ºÚ¿ÍÕýÔÚʹÓÃWing FTP ServerµÄÑÏÖØRCEÎó²î
Ðû²¼Ê±¼ä 2025-07-141. ºÚ¿ÍÕýÔÚʹÓÃWing FTP ServerµÄÑÏÖØRCEÎó²î
7ÔÂ13ÈÕ£¬£¬£¬ÍøÂçÇå¾²ÁìÓòÆØ³öÕë¶ÔWing FTP ServerµÄÑÏÖØÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-47812£©£¬£¬£¬¸ÃÎó²îÒòCVSS 10·ÖµÄ×î¸ßΣÆÀ¼¶Òý¿¯ÐÐÒµ¸ß¶È¹Ø×¢¡£¡£¡£¡£×÷Ϊ֧³Ö¶àÐÒ飨FTP/FTPS/SFTP/HTTP/S£©µÄ¿çƽ̨Îļþ´«Êä½â¾ö¼Æ»®£¬£¬£¬Wing FTP ServerĬÈÏÒÔroot£¨Linux£©»òSYSTEM£¨Windows£©È¨ÏÞÔËÐУ¬£¬£¬ÇÒȱ·¦È¨ÏÞ¸ôÀë»úÖÆ£¬£¬£¬µ¼ÖÂÎó²î±»Ê¹ÓÃʱ¿ÉÖ±½ÓÔì³ÉЧÀÍÆ÷Íêȫʧ¿Ø¡£¡£¡£¡£Îó²îȪԴÔÚÓÚÈí¼þ¶Ô¿Õ×ֽڵĴ¦Öóͷ£È±ÏÝ¡£¡£¡£¡£MITREÇ徲ͨ¸æÖ¸³ö£¬£¬£¬7.4.4°æ±¾Ç°µÄ²úƷδ¶ÔÓû§ºÍÖÎÀíÔ±Web½çÃæÖеĻỰÎļþ¾ÙÐгä·ÖÑéÖ¤£¬£¬£¬¹¥»÷Õß¿Éͨ¹ý×¢Èëº¬ÌØÊâ×Ö·ûµÄÓû§Ãû£¬£¬£¬½«¶ñÒâLua´úÂëÖ²Èë»á»°Îļþ¡£¡£¡£¡£µ±Êܺ¦Õß»á¼ûÌØ¶¨Ò³Ãæ»òÖ´ÐÐĿ¼²Ù×÷ʱ£¬£¬£¬¶ñÒâ´úÂë±ã»áÒÔϵͳ×î¸ßȨÏÞ´¥·¢£¬£¬£¬ÐγÉÎÞÐèÎïÀí½Ó´¥µÄÔ¶³Ì´úÂëÖ´ÐÐÁ´¡£¡£¡£¡£ÓÈΪΣÏÕµÄÊÇ£¬£¬£¬×ÝÈ»ÆôÓÃĬÈϽûÓõÄÄäÃûFTPÕË»§£¬£¬£¬¹¥»÷ÕßÈÔ¿ÉÈÆ¹ý×Ö·û´®´¦Öóͷ£»úÖÆÊµÑé¹¥»÷£¬£¬£¬ÊµÏÖ´ÓͨË×Óû§È¨ÏÞµ½ÏµÍ³ÖÎÀíԱȨÏÞµÄ×ÝÏòÌáȨ¡£¡£¡£¡£¸ÃÎó²îÊÖÒÕϸ½ÚÓÚ6ÔÂ30ÈÕ¹ûÕæºó£¬£¬£¬7ÔÂ1ÈÕ¼´·ºÆðÕæÊµ¹¥»÷°¸Àý¡£¡£¡£¡£
https://securityaffairs.com/179861/hacking/wing-ftp-server-flaw-actively-exploited-shortly-after-technical-details-were-made-public.html
