XZ-UtilsºóÃÅÒ»Á¬ÍþвDocker Hub£¬£¬£¬£¬£¬ÖÁÉÙ35¸ö¾µÏñÈÔ´æÒþ»¼
Ðû²¼Ê±¼ä 2025-08-141. XZ-UtilsºóÃÅÒ»Á¬ÍþвDocker Hub£¬£¬£¬£¬£¬ÖÁÉÙ35¸ö¾µÏñÈÔ´æÒþ»¼
8ÔÂ12ÈÕ£¬£¬£¬£¬£¬2024Äê3ÔÂÆØ¹âµÄXZ-UtilsºóÃÅÊÂÎñ£¨CVE-2024-3094£©ÈÔÔÚÒ»Á¬·¢½Í£¬£¬£¬£¬£¬BinarlyÑо¿ÍŶӷ¢Ã÷Docker Hub¹Ù·½ÈÝÆ÷¾µÏñ×¢²áÖÐÐÄÉÏÖÁÉÙ±£´æ35¸öÊÜѬȾµÄLinux¾µÏñ£¬£¬£¬£¬£¬ÕâЩ¾µÏñ¿ÉÄÜͨ¹ýת´ïÐÔѬȾÍþвÓû§¼°×éÖ¯Êý¾ÝÇå¾²¡£¡£¡£¡£¡£¡£¸ÃºóÃÅÓɺã¾ÃÏîĿТ˳Õß"Jia Tan"ÉñÃØ×¢Èëxz-utils 5.6.0/5.6.1°æ±¾µÄliblzma.so¿âÖУ¬£¬£¬£¬£¬Í¨¹ýglibcµÄIFUNC»úÖÆÐ®ÖÆOpenSSHµÄRSA_public_decryptº¯Êý£¬£¬£¬£¬£¬ÔÊÐí¹¥»÷ÕßʹÓÃÌØÊâË½Ô¿ÈÆ¹ýSSHÉí·ÝÑéÖ¤²¢Ô¶³ÌÖ´ÐÐrootÏÂÁî¡£¡£¡£¡£¡£¡£Ö»¹ÜÎó²î·¢Ã÷½ÏÔçÇÒ¹Ù·½ÒÑÐû²¼5.6.2¼°ÒÔÉÏÐÞ¸´°æ±¾£¬£¬£¬£¬£¬µ«Æä²ÐÁôÓ°ÏìÈÔ²¨¼°Debian¡¢FedoraµÈÖ÷Á÷Linux¿¯Ðа棬£¬£¬£¬£¬³ÉΪȥÄê×îÑÏÖØµÄÈí¼þ¹©Ó¦Á´Çå¾²ÊÂÎñÖ®Ò»¡£¡£¡£¡£¡£¡£Docker Hub×÷ΪȫÇò¿ª·¢Õ߯ձéʹÓõÄÈÝÆ÷¾µÏñƽ̨£¬£¬£¬£¬£¬ÆäÎÊÌâ¾µÏñµÄÒ»Á¬±£´æÒý·¢µ£ÐÄ¡£¡£¡£¡£¡£¡£BinarlyɨÃè·¢Ã÷£¬£¬£¬£¬£¬²¿·ÖÊÜѬȾ¾µÏñÈÔ¹ûÕæÐû²¼£¬£¬£¬£¬£¬ÇÒ±£´æ»ùÓÚÕâЩ»ù´¡¾µÏñ¹¹½¨µÄ"¶þ½×¾µÏñ"£¬£¬£¬£¬£¬ÐγÉת´ïÐÔΣº¦¡£¡£¡£¡£¡£¡£Ðí¶àCI/CD¹ÜµÀ¼°Éú²úϵͳֱ½ÓÒýÓÃDocker Hub¾µÏñ×÷Ϊ»ù´¡²ã£¬£¬£¬£¬£¬Èôδʵʱ¸üУ¬£¬£¬£¬£¬Ð¹¹½¨ÈÝÆ÷½«×Ô¶¯¼ÌÐø¶ñÒâ´úÂë¡£¡£¡£¡£¡£¡£Ö»¹ÜBinarlyÒÑÏòDebianµÈά»¤Õßת´ïÇéÐΣ¬£¬£¬£¬£¬µ«DebianÑ¡Ôñ±£´æÕâЩºóÞµÏñ£¬£¬£¬£¬£¬ÀíÓÉÊÇ"ʹÓÃÌõ¼þ¿Á¿Ì"ÇÒÐèά³Ö´æµµÒ»Á¬ÐÔ£¬£¬£¬£¬£¬½ö½¨ÒéÓû§Ê¹ÓÃ×îа汾¶ø·ÇϼܾɾµÏñ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/docker-hub-still-hosts-dozens-of-linux-images-with-the-xz-backdoor/
