Boyd GamingÔâÍøÂç¹¥»÷ÖÂÔ±¹¤Êý¾Ýй¶

Ðû²¼Ê±¼ä 2025-09-25

1. Boyd GamingÔâÍøÂç¹¥»÷ÖÂÔ±¹¤Êý¾Ýй¶


9ÔÂ23ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÉÏÊв©²ÊÓéÀÖ¹«Ë¾Boyd Gaming Corporation¿ËÈÕÅû¶ÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÈëÇÖÆäϵͳ²¢ÇÔÈ¡Á˰üÀ¨Ô±¹¤ÐÅÏ¢¼°ÉÙÊýÆäËûСÎÒ˽¼ÒÊý¾ÝµÄÄÚÈÝ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾×ܲ¿Î»ÓÚÄÚ»ª´ïÖÝ£¬£¬£¬£¬£¬ÔÚÈ«ÃÀÊ®¸öÖÝÔËÓª28´¦²©²Ê×ʲú£¬£¬£¬£¬£¬²¢ÖÎÀí¼ÓÖݱ±²¿Ò»¼Ò²¿Âä¶Ä³¡£¬£¬£¬£¬£¬ÓµÓÐÁè¼Ý16,000ÃûÔ±¹¤£¬£¬£¬£¬£¬2024ÄêÓªÊÕ´ï39ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»µÄ8-KÎļþ£¬£¬£¬£¬£¬Boyd GamingÔÚ¹¥»÷±¬·¢ºóÓëÍâ²¿ÍøÂçÇ徲ר¼ÒÏàÖúÓ¦¶Ô£¬£¬£¬£¬£¬²¢Í¨ÖªÁËÖ´·¨²¿·Ö¡£¡£¡£¡£¡£¡£¹«Ë¾È·ÈÏ£¬£¬£¬£¬£¬Î´¾­ÊÚȨµÄµÚÈý·½´ÓÆäITϵͳÖÐɾ³ýÁËÌØ¶¨Ãü¾Ý£¬£¬£¬£¬£¬Éæ¼°Ô±¹¤¼°ÉÙÊýÆäËûСÎÒ˽¼Ò¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¹«Ë¾ÕýÖðÒ»ÖÂÐÅÊÜÓ°ÏìСÎÒ˽¼Ò£¬£¬£¬£¬£¬²¢½«Æ¾Ö¤ÒªÇóÏòÏà¹Øî¿Ïµ»ú¹¹¼°Õþ¸®²¿·Ö±¨¸æÊÂÎñϸ½Ú¡£¡£¡£¡£¡£¡£Ö»¹Ü±¬·¢Êý¾Ýй¶£¬£¬£¬£¬£¬Boyd GamingÇ¿µ÷ÆäÔËӪδÊÜ×ÌÈÅ£¬£¬£¬£¬£¬Ô¤¼ÆÊÂÎñ²»»á¶Ô²ÆÎñ״̬±¬·¢ÖØ´óµ¹ÔËÓ°Ïì¡£¡£¡£¡£¡£¡£¹«Ë¾ÒѹºÖÃÍøÂçÇå¾²°ü¹Ü£¬£¬£¬£¬£¬Ïà¹ØÓöÈÔ¤¼Æ¿ÉÓɰü¹ÜÁýÕÖ¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯»òÆäËûÍþвÐÐΪÕßÐû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/boyd-gaming-discloses-data-breach-after-suffering-a-cyberattack/