2. Google Gemini Îó²î¿ÉÐ®ÖÆµç×ÓÓʼþÕªÒª¾ÙÐÐÍøÂç´¹ÂÚ
7ÔÂ13ÈÕ£¬£¬£¬Çå¾²Ñо¿Ö°Ô±Åû¶Google Gemini for Workspace±£´æÐÂÐÍÍøÂç´¹ÂÚÎó²î£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÒþ²ØÔÚµç×ÓÓʼþÕýÎÄÖеĶñÒâÖ¸Á£¬£¬ÓÕʹAI¹¤¾ßÌìÉú¿´ËÆÕýµ±µÄ´¹ÂÚÄÚÈÝ¡£¡£¡£¡£¸ÃÎó²îʹÓÃGeminiµÄÕªÒªÉúÀÖ³ÉÄÜ£¬£¬£¬Í¨¹ýÊÖÒÕÊÖ¶ÎÈÆ¹ý¹Å°åÇå¾²¼ì²â£¬£¬£¬³ÉΪ¼Ì2024ÄêÌáÐÑ×¢Èë¹¥»÷ºó£¬£¬£¬Õë¶ÔÌìÉúʽAIµÄÓÖÒ»ÖØ´óÇå¾²ÌôÕ½¡£¡£¡£¡£¾ÝMozilla GenAIÎó²îÉͽðÍýÏëÑо¿Ô±Marco FigueroaÅû¶£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýHTML/CSSÊÖÒÕ½«¶ñÒâÖ¸ÁîǶÈëÓʼþÕýÎÄ£¬£¬£¬Í¨¹ýÉèÖÃ×ÖÌå¾ÞϸΪ0¡¢ÑÕɫΪ°×É«£¬£¬£¬Ê¹Ö¸ÁîÔÚGmail¿Í»§¶ËÖÐÍêÈ«²»¿É¼û¡£¡£¡£¡£µ±Óû§ÇëÇóGeminiÌìÉúÓʼþժҪʱ£¬£¬£¬AI»áÆÊÎö²¢Ö´ÐÐÕâЩÒþ²ØÖ¸Á£¬£¬ÌìÉú°üÀ¨ÐéαÇå¾²ÖÒÑÔ¡¢´¹ÂÚÁ´½Ó»òÖ§³Öµç»°ºÅÂëµÄÄÚÈÝ¡£¡£¡£¡£ÀýÈ磬£¬£¬ÔÚFigueroaÌṩµÄ°¸ÀýÖУ¬£¬£¬GeminiÌìÉúÁË"ÄúµÄGmailÃÜÂëÒÑй¶£¬£¬£¬ÇëÁ¬Ã¦²¦´òÖ§³Öµç»°´¦Öóͷ£"µÄÐéα¾¯±¨£¬£¬£¬´ËÀàÐÅÏ¢¼«Ò×±»Óû§ÎóÒÔΪÊÇGoogle¹Ù·½Í¨Öª¡£¡£¡£¡£¸Ã¹¥»÷µÄÒþ²ØÐÔÌåÏÖÔÚÈý¸ö·½Ã棺ÎÞÐ踽¼þ»òÁ´½Ó¼´¿É´¥·¢¡¢Ê¹ÓÃÓû§¶ÔAIÕªÒªµÄÐÅÈΡ¢Í¨¹ýÊÓ¾õÒþ²Ø¹æ±ÜÓʼþÄÚÈÝɸ²é¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/google-gemini-flaw-hijacks-email-summaries-for-phishing/