2. Ò½ÁÆÖÎÀí¾ÞÍ·Pacific HealthWorksÔâEverestÀÕË÷Èí¼þ¹¥»÷
8ÔÂ12ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÄϼÓÖÝÒ½ÁÆÖÎÀíЧÀ;ÞÍ·Pacific HealthWorks£¨PHW£©¿ËÈÕÔâÓöEverestÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂÆäЧÀ͵ÄÖÁÉÙ50¼ÒÒ½ÁƼ¯ÍÅÊý°Ù·ÝÃô¸ÐÊý¾Ý±»ÇÔÈ¡¡£¡£¡£¡£¡£¡£×÷Ϊ×ܲ¿Î»ÓÚ°£¶ûÈû¹±¶àµÄÒ½ÁÆÐ§ÀÍ»ú¹¹£¨MSO£©£¬£¬£¬£¬£¬PHWΪȫÃÀ1200Óà¼ÒÒ½Ôº¡¢Ò½ÉúÕûÌå¼°ÕïËùÌṩ¼±Õï¡¢ÖØÖ¢¼à»¤¡¢Âé×íµÈÁìÓòµÄÐÐÕþÖÎÀíÖ§³Ö£¬£¬£¬£¬£¬ÄêЧÀÍ»¼Õß³¬140ÍòÈ˴Ρ£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÖУ¬£¬£¬£¬£¬»¼Õß¼°Ô±¹¤µÄÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢Ò½ÁƼͼ¡¢°ü¹ÜÐÅÏ¢µÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©Ôâй¶£¬£¬£¬£¬£¬²¿·ÖÊý¾ÝÑù±¾ÒÑÔÚÀÕË÷ÍÅ»ïµÄ°µÍø²©¿Í¹ûÕæ¡£¡£¡£¡£¡£¡£EverestÍÅ»ïÓÚÉÏÖÜÄ©ÔÚÆä"ÆáºÚÊܺ¦Õß"ÍøÕ¾Ðû²¼PHW¼°Æäæ¢Ãù«Ë¾La PerouseµÄÀÕË÷ÉùÃ÷£¬£¬£¬£¬£¬ÍþвÈôδÔÚָ׼ʱ¼äÄÚÁªÏµÌ¸ÅУ¬£¬£¬£¬£¬½«Ðû²¼°üÀ¨Õ˵¥Êý¾ÝÔÚÄÚµÄ50Óà¼Ò×éÖ¯Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£CybernewsºË²é·¢Ã÷£¬£¬£¬£¬£¬Ð¹Â¶Îļþº¸ÇEmergent Medical Associates¡¢Benchmark HospitalistsµÈ¹ØÁª»ú¹¹£¬£¬£¬£¬£¬Éæ¼°Õï¶Ï´úÂë¡¢°ü¹ÜË÷ÅâµÈ½¹µãÒ½ÁÆÊý¾Ý¡£¡£¡£¡£¡£¡£