2. CISA½«Google ChromiumÎó²îÌí¼Óµ½ÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖÐ


9ÔÂ23ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Google ChromiumÎó²îCVE-2025-10585ÁÐÈëÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼¡£¡£¡£¡£¡£¡£¸ÃÎó²îÊÇV8 JavaScriptºÍWebAssemblyÒýÇæÖеÄÀàÐÍ»ìÏýÎÊÌ⣬£¬£¬£¬£¬µ±Èí¼þÎó½«ÄÚ´æÊ¶±ðΪ¹ýʧÀàÐ͹¤¾ßʱ£¬£¬£¬£¬£¬¹¥»÷Õ߿ɽè´ËÆÆËðÄÚ´æ¡¢µ¼Ö³ÌÐò±ÀÀ£»£»£»£»òÖ´ÐжñÒâ´úÂë¡£¡£¡£¡£¡£¡£´ËÀàÎó²îÔÚC/C++±àдµÄä¯ÀÀÆ÷Ó¦ÓÃÖÐÓÈΪ³£¼û£¬£¬£¬£¬£¬ÒòÄÚ´æÇå¾²ÐÔ½ÏÈõÒ×±»Ê¹Óᣡ£¡£¡£¡£¡£¹È¸èÓÚ2025Äê9ÔÂÖÐÑ®Ðû²¼Çå¾²¸üÐÂÐÞ¸´Á˰üÀ¨CVE-2025-10585ÔÚÄÚµÄËĸöChromeÎó²î£¬£¬£¬£¬£¬²¢È·ÈϸÃÎó²îÒÑÔÚÒ°ÍⱻʹÓᣡ£¡£¡£¡£¡£¹È¸èÍþвÆÊÎöС×飨TAG£©ÓÚ9ÔÂ16ÈÕ·¢Ã÷¸ÃÎó²î£¬£¬£¬£¬£¬ÏÖÔÚÕýÊÓ²ìÃñ×å¹ú¼ÒÐÐΪÕߺÍÉÌÒµÌØ¹¤Èí¼þ¹©Ó¦É̵Ĺ¥»÷£¬£¬£¬£¬£¬ÍƲâÆäÖÐÒ»ÍþвÐÐΪÕßÒÑʹÓôËÎó²îʵÑé¹¥»÷¡£¡£¡£¡£¡£¡£Æ¾Ö¤¾ßÓÐÔ¼ÊøÁ¦µÄÔËÓªÖ¸ÁBOD£©22-01£¬£¬£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÐèÔÚ2025Äê10ÔÂ14ÈÕǰÍê³ÉÎó²îÐÞ¸´£¬£¬£¬£¬£¬ÒÔ½µµÍÖØ´óΣº¦¡£¡£¡£¡£¡£¡£CISAͬʱ½¨Òé˽ÈË×éÖ¯Éó²éKEVĿ¼²¢ÐÞ¸´×ÔÉí»ù´¡ÉèÊ©ÖеÄÏà¹ØÎó²î¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/182509/security/u-s-cisa-adds-google-chromium-flaw-to-its-known-exploited-vulnerabilities-catalog.html


3. Æû³µ°ü¹Üƽ̨ClaimPixй¶Áè¼Ý500Íò¸öÎļþ


9ÔÂ23ÈÕ£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ô±Jeremiah FowlerÏòWebsite Planet±¨¸æ·¢Ã÷Ò»¸öδ¼ÓÃÜÇÒÎÞÃÜÂë±£»£»£»£»¤µÄÊý¾Ý¿â£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿â°üÀ¨510Íò¸öÎļþ¡¢×ÜÈÝÁ¿´ï10TB£¬£¬£¬£¬£¬Éæ¼°ÊÚȨÊé¡¢³µÁ¾¹ÒºÅ¡¢Î¬ÐÞ·¢Æ±¼°´øÓÐÇåÎú³µÅƺÍVINÂëµÄÊÜËð³µÁ¾Í¼ÏñµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¾­ÆÊÎö£¬£¬£¬£¬£¬ÕâЩ¼Í¼ÊôÓÚÒÁÀûŵÒÁÖÝÆû³µ°ü¹ÜË÷ÅâÆ½Ì¨ClaimPix¡£¡£¡£¡£¡£¡£Êý¾Ý¿âÖаüÀ¨ÐÕÃû¡¢µØµã¡¢µç»°¡¢µç×ÓÓʼþµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©£¬£¬£¬£¬£¬ÒÔ¼°½ü1.6Íò·Ýµç×ÓÊðÃûÊÚȨίÍÐÊ飬£¬£¬£¬£¬ÆäÖаüÀ¨ÊðÃûÕßIPµØµã¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬»¹°üÀ¨Èí¼þÔÊÐíЭÒéµÈÄÚ²¿Îļþ£¬£¬£¬£¬£¬Ì»Â¶Á˲»Ó¦¹ûÕæµÄÌõ¿îºÍÓöÈÐÅÏ¢¡£¡£¡£¡£¡£¡£Fowlerͨ¹ýÈÏÕæÈÎÅû¶֪ͨClaimPixºó£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿â±»Ñ¸ËÙÏÞÖÆ»á¼û¡£¡£¡£¡£¡£¡£ClaimPix»ØÓ¦³ÆÒѸüÐÂÕþ²ßºÍ´úÂëÐÞ¸´Îó²î¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬Êý¾Ý¿â¹éÊô¼°Ì»Â¶Ê±³¤ÈÔ´æÒÉ£¬£¬£¬£¬£¬ÐèÄÚ²¿Éó¼ÆÈ·ÈÏÊÇ·ñÓÐÆäËû»á¼û»ò¿ÉÒɻ¡£¡£¡£¡£¡£¡£½¨Òé°ü¹ÜÐÐÒµÆóÒµ¼ÓÃÜËùÓÐÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬ÊµÑé¶àÒòËØÈÏÖ¤ºÍ»ùÓÚ½ÇÉ«µÄ»á¼û¿ØÖÆ£¬£¬£¬£¬£¬°´ÆÚÉóºËÔÆ´æ´¢ÏµÍ³²¢¾ÙÐÐÎó²î²âÊÔ¡£¡£¡£¡£¡£¡£Ð¡ÎÒ˽¼ÒÈôÏÓÒÉÐÅϢй¶£¬£¬£¬£¬£¬Ó¦¼à¿ØÐÅÓñ¨¸æ¡¢Ê¹ÓÃÐÅÓö³½áЧÀÍ£¬£¬£¬£¬£¬²¢Í¨¹ýFTCµÄIdentityTheft.gov¾Ù±¨¡£¡£¡£¡£¡£¡£