3. Gravity FormsÔ⹩ӦÁ´¹¥»÷£¬£¬£¬¹Ù·½ÇþµÀÏÂÔØÎļþ±»Ö²ÈëºóÃÅ
7ÔÂ11ÈÕ£¬£¬£¬È«ÇòÔ¼°ÙÍò¸öÍøÕ¾Ê¹ÓõÄWordPress¸ß¼¶±íµ¥²å¼þGravity FormsÔâÓöÑÏÖØ¹©Ó¦Á´¹¥»÷£¬£¬£¬Æä¹Ù·½ÍøÕ¾ÌṩµÄÊÖ¶¯×°Öðü±»Ö²Èë¶ñÒâºóÃÅ£¬£¬£¬µ¼Ö²¿·ÖÏÂÔØ°æ±¾±£´æÔ¶³Ì´úÂëÖ´ÐÐΣº¦¡£¡£¡£¡£¾ÝÇå¾²¹«Ë¾PatchStackÅû¶£¬£¬£¬¹¥»÷Õßͨ¹ý¸Ä¶¯²å¼þ½¹µãÎļþcommon.php£¬£¬£¬ÔÚ7ÔÂ10ÈÕÖÁ11ÈÕʱ´úÏò»á¼ûgravityapi.orgÓòÃûµÄЧÀÍÆ÷·¢ËÍÕ¾µãÔªÊý¾Ý£¨°üÀ¨URL¡¢ÖÎÀí·¾¶¡¢Ö÷Ìâ²å¼þ°æ±¾µÈÃô¸ÐÐÅÏ¢£©£¬£¬£¬²¢ÎüÊÕbase64±àÂëµÄ¶ñÒâÔØºÉ£¬£¬£¬×îÖÕÔÚÍøÕ¾Ä¿Â¼ÌìÉúαװ³ÉWordPressϵͳÎļþµÄ"bookmark-canonical.php"£¬£¬£¬ÊµÏÖÎÞÐèÉí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£´Ë´ÎÊÂÎñÓ°Ïì¹æÄ£ÆÕ±é£¬£¬£¬Éæ¼°Gravity Forms 2.9.11.1ºÍ2.9.12°æ±¾µÄÊÖ¶¯ÏÂÔØ¼°Composer×°Ö÷½·¨¡£¡£¡£¡£¹¥»÷ÕßʹÓøúóÃŲ»µ«ÇÔÈ¡Êý¾Ý£¬£¬£¬¸üÖ±½ÓÔÚÊÜÑ¬È¾ÍøÕ¾Ìí¼ÓÖÎÀíÔ±ÕË»§£¬£¬£¬ÍêÈ«¿ØÖÆÄ¿µÄϵͳ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬Í¨¹ýGravity Forms¹Ù·½APIЧÀ;ÙÐеÄ×Ô¶¯¸üк͸½¼Ó×é¼þ×°ÖÃδÊÜÓ°Ï죬£¬£¬µ«ÊÖ¶¯ÏÂÔØÇþµÀ³ÉΪ¹¥»÷Èë¿Ú¡£¡£¡£¡£¿£¿£¿£¿ª·¢³§ÉÌRocketGeniusÔÚʺ󱨸æÖÐÈ·ÈÏ£¬£¬£¬¶ñÒâ´úÂë»á×è¶ÏÕý³£¸üÐÂÁ÷³Ì²¢Ò»Á¬ÅþÁ¬ÍⲿЧÀÍÆ÷£¬£¬£¬½¨ÒéËùÓнüÆÚͨ¹ýÊÖ¶¯·½·¨×°Öûò¸üвå¼þµÄÓû§Á¬Ã¦ÖØÐÂ×°Öùٷ½Çå½à°æ±¾£¬£¬£¬²¢¼ì²éÍøÕ¾ÊÇ·ñ±£´æÒì³£ÖÎÀíÔ±ÕË»§¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/wordpress-gravity-forms-developer-hacked-to-push-backdoored-plugins/