https://cybernews.com/news/pacific-healthworks-everest-ransomware-attack-la-perouse-data-leak-physician-groups/
3. º«¹úƱÎñ¾ÞÍ·Yes24Á½ÔÂÄÚ¶þ¶ÈÔâÀÕË÷¹¥»÷£¬£¬£¬£¬£¬Ð§ÀÍÖÐÖ¹Òý·ÛË¿¿Ö»Å
8ÔÂ12ÈÕ£¬£¬£¬£¬£¬º«¹ú×î´óƱÎñ¼°ÔÚÏßͼÊéÁãÊÛÉÌYes24ÓÚ¿ËÈÕÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂÆäÍøÕ¾¼°Òƶ¯Ó¦ÓÃÖÐÖ¹ÊýСʱ£¬£¬£¬£¬£¬ÕâÊǸù«Ë¾²»µ½Á½¸öÔÂÄÚµÚ¶þ´ÎÏÝÈëÍøÂçÇ徲Σ»£»£»£»£»£»ú¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñʼÓÚÍâµØÊ±¼äÆÆÏþ4µã30·Ö£¬£¬£¬£¬£¬Óû§ÎÞ·¨Ô¤¶©Ñݳª»áÃÅÆ±¡¢»á¼ûµç×ÓÊ鼰ʹÓÃÉçÇøÂÛ̳¡£¡£¡£¡£¡£¡£Yes24ѸËÙ½«ÏµÍ³ÀëÏßÒÔ×èÖ¹¹¥»÷£¬£¬£¬£¬£¬²¢ÒÀÍб¸·ÝÊý¾ÝÔÚ7СʱÄÚ»Ö¸´ÔËÓª£¬£¬£¬£¬£¬µ«Î´Í¸Â¶¹¥»÷ÕßÉí·Ý»òÊÇ·ñÊÕµ½Êê½ðÒªÇ󡣡£¡£¡£¡£¡£ÖÐÖ¹¶Ôº«¹úÊ¢ÐÐÀÖ¶ÓDAY6µÄ·ÛË¿Ôì³ÉÖ±½ÓÓ°Ï죬£¬£¬£¬£¬Ô¶¨ÓÚµ±Íí8µã×îÏȵÄ"The Decade"ѲÑÝÃÅÆ±Ô¤ÊÛ±»ÆÈÔÝÍ££¬£¬£¬£¬£¬Ð§Àͻָ´ºó¸Õ¸ÕÖØÆô¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ¾à6ÔÂÀÕË÷¹¥»÷½ö¸ôȱ·¦Á½Ô£ºÆäʱ¹¥»÷µ¼ÖÂYes24̱»¾Ô¼ÎåÌ죬£¬£¬£¬£¬Ó°ÏìÆÓ±¦½£¡¢ENHYPENµÈÒÕÈËÑݳöƱÎñ£¬£¬£¬£¬£¬²¢Ì»Â¶Æäȱ·¦ÒìµØ±¸·ÝϵͳµÄÇå¾²¶Ì°å¡£¡£¡£¡£¡£¡£Ö»¹Ü¸Ã¹«Ë¾ÊºóÔÊÐí"³¹²éÇ徲ϵͳ"¡¢Ô¼ÇëÍⲿÍŶӲ¢Éý¼¶ÏµÍ³£¬£¬£¬£¬£¬µ«¶þ´ÎÓöÏ®Òý·¢º«¹úýÌåºÍÓû§Ç¿ÁÒÆ·ÆÀ£¬£¬£¬£¬£¬Ö¸ÔðÆäÕû¸Ä²½·¥²»µ½Î»ÇÒÐÅϢ͸Ã÷¶Èȱ·¦¡£¡£¡£¡£¡£¡£
https://therecord.media/yes24-second-ransomware-attack-kpop-ticketing-affected