https://www.websiteplanet.com/news/claimpix-breach-report/


4. Motility Software SolutionsÊý¾Ýй¶£¬£¬£¬£¬£¬Ó°Ïì76ÍòÏûºÄÕß


9ÔÂ24ÈÕ£¬£¬£¬£¬£¬×¨ÓÃÆû³µ¾­ÏúÉÌÖÎÀíÈí¼þ¹©Ó¦ÉÌMotility Software Solutions 8ÔÂ19ÈÕÔÚÆäÍøÂçÖз¢Ã÷¿ÉÒɻ£¬£¬£¬£¬£¬Ñ¸ËÙÏÂÏßÊÜÓ°ÏìЧÀÍÆ÷ÒÔ¿ØÖÆÊÂÎñ£¬£¬£¬£¬£¬²¢ÁªºÏÍøÂçÇ徲ר¼ÒÕö¿ªÊӲ졣¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñµ¼ÖÂÔ¼76ÍòÃûÃÀ¹úÏûºÄÕßµÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©±»Î´¾­ÊÚȨ»á¼û£¬£¬£¬£¬£¬Ð¹Â¶Êý¾Ý°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢¼ÝÕÕºÅÂë¼°Éç»áÇå¾²ºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£MotilityÇ¿µ÷£¬£¬£¬£¬£¬Êý¾Ýй¶½öÏÞÓÚÆä×ÔÉíÍøÂ磬£¬£¬£¬£¬Î´²¨¼°Ä¸¹«Ë¾À×ŵ×È£¨Reynolds and Reynolds£©µÄϵͳ»òÍøÂç¡£¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬MotilityÁ¬Ã¦½ÓÄɶàÏîµ÷½â²½·¥£º¸ôÀëÊÜÓ°ÏìЧÀÍÆ÷¡¢Ô¼ÇëÍâ²¿ÍøÂçÇ徲ר¼ÒЭÖúÊӲ죬£¬£¬£¬£¬²¢Í¨ÖªÖ´·¨²¿·Ö½éÈë¡£¡£¡£¡£¡£¡£ÎªÔöÇ¿Çå¾²·À»¤£¬£¬£¬£¬£¬¹«Ë¾ÊµÑéÁËÌØÊâÇå¾²²½·¥£¬£¬£¬£¬£¬°üÀ¨ÒýÈëй¤¾ß¡¢½¨ÉèÈßÓàµÄµÚÈý·½¼à¿Ø»úÖÆ£¬£¬£¬£¬£¬²¢ÖÜÈ«Éó²éÏÖÓÐÍøÂçÇ徲ʵ¼ù¡£¡£¡£¡£¡£¡£Õë¶ÔÊÜÓ°ÏìÏûºÄÕߣ¬£¬£¬£¬£¬MotilityÕýÖðÒ»ÖÂÐŲ¢ÌṩÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬½¨ÒéÓû§°´ÆÚºË²éÐÅÓñ¨¸æÒì³£»£»£»£»î¶¯£¬£¬£¬£¬£¬Ð¡ÐÄʹÓÃй¶ÐÅϢʵÑéµÄÍøÂç´¹ÂÚ»òڲƭÐÐΪ¡£¡£¡£¡£¡£¡£Èô·¢Ã÷ÐÅÏ¢±»µÁÓ㬣¬£¬£¬£¬ÏûºÄÕß¿ÉÏòÖ÷ÒªÐÅÓûú¹¹ÉêÇëڲƭ¾¯±¨»òÐÅÓö³½áÒÔÏÞÖÆËðʧ¡£¡£¡£¡£¡£¡£