4. ÃÀ¹ú°¢À°ÍÂíÖݼӵǴú¶ûÊÐÔâINC RansomÀÕË÷¹¥»÷
7ÔÂ11ÈÕ£¬£¬£¬ÃÀ¹ú°¢À°ÍÂíÖݼӵǴú¶ûÊÐÕþ¸®¿ËÈÕÏÝÈëÊý¾ÝÇ徲Σ»£»£»ú£¬£¬£¬ÆäÃô¸ÐÐÅÏ¢±»ÆØ·ºÆðÔÚ°µÍøÂÛ̳ÉÏ¡£¡£¡£¡£×ÅÃûÀÕË÷×éÖ¯INC RansomÐû³ÆÒÑÇÔÈ¡¸ÃÊÐÔ¼50GBÊý¾Ý£¬£¬£¬°üÀ¨ÊÐÕþÌõÔ¼¡¢²ÆÎñ¼Í¼¡¢¿Í»§ÐÅÏ¢¡¢ÈËÁ¦×ÊÔ´µµ°¸¼°Ê¹ʱ¨¸æµÈÉñÃØ×ÊÁÏ£¬£¬£¬²¢½«ÆäÁÐÈëйÃÜÍøÕ¾ÒÔʩѹ֧¸¶Êê½ð¡£¡£¡£¡£Ö»¹Ü¹¥»÷ÕßÉÐδÌṩÊý¾ÝÑù±¾»ò½ØÍ¼ÑéÖ¤ÕæÊµÐÔ£¬£¬£¬µ«´Ë´ÎÊÂÎñÒÑÒý·¢¶ÔÊÐÃñÉí·ÝµÁÓÃΣº¦¼°ÊÐÕþϵͳÇå¾²ÐԵĵ£ÐÄ¡£¡£¡£¡£¼ÓµÇ´ú¶ûÊÐ×÷Ϊ²®Ã÷º²±±²¿½¼Çø¡¢Éú³Ý³¬1.6ÍòµÄ³ÇÕò£¬£¬£¬ÈôÊý¾Ýй¶Êôʵ£¬£¬£¬¿ÉÄܳÉÎªÍøÂç·¸·¨·Ö×Ó½øÒ»²½ÉøÍ¸Õþ¸®ÍøÂçµÄÒªº¦Ìø°å¡£¡£¡£¡£INC Ransom×éÖ¯×Ô2023Äê7Ô»îÔ¾ÒÔÀ´£¬£¬£¬ÒÑÐγÉ"¶àÖØÀÕË÷"ģʽ£¬£¬£¬²»µ«¼ÓÃÜÊý¾Ý£¬£¬£¬¸üÒÔ¹ûÕæÐ¹Â¶ÎªÍþв£¬£¬£¬ÆÈʹÊܺ¦Õ߾ͷ¶¡£¡£¡£¡£¾Ý°µÍø¼à¿Ø¹¤¾ßRansomlookerͳ¼Æ£¬£¬£¬¸ÃÍÅ»ïÒÑÍùÒ»ÄêÄÚ¹¥»÷ÖÁÉÙ176¼Ò»ú¹¹£¬£¬£¬Êܺ¦Õ߱鲼ҽÁÆ¡¢½ÌÓý¡¢Õþ¸®¼°ÆóÒµÁìÓò¡£¡£¡£¡£
https://cybernews.com/security/gardendale-alabama-ransomware-attack/
5. ÷è÷ëÀÕË÷Èí¼þÇ¿ÊÆáÈÆð£¬£¬£¬Ê¹ÓÃFortinetÎó²îÖÂ81¼Ò»ú¹¹Êܹ¥»÷