4. FortinetÖÒÑÔFortiSIEMÔ¤ÊÚȨRCEÎó²î¿ÉÄܱ»Ê¹ÓÃ
8ÔÂ13ÈÕ£¬£¬£¬£¬£¬ÍøÂçÇå¾²³§ÉÌFortinet¿ËÈÕÐû²¼½ôÆÈÇ徲ͨ¸æ£¬£¬£¬£¬£¬Åû¶Æä½¹µãÇå¾²ÐÅÏ¢ÓëÊÂÎñÖÎÀí£¨SIEM£©²úÆ·FortiSIEM±£´æÒ»¸öÑÏÖØÆ·¼¶£¨CVSS 9.8£©µÄÔ¶³ÌÏÂÁî×¢ÈëÎó²î£¨CVE-2025-25256£©¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓ°Ïì°æ±¾¹æÄ£ÆÕ±é£¬£¬£¬£¬£¬º¸Ç5.4ÖÁ7.3¶à¸ö·ÖÖ§£¬£¬£¬£¬£¬ÆäÖÐ5.4ÖÁ6.6µÄ¾É°æÏµÍ³ÒÑÖÕÖ¹ÊÖÒÕÖ§³Ö£¬£¬£¬£¬£¬½¨ÒéÓû§Á¬Ã¦Éý¼¶ÖÁ7.3.2¡¢7.2.6µÈ×îÐÂÊÜÖ§³Ö°æ±¾¡£¡£¡£¡£¡£¡£Îó²î³ÉÒòÔ´ÓÚ²úƷδ¶ÔÌØÊâÔªËØ¾ÙÐгä·Ö¹ýÂË£¬£¬£¬£¬£¬µ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿Éͨ¹ý½á¹¹¶ñÒâCLIÇëÇ󣬣¬£¬£¬£¬ÔÚÄ¿µÄϵͳִÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£FortinetÈ·ÈϸÃÎó²î±£´æ¿É¹ûÕæ»ñÈ¡µÄʹÓôúÂ룬£¬£¬£¬£¬ÇÒ¹¥»÷ÐÐΪ²»»á±¬·¢ÆæÒìIOCÌØÕ÷£¬£¬£¬£¬£¬Ê¹µÃÈëÇÖ¼ì²âÄѶÈÏÔÖøÌáÉý¡£¡£¡£¡£¡£¡£Ö»¹ÜδÃ÷È·ÈÏ¿ÉÁãÈÕʹÓ㬣¬£¬£¬£¬µ«GreyNoiseÍþвÇ鱨¹«Ë¾Ö¸³ö£¬£¬£¬£¬£¬±¾ÔÂÕë¶ÔFortinet SSL VPNºÍFortiManagerµÄ±©Á¦ÆÆ½â¹¥»÷¼¤Ôö£¬£¬£¬£¬£¬´ËÀàÒì³£Á÷Á¿²¨¶¯ÍùÍùԤʾÐÂÎó²îÅû¶£¬£¬£¬£¬£¬Á½Õß¿ÉÄܱ£´æ¹ØÁªÐÔ¡£¡£¡£¡£¡£¡£´Ë´ÎÎó²î̻¶ºó£¬£¬£¬£¬£¬Fortinet½¨ÒéÓû§ÓÅÏÈͨ¹ý°æ±¾Éý¼¶ÊµÏÖ¸ùÌìÐÔÐÞ¸´£¬£¬£¬£¬£¬Í¬Ê±ÌṩÔÝʱ»º½â¼Æ»®¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fortinet-warns-of-fortisiem-pre-auth-rce-flaw-with-exploit-in-the-wild/
5. ±öϦ·¨ÄáÑÇÖÝ×ÜÉó²é³¤°ì¹«ÊÒÔâÍøÂç¹¥»÷ÖÂϵͳ̱»¾