https://www.claimdepot.com/data-breach/motility-2025


5. Libraesvaµç×ÓÓʼþÇå¾²Íø¹ØÎó²îÔâ¹ú¼ÒºÚ¿ÍʹÓÃ


9ÔÂ24ÈÕ£¬£¬£¬£¬£¬ÍøÂçÇå¾²³§ÉÌLibraesvaÒÑÐÞ¸´Æäµç×ÓÓʼþÇ徲ƽ̨ÖÐÒ»¸ö±»Ò°ÍâʹÓõĸßΣÎó²îCVE-2025-59689¡£¡£¡£¡£¡£¡£¸ÃÎó²îCVSSÆÀ·ÖΪ6.1£¬£¬£¬£¬£¬ÊôÓÚÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓðüÀ¨¶ñÒâѹËõ¸½¼þµÄµç×ÓÓʼþ´¥·¢Îó²î£¬£¬£¬£¬£¬ÔÚ·ÇÌØÈ¨Óû§È¨ÏÞÏÂÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£Îó²îȪԴÔÚÓÚÆ½Ì¨´¦Öóͷ£Ìض¨Ñ¹ËõÎļþÃûÌÃʱ±£´æÊäÈëÕûÀíȱÏÝ£¬£¬£¬£¬£¬µ¼ÖÂÓÐÓÃÔØºÉÈÆ¹ýÇå¾²»úÖÆÖ´ÐÐshellÏÂÁî¡£¡£¡£¡£¡£¡£´Ë´ÎÎó²îÓ°ÏìLibraesva ESG 4.5ÖÁ5.5°æ±¾£¬£¬£¬£¬£¬µ«¼øÓÚ4.x°æ±¾ÒÑÍ£²ú£¬£¬£¬£¬£¬³§É̽öÕë¶Ô5.x°æ±¾Ðû²¼²¹¶¡¡£¡£¡£¡£¡£¡£¹«Ë¾ÒÑÏòÔÆ¶ËºÍÍâµØ°²ÅÅÇéÐÎÍÆËÍÐÞ¸´³ÌÐò£¬£¬£¬£¬£¬ÏÖÔÚËùÓÐ×°±¸¾ùÔËÐÐÐÞ¸´ºóµÄÈí¼þ¡£¡£¡£¡£¡£¡£¹ØÓÚÈÔÔËÐÐÍâµØESG 4.x°æ±¾µÄ¿Í»§£¬£¬£¬£¬£¬LibraesvaÇ¿ÁÒ½¨ÒéÊÖ¶¯Éý¼¶ÖÁÒÑÐÞ²¹µÄ5.x°æ±¾£¬£¬£¬£¬£¬ÒÔ¹æ±ÜDZÔÚΣº¦¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬¸ÃÎó²îÒѱ»ÏÖʵʹÓᣡ£¡£¡£¡£¡£LibraesvaÈ·Èϱ¬·¢Ò»ÆðÀÄÓÃÊÂÎñ£¬£¬£¬£¬£¬ÍþвÐÐΪÕß±»ËÝÔ´ÖÁÍâ¹ú³ðÊÓ¹ú¼ÒʵÌå¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÔٴξ¯Ê¾ÆóÒµÐèÖØÊÓ¹©Ó¦Á´Çå¾²£¬£¬£¬£¬£¬ÊµÊ±¸üÐÂϵͳ²¹¶¡£¬£¬£¬£¬£¬²¢½¨Éè¶àÌõÀí·ÀÓù»úÖÆÒÔÓ¦¶Ô¹ú¼ÒÖ§³ÖµÄ¸ß¼¶ÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/libraesva-email-security-gateway-vulnerability-exploited-by-nation-state-hackers/