7ÔÂ12ÈÕ£¬£¬£¬¿ËÈÕÀÕË÷Èí¼þÁìÓòÓÀ´ÖØ´ó±ä¾Ö£¬£¬£¬÷è÷루Qilin£©×éÖ¯ÒÀ¸½47.3%µÄ»îÔ¾¶È¼¤Ôö£¬£¬£¬ÒÔ81ÆðÐÂÔö°¸¼þÓâÔ½¹Å°å¾¢Â㬣¬£¬³ÉΪȫÇò×î»îÔ¾µÄÀÕË÷Èí¼þ¼´Ð§ÀÍ£¨RaaS£©ÍŻ¡£¡£¡£¸Ã×éÖ¯×Ô½µÉúÒÔÀ´ÒÑÀۼƹ¥»÷³¬310¸öÄ¿µÄ£¬£¬£¬ÆäÊÖÒÕÑݽøÓëÕ½ÂÔתÐÍÕýÖØËÜÍøÂçÇå¾²ÍþвÃûÌᣡ£¡£¡£÷è÷ëµÄ¿ìËÙÀ©ÕÅÔ´ÓÚ¶ÔÒªº¦»ù´¡ÉèÊ©Îó²îµÄϵͳÐÔʹÓᣡ£¡£¡£2025Äê5-6Ô¼䣬£¬£¬¸Ã×éÖ¯½«¹¥»÷½¹µãÃé׼δÐÞ²¹µÄFortinetÇå¾²×°±¸£¬£¬£¬ÓÈÆäÕë¶ÔFortiGateºÍFortiProxy×°±¸ÖеÄCVE-2024-21762£¨Éí·ÝÑéÖ¤ÈÆ¹ý£©ÓëCVE-2024-55591£¨Ô¶³Ì´úÂëÖ´ÐУ©Îó²î¡£¡£¡£¡£Ö»¹ÜǰÕßÒÑÓÚ2025Äê2ÔÂÐû²¼²¹¶¡£¡£¡£¡£¬£¬£¬µ«È«ÇòÊýÍǫ̀װ±¸ÈÔ̻¶ÔÚ¹¥»÷ÃæÏ£¬£¬£¬Îª÷è÷ëÌṩÁË×Ô¶¯»¯°²Åŵľø¼ÑÈë¿Ú¡£¡£¡£¡£¹¥»÷Á´ÏÔʾ£¬£¬£¬ÍþвÐÐΪÕßͨ¹ýÌØÖÆÇëÇó´¥·¢Îó²î£¬£¬£¬ÎÞÐèÆ¾Ö¤¼´¿É½¨ÉèÍøÂçפ×ãµã£¬£¬£¬ËæºóÊͷŽÓÄÉRustÓëCÓïÑÔ±àдµÄÄ£¿£¿£¿£¿é»¯¶ñÒâÔØºÉ£¬£¬£¬ÊµÑ鳤ÆÚ»¯¿ØÖÆÓëºáÏòÉøÍ¸¡£¡£¡£¡£ÊÖÒÕÆÊÎöÕ¹ÏÖ£¬£¬£¬÷è÷ëµÄÍþвģ×ÓÒÑÍ»ÆÆ¹Å°åÀÕË÷ÁìÓò£¬£¬£¬¹¹½¨Æðº¸ÇÀ¬»øÓʼþ¡¢DDoS¹¥»÷¡¢PB¼¶Êý¾Ý´æ´¢¼°ÐÄÀíÕ½¹¤¾ßµÄÍêÕû·¸·¨Éú̬¡£¡£¡£¡£Æä¶À´´µÄ"ºô½Ð״ʦ"¹¦Ð§Í¨¹ýÄ£ÄâÖ´·¨Ì¸Åг¡¾°£¬£¬£¬¶ÔÊܺ¦ÕßÊ©¼ÓÐÄÀíѹÁ¦£¬£¬£¬ÏÔÖøÌáÉýÊê½ðÐÉÌЧÂÊ¡£¡£¡£¡£ÕâÖÖ¶àά¶È¹¥»÷ģʽʹÆäѸËÙÌî²¹LockBit¡¢BlackCatµÈÇýÖð×éÖ¯ÁôϵÄÊг¡¿Õȱ£¬£¬£¬ÎüÒý´ó×ÚÁ¥ÊôÍŶӼÓÃË¡£¡£¡£¡£
https://cybersecuritynews.com/qilin-emerged-as-the-most-active-group/
6. ºÚ¿Í½èÕýµ±Mac¹¤¾ßÖ²ÈëZuRuľÂí£¬£¬£¬ÖصãÕë¶Ô¿ª·¢ÕßȺÌå