8ÔÂ13ÈÕ£¬£¬£¬£¬£¬±öϦ·¨ÄáÑÇÖÝ×ÜÉó²é³¤°ì¹«ÊÒ¿ËÈÕÔâÓöÑÏÖØÍøÂç¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂÆä½¹µãÐÅϢϵͳÖÜȫ̱»¾£¬£¬£¬£¬£¬°üÀ¨¹Ù·½ÍøÕ¾¡¢µç×ÓÓʼþÕË»§¼°Àο¿µç»°Ïß·¾ù´¦ÓÚÀëÏß״̬¡£¡£¡£¡£¡£¡£Ë¾·¨²¿³¤´÷·ò¡¤É£µÏ£¨Dave Sunday£©Í¨¹ýÉ罻ýÌå֤ʵ£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÒÑ´¥·¢¿ç²¿·ÖÐ×÷ÏìÓ¦£¬£¬£¬£¬£¬ÊÖÒÕÖ°Ô±ÔÚÖ´·¨»ú¹¹Ö§³ÖÏÂÕýÈ«Á¦»Ö¸´Ð§ÀͲ¢ÊӲ칥»÷Ô´Í·¡£¡£¡£¡£¡£¡£Ö»¹ÜÄ¿½ñ¹¥»÷ǰÑÔÉÐδÃ÷È·£¬£¬£¬£¬£¬ÇÒÎÞÀÕË÷Èí¼þ×éÖ¯¹ûÕæÈÏÁìÔðÈΣ¬£¬£¬£¬£¬µ«ÊÂÎñµÄÆÕ±éÓ°Ï켰ϵͳ̱»¾ÌØÕ÷Óëµä·¶ÀÕË÷¹¥»÷¸ß¶ÈÎǺϣ¬£¬£¬£¬£¬Òý·¢¶ÔDZÔÚ¹©Ó¦Á´Î£º¦µÄµ£ÐÄ¡£¡£¡£¡£¡£¡£ÍøÂçÇ徲ר¼Ò¿ÎÄ¡¤²©ÃÉÌØ£¨Kevin Beaumont£©µÄ·¢Ã÷ΪÊÂÎñÊÓ²ìÌṩÁËÒªº¦ÏßË÷£º¸Ã°ì¹«ÊÒÃæÏò¹«ÖÚµÄCitrix NetScaler×°±¸ÒòδÐÞ²¹CVE-2025-5777Îó²î¶øºã¾Ã̻¶ÓÚ¹¥»÷Σº¦ÖС£¡£¡£¡£¡£¡£ShodanɨÃèÊý¾ÝÏÔʾ£¬£¬£¬£¬£¬Á½Ì¨Ïà¹Ø×°±¸»®·ÖÓÚ7ÔÂ29ÈÕºÍ8ÔÂ7ÈÕÀëÏߣ¬£¬£¬£¬£¬Ê±¼äÏßÓë¹¥»÷±¬·¢¸ß¶ÈÖØºÏ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬¸ÃÎó²îÒѱ»ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÁÐÈë¡°ÒÑÖª±»Ê¹ÓÃÎó²îĿ¼¡±£¬£¬£¬£¬£¬²¢ÒªÇóÁª°î»ú¹¹ÔÚ24СʱÄÚÍê³ÉÐÞ²¹¡£¡£¡£¡£¡£¡£×èÖ¹±¨µÀÐû²¼£¬£¬£¬£¬£¬±öϦ·¨ÄáÑÇÖÝ×ÜÉó²é³¤ÍøÕ¾ÈÔδ»Ö¸´£¬£¬£¬£¬£¬ÏµÍ³ÐÞ¸´ÊÂÇéÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/pennsylvania-attorney-generals-email-site-down-after-cyberattack/