6. µÂ¹úFAIº½¿Õ¼¯ÍÅÔâJ GroupÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬3TBÃô¸ÐÊý¾Ýй¶


9ÔÂ24ÈÕ£¬£¬£¬£¬£¬µÂ¹ú°ü»úÔËÓªÉÌFAIº½¿Õ¼¯ÍÅ¿ËÈÕÔâJ GroupÀÕË÷Èí¼þÍÅ»ïÍøÂç¹¥»÷£¬£¬£¬£¬£¬¹¥»÷ÕßÐû³ÆÒÑÇÔÈ¡½ü3TBÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬º­¸Ç¹«Ë¾ÏêϸÐÅÏ¢¡¢Ò½ÁÆÊý¾Ý¼°Ô±¹¤Òþ˽Îļþ¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïͨ¹ý°µÍø²©¿Í¹ûÕæÊܺ¦ÕßÐÅÏ¢²¢Íþвй¶Êý¾Ý£¬£¬£¬£¬£¬ÏÖÔÚFAIÉÐδ»ØÓ¦¡£¡£¡£¡£¡£¡£¾ÝÑо¿ÍŶӯÊÎö£¬£¬£¬£¬£¬Ð¹Â¶Êý¾Ý°üÀ¨»¼ÕßÁÙ´²ÐÅÏ¢¡¢Ô±¹¤ÅàѵÎļþ¡¢Éó¼ÆÎĵµ¡¢·É»ú¹æ¸ñÎļþ¡¢¼òÀú¼°»¤ÕÕ¸´Ó¡¼þµÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£¡£Ò½ÁÆÊý¾ÝÒò²»¿É»Ö¸´ÌØÕ÷£¬£¬£¬£¬£¬Ò»µ©Ð¹Â¶½«µ¼Ö»¼Õß²¡Ê·ÓÀÊÀ̻¶£¬£¬£¬£¬£¬ÔöÌíÉí·Ý͵ÇÔ¡¢Ú²Æ­¼°Éç»á¹¤³Ì¹¥»÷Σº¦¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÄÜʹÓÃй¶ÐÅϢð³äFAI»ò¹ØÁªÐ§ÀÍ£¬£¬£¬£¬£¬Õë¶Ô¸ß¾»Öµ¿Í»§ÊµÑ龫׼թƭ£¬£¬£¬£¬£¬Í¬Ê±ÄÚ²¿Éó¼ÆÎļþ¿É̻¶¹«Ë¾ÔËÓªÈõµã£¬£¬£¬£¬£¬ÎªºóÐø¹¥»÷ÌṩĿµÄ¡£¡£¡£¡£¡£¡£J Group×÷Ϊ2025ÄêÍ·ÐÂÐËÍøÂç·¸·¨¼¯ÍÅ£¬£¬£¬£¬£¬ÒÔÊý¾Ý¾­¼ÍģʽIJÀû£¬£¬£¬£¬£¬ÈôÊê½ð̸ÅÐʧ°Ü£¬£¬£¬£¬£¬½«¹ûÕæ³öÊÛÊý¾Ý¶ø·Ç´¿´âй¶¡£¡£¡£¡£¡£¡£¸Ã×é֯ĿµÄ¹æÄ£ÆÕ±é£¬£¬£¬£¬£¬´ÓÓÎÀÖÔ°µ½º½¿ÕÒµ¾ùÓÐÉæÁÔ£¬£¬£¬£¬£¬Òѹ¥»÷ÖÁÉÙ32¸ö×éÖ¯£¬£¬£¬£¬£¬³ÉΪÀÕË÷Èí¼þÁìÓò»îÔ¾ÐÂÊÆÁ¦¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/fai-aviation-group-data-breach-claims/