7ÔÂ11ÈÕ£¬£¬£¬Çå¾²»ú¹¹SentinelOne¿ËÈÕÐû²¼¾¯±¨£¬£¬£¬Õ¹ÏÖºÚ¿ÍÕýͨ¹ýÎÛȾËÑË÷ÒýÇæÐ§¹ûµÄ·½·¨£¬£¬£¬½«Ö²ÈëZuRuľÂíµÄ¸Ä¶¯°æMac¹¤¾ßÍÆË͸øÓû§£¬£¬£¬×îй¥»÷Ä¿µÄÃé×¼¿çƽ̨SSH¿Í»§¶ËTermius¡£¡£¡£¡£´Ë´Î¹¥»÷ÑÓÐøÁËÕë¶Ô¿ª·¢Õß³£Óù¤¾ßµÄ¶ñÒâÈí¼þÈö²¥Ä£Ê½£¬£¬£¬Í¹ÏÔmacOSÆ½Ì¨ÃæÁٵũӦÁ´Çå¾²ÍþвһÁ¬Éý¼¶¡£¡£¡£¡£±»¸Ä¶¯µÄTermius×°ÖðüÄÚº¬Ð°æmacOS.ZuRuºóÃŲ¡¶¾¡£¡£¡£¡£¸ÃľÂí×°Öúó»áÔÚºǫ́¾²Ä¬ÔËÐУ¬£¬£¬½¨É賤ÆÚ»¯»á¼ûͨµÀ£¬£¬£¬²»µ«Äܹ»Ô¶³ÌÏÂÔØÓк¦×é¼þ£¬£¬£¬»¹¿ÉÖ´Ðй¥»÷ÕßÖ¸Á£¬£¬¹¦Ð§º¸ÇÎļþ´«Ê䡢ϵͳÕì̽¡¢Àú³Ì²Ù¿Ø¼°Ö¸Áî·´ÏìµÈ¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬¹¥»÷ÕßÒªÇóÊܺ¦ÏµÍ³ÖÁÉÙΪ2023Äê10ÔÂÐû²¼µÄSonoma 14.1»ò¸üа汾£¬£¬£¬ÌåÏÖÆä¿ÉÄÜÕë¶Ô½ÏеÄmacOSÇéÐÎÓÅ»¯¹¥»÷´úÂë¡£¡£¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬£¬£¬´Ë´Î¹¥»÷Öи͝µÄTermius°üÀ¨³¤ÆÚÐÔÏÂÔØÆ÷£¬£¬£¬¿É»ñÈ¡²¢½âÂë¿ªÔ´ÉøÍ¸¹¤¾ßKhepri£¬£¬£¬Í¨¹ý¶ñÒâÓòÃû½¨ÉèÏÂÁî¿ØÖÆÍ¨µÀ¡£¡£¡£¡£¶ñÒâ´úÂëÖ´ÐÐʱ»áͬ²½Æô¶¯Ä¾Âí¼ÓÔØÆ÷ÓëÕý°æÓ¦Ó㬣¬£¬È·±£Óû§ÄÑÒÔ²ì¾õÒì³£¡£¡£¡£¡£Ç徲ר¼ÒÆÀ¹ÀÒÔΪ£¬£¬£¬´ËÀ๥»÷Ö÷ÒªÕë¶Ô"ȱ·¦ÓÐÓÃÖÕ¶Ë·À»¤"µÄÇéÐΣ¬£¬£¬ÓÈÆäÊÇÒÀÀµËÑË÷ÒýÇæÏÂÔØÈí¼þµÄ¿ª·¢ÕßȺÌå¡£¡£¡£¡£
https://cybernews.com/security/hackers-hide-mac-trojan-in-legitimate-applications/


¾©¹«Íø°²±¸11010802024551ºÅ