ¡£


https://www.bleepingcomputer.com/news/security/nimdoor-crypto-theft-macos-malware-revives-itself-when-killed/


6. Ò½ÁÆÆ÷е¹«Ë¾Surmodics±¨¸æÔâÊÜÍøÂç¹¥»÷


7ÔÂ3ÈÕ£¬£¬£¬ £¬ÃÀ¹úÒ½ÁÆ×°±¸ÖÆÔìÉÌSurmodics¿ËÈÕÅû¶£¬£¬£¬ £¬ÆäÓÚ6ÔÂ5ÈÕÔâÊÜÍøÂç¹¥»÷µ¼Ö²¿·ÖITϵͳ̱»¾£¬£¬£¬ £¬³ÉΪ½ñÄêµÚÈý¼ÒÏòÃÀ¹ú֤ȯÉúÒâίԱ»á£¨SEC£©±¨¸æ´ËÀàÊÂÎñµÄÉÏÊÐÒ½ÁÆÆ÷е¹«Ë¾¡£¡£¡£¡£¡£¡£ ¡£Õâ¼Ò×ܲ¿Î»¾ÓÃ÷ÄáËÕ´ïÖÝµÄÆóÒµ×÷ΪȫÇò×î´óÍâ°üÇ×ˮͿ²ã¹©Ó¦ÉÌ£¬£¬£¬ £¬Æä²úÆ·ÆÕ±éÓ¦ÓÃÓÚѪ¹ÜÄÚÒ½ÁÆÆ÷еÒÔ½µµÍĦ²ÁϵÊý¡£¡£¡£¡£¡£¡£ ¡£¹¥»÷±¬·¢ºó£¬£¬£¬ £¬¹«Ë¾ITÍŶÓѸËÙ¼ì²âµ½Òì³£»á¼û²¢×Ô¶¯ÇжÏϵͳ£¬£¬£¬ £¬×ª¶øÍ¨¹ýÊÖ¹¤Á÷³Ìά³Ö¿Í»§¶©µ¥´¦Öóͷ£Óë·¢»õ£¬£¬£¬ £¬µ«´Ë´ÎÊÂÎñÈÔ̻¶³öÒ½Áƹ©Ó¦Á´Êý×Ö»¯×ªÐÍÖеÄÉî²ãÇå¾²Òþ»¼¡£¡£¡£¡£¡£¡£ ¡£Æ¾Ö¤SEC±¸°¸Îļþ£¬£¬£¬ £¬SurmodicsÔÚÍøÂçÇ徲ר¼ÒЭÖúÏÂÒѲ¿·Ö»Ö¸´Òªº¦ÏµÍ³£¬£¬£¬ £¬µ«ºÚ¿ÍÇÔÈ¡Êý¾ÝµÄÏêϸ¹æÄ£ÈÔÔÚÆÀ¹ÀÖС£¡£¡£¡£¡£¡£ ¡£¹«Ë¾Ê×ϯ²ÆÎñ¹ÙµÙĪÎ÷¡¤°¢Â×˹£¨Timothy Arens£©¾¯Ê¾£¬£¬£¬ £¬´Ë´ÎÊÂÎñ´øÀ´µÄΣº¦Ô¶Î´Ïû³ý£º³ýÒ»Á¬¾ÙÐеÄϵͳÐÞ¸´Í⣬£¬£¬ £¬ÖÎÀí²ãÐè·ÖÉñÓ¦¶ÔDZÔÚËßËÏ¡¢¿Í»§ÐÅÈÎΣ»£»£»£» £»£»ú¼°î¿ÏµÉó²é¡£¡£¡£¡£¡£¡£ ¡£Ö»¹Ü¹«Ë¾¼á³ÆÎ´·¢Ã÷¿Í»§»òµÚÈý·½Êý¾Ýй¶£¬£¬£¬ £¬µ«Ò½ÁÆÐÐÒµ½üÆÚÕûÌåËßËÏÆµ·¢£¬£¬£¬ £¬Ê¹µÃSurmodics¶ÔÖ´·¨Î£º¦¼á³Ö¸ß¶ÈСÐÄ¡£¡£¡£¡£¡£¡£ ¡£


https://therecord.media/surmodics-medical-device-company-reports-cybersecurity-incident