6. AIÉî¶ÈαÔìÊÖÒÕ´ßÉú¿ç¹úͶ×ÊȦÌ×£¬£¬£¬£¬£¬È«Çò¶à¹úÓû§Ô⾫׼ΧÁÔ
8ÔÂ13ÈÕ£¬£¬£¬£¬£¬ÍøÂçÇå¾²»ú¹¹Group-IB¿ËÈÕÅû¶£¬£¬£¬£¬£¬Õ©Æ·Ö×ÓÕýʹÓÃÌìÉúʽAIÊÖÒÕ¹¹½¨¸ß¶È±ÆÕæµÄÚ²ÆÍøÂ磬£¬£¬£¬£¬Í¨¹ýÉî¶ÈαÔìÊÓÆµ¡¢Î±ÔìÐÂÎÅÄÚÈݼ°¶¨Ïò¹ã¸æÍ¶·Å£¬£¬£¬£¬£¬ÓÕÆÈ«Çò¶à¹úͶ×ÊÕß¼ÓÈëÐéαÉúÒâÆ½Ì¨¡£¡£¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬£¬´ËÀàȦÌ×ÒÑÐΪϰ컣»£»£»£»£»¯¹¤ÒµÁ´£¬£¬£¬£¬£¬ÆäÊÖÒÕÖØÆ¯ºóÓëÐÄÀí²Ù¿ØÊֶξù´ïи߶ȡ£¡£¡£¡£¡£¡£½¹µãÚ²ÆÊÖ·¨ÒÔAIÌìÉúµÄÉî¶ÈαÔìÊÓÆµÎªÍ»ÆÆ¿Ú¡£¡£¡£¡£¡£¡£Õ©ÆÕ߿ˡºÉÀ¼¼«ÓÒÒíÕþ¿Íº£¶ûÌØ¡¤Î¬¶ûµÂ˹µÈ¹«ÖÚÈËÎïµÄÓ°ÏñÓëÉùÒô£¬£¬£¬£¬£¬ÖÆ×÷¿´ËÆÕæÊµµÄÐÂÎÅ·Ã̸Ƭ¶Ï£¬£¬£¬£¬£¬Á¬Ïµ¸Ä¶¯µÄÉúÒâÊý¾Ýͼ±íÓëÐéαר¼Ò±³Ê飬£¬£¬£¬£¬ÓªÔì³ö"¶À¼ÒͶ×Êʱ»ú"µÄ½ôÆÈ¸Ð¡£¡£¡£¡£¡£¡£Êܺ¦Õß±»Ö¸µ¼ÖÁαÔìµÄÐÂÎÅÍøÕ¾£¬£¬£¬£¬£¬ÕâÐ©ÍøÕ¾Í¨¹ýÍâµØ»¯ÄÚÈÝÊÊÅäÓû§ËùÔÚ¹ú¼ÒÓïÑÔ£¬£¬£¬£¬£¬²¢Ç¶ÈëÉ罻ýÌåÕ˺𢲩¿ÍÎÄÕ¼°YouTubeƵµÀ¾ÙÐжàÇþµÀÍÆ¹ã£¬£¬£¬£¬£¬ÐγÉÐéαÐÅÏ¢Éú̬¡£¡£¡£¡£¡£¡£×¢²á½×¶Î£¬£¬£¬£¬£¬Æ½Ì¨ÒÔ"С¶î°ü¹Ü½ð"£¨100-250ÃÀÔª£©½µµÍÓû§Ð¡ÐÄÐÔ£¬£¬£¬£¬£¬ËæºóÒªÇóÌá½»Éí·ÝÖ¤¡¢×¡Ö·Ö¤ÊµÉõÖÁÐÅÓÿ¨ÕÕÆ¬µÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£ÖµµÃСÐĵÄÊÇ£¬£¬£¬£¬£¬´ËÀàÍøÕ¾Í¨¹ýIPµØµãÓëÓïÑÔ¼ì²âʵÏÖ¾«×¼ÆÁÕÏ£¬£¬£¬£¬£¬ÃÀ¹úºÍÒÔÉ«ÁÐÓû§ÎÞ·¨»á¼û£¬£¬£¬£¬£¬¶øÓ¡¶È¡¢Ó¢¹ú¡¢µÂ¹ú¡¢ÈÕ±¾µÈ13¸ö¹ú¼Ò³ÉΪÖ÷ҪĿµÄ¡£¡£¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/deepfake-ai-trading-scams-target/


¾©¹«Íø°²±¸11010802024551ºÅ