÷è÷ëÀÕË÷Èí¼þ¹¥»÷CornerstoneÈËÁ¦×ÊÔ´¹«Ë¾
Ðû²¼Ê±¼ä 2025-11-181. ÷è÷ëÀÕË÷Èí¼þ¹¥»÷CornerstoneÈËÁ¦×ÊÔ´¹«Ë¾
11ÔÂ15ÈÕ£¬£¬£¬ÃÀ¹ú¿Æ¼¼ÕÐÆ¸¾ÞÍ·Cornerstone Staffing Solutions¿ËÈÕÔâ÷è÷ëÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬£¬¸Ã×éÖ¯Ðû³ÆÇÔÈ¡ÁËÁè¼Ý12Íò·ÝÇóÖ°Õß¼òÀú¼°³¬100Íò·Ý¹«Ë¾Îļþ¡£¡£¡£¡£÷è÷ëÍÅ»ïÔÚ°µÍøÐ¹Â¶²©¿Í¹ûÕæ300GBÃô¸ÐÊý¾Ý£¬£¬£¬°üÀ¨ÒÔ¡°ÐÕÃû+Resume.pdf¡±ÃûÌô洢µÄ12Íò·Ý¼òÀú£¬£¬£¬²¢Éù³ÆÕâЩÎļþÊôÓÚÔ¼100Íò·Ý°üÀ¨2400ÍòÌõСÎÒ˽¼ÒÐÅÏ¢µÄÎĵµµÄÒ»²¿·Ö¡£¡£¡£¡£Ð¹Â¶Êý¾Ýº¸ÇÉç»á°ü¹ÜºÅÂë¡¢µØµã¡¢ÓÊÏä¡¢µç»°¡¢Ð½×ÊÐÅÏ¢¼°±£ÃÜÐÒéµÈ£¬£¬£¬Éæ¼°ÇóÖ°Õß¼°Ô±¹¤Éí·ÝÐÅÏ¢¡£¡£¡£¡£Cornerstone½¨ÉèÓÚ2003Ä꣬£¬£¬×ܲ¿Î»ÓھɽðɽÍåÇø£¬£¬£¬ÔÚÃÀ¹ú¶àÖÝÉèÓÐЧÀÍ´¦£¬£¬£¬×¨×¢ÊÖÒÕ¡¢¹¤³Ì¡¢ÎïÁ÷¡¢ÖÆÔìµÈÁìÓòÕÐÆ¸£¬£¬£¬Ã¿ÄêÐÖú³¬1ÍòÃûÇóÖ°Õß¾ÍÒµ¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬¸Ã¹«Ë¾ÉÐδ»ØÓ¦Ã½ÌåÎÊѯ¡£¡£¡£¡£÷è÷ëÀÕË÷Èí¼þ×éÖ¯½¨ÉèÓÚ2021Ä꣬£¬£¬2022Äê½øÈ빫ÖÚÊÓÒ°£¬£¬£¬2025Äê³ÉΪȫÇò×î»îÔ¾ÀÕË÷Èí¼þ×éÖ¯£¬£¬£¬°ëÄêÄÚ·¢¶¯³¬500Æð¹¥»÷¡£¡£¡£¡£
https://cybernews.com/security/cornerstone-staffing-ransomware-attack-qilin-group-exposes-resumes/
2. AIPACÊý¾Ýй¶£ºµÚÈý·½ÈëÇÖÖÂ810ÈËÐÅϢй¶
11ÔÂ17ÈÕ£¬£¬£¬ÃÀ¹úÒÔÉ«Áй«¹²ÊÂÎñίԱ»á£¨AIPAC£©Åû¶£¬£¬£¬ÒòµÚÈý·½¹«Ë¾ÏµÍ³ÔâÍⲿÈëÇÖ£¬£¬£¬Æä´æ´¢µÄ810ÈËСÎÒ˽¼ÒÐÅÏ¢ÓÚ2024Äê10ÔÂ20ÈÕÖÁ2025Äê2ÔÂ6ÈÕʱ´ú±»²»·¨»á¼û¡£¡£¡£¡£´Ë´ÎÊÂÎñÉæ¼°Ò»ÃûÃåÒòÖÝסÃñ£¬£¬£¬Ð¹Â¶Êý¾Ý¿ÉÄܰüÀ¨ÐÕÃû¡¢Éç»á°ü¹ÜºÅÂë¡¢»¤ÕÕºÅÂë¡¢¼Òͥסַ¡¢ÁªÏµ·½·¨¡¢Ö§¸¶¿¨ÐÅÏ¢¼°ÒøÐÐÕË»§µÈÃô¸ÐСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¡£¡£¡£¡£AIPACÓÚ11ÔÂ13ÈÕͨ¹ýµç×ÓÓʼþ֪ͨÊÜÓ°ÏìÕߣ¬£¬£¬²¢Ç¿µ÷δ·¢Ã÷Êý¾ÝÀÄÓü£Ï󣬣¬£¬ÏÖÔÚÎÞ×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ¡£¡£¡£¡£ÎªÓ¦¶ÔΣº¦£¬£¬£¬AIPACΪÊÜÓ°ÏìÕßÌṩΪÆÚ12¸öÔµÄIDXÉí·Ý±£»£»£»£»¤Ð§ÀÍ£¬£¬£¬º¸ÇÐÅÓÃ¼à¿Ø¡¢ÍøÂçɨÃè¡¢°ü¹ÜÅâ³¥¼°Éí·Ý»Ö¸´Ö§³Ö¡£¡£¡£¡£ÊÂÎñºó£¬£¬£¬¸Ã×éÖ¯ÒÑʵÑé¶àÏîÇå¾²Éý¼¶²½·¥£¬£¬£¬°üÀ¨×ËÊÆ¿ØÖÆ¡¢·ÇÈËÀàÉí·ÝÑéÖ¤¡¢µç×ÓÓʼþÊý¾Ý·À×ß©¡¢Microsoft 365»á¼ûȨÏ޹ܿء¢ÌØÈ¨¾¯±¨¡¢µØÀíλÖÃÏÞÖÆ¡¢É󼯹¦Ð§ÒÔ¼°ÔöÇ¿¼à¿ØÁ¦¶È¡£¡£¡£¡£
https://hackread.com/aipac-data-breach-hundreds-affected/
3. ¶íÂÞ˹¿Ú°¶ÔËÓªÉÌPort AllianceÔâÍøÂç¹¥»÷
11ÔÂ15ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬¶íÂÞ˹¿Ú°¶ÔËÓªÉÌ¡°¿Ú°¶Í¬ÃË¡±£¨Port Alliance£©ÔâÓö¾³ÍâÍøÂç¹¥»÷£¬£¬£¬ÔËÓªÖÐÖ¹½øÈëµÚÈýÌ죬£¬£¬³ÉΪ¶íÎÚ³åÍ»Åä¾°ÏÂÒªº¦ÉèÊ©ÍøÂçÇå¾²ÊÂÎñµÄ×îа¸Àý¡£¡£¡£¡£¾Ý¸Ã¹«Ë¾ÖÜËÄÉùÃ÷£¬£¬£¬¹¥»÷ÕßÌᳫÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷²¢ÊÔͼÈëÇÖÆäÍøÂ磬£¬£¬Ä¿µÄֱָͨ¹ý²¨Â޵ĺ£¡¢ÑÇËÙ-ºÚº£¡¢Ô¶¶«¼°±±¼«µØÇøº£¸Û¿ªÕ¹µÄú̿ºÍ¿óÎï·ÊÁϳö¿ÚÓªÒµ£¬£¬£¬ÒâͼÈÅÂÒÔËÓªÖÈÐò¡£¡£¡£¡£Ö»¹Ü¹¥»÷¹æÄ£´ó¡¢Ç¿¶È¸ß£¬£¬£¬¿Ú°¶Í¬ÃËÇ¿µ÷ÆìÏÂ6¸öº£ÔËÂëÍ·¼°Òªº¦ÏµÍ³ÈÔÕý³£ÔËת£¬£¬£¬ÃºÌ¿ºÍ¿óÎï·ÊÁÏÄê»õÔËÁ¿³¬5000Íò¶ÖµÄӪҵδÊÜÓ°Ïì¡£¡£¡£¡£´Ë´Î¹¥»÷ÌØÕ÷ÏÔÖø£ººÚ¿Í¶¯ÓÃÁ˰üÀ¨1.5Íò¸öÈ«ÇòΨһIPµØµãµÄ½©Ê¬ÍøÂ磬£¬£¬²¿·ÖIPÔ´×Ô¶íÂÞ˹¾³ÄÚ£¬£¬£¬ÇÒÒ»Ö±±ä»»¹¥»÷Õ½ÂÔÒÔ¹æ±ÜÇå¾²·ÀÓù¡£¡£¡£¡£¹«Ë¾Î´Ö¸Ã÷¹¥»÷ȪԴ£¬£¬£¬µ«Á¬ÏµÅä¾°¿ÉÖª£¬£¬£¬×Ô2022Äê¶íÎÚ³åÍ»Éý¼¶ÒÔÀ´£¬£¬£¬Õë¶Ô½»Í¨ÎïÁ÷ÍøÂçµÄÍøÂç¹¥»÷³ÊƵ·¢Ì¬ÊÆ£¬£¬£¬¶íÎÚË«·½ºÚ¿ÍƵÈÔʹÓÃDDoS¹¥»÷×ÌÈŶԷ½»ù´¡ÉèÊ©¡£¡£¡£¡£
https://therecord.media/cyberattack-on-russian-port-operator
4. ÈýÐÇÒòµÚÈý·½Îó²î£¬£¬£¬Ãô¸ÐÊý¾Ý±»ºÚ¿Í¹ÒÅÆ³öÊÛ
11ÔÂ14ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬ÍøÂç·¸·¨ÂÛ̳¾ªÏÖºÚ¿Í·¢Ìû³ÆÒÑÀÖ³ÉÈëÇÖÈýÐÇ£¬£¬£¬²¢¹ûÕæ³öÊ۾ݳÆÀ´×Ըù«Ë¾µÄÄÚ²¿Êý¾Ý¡£¡£¡£¡£¾²é£¬£¬£¬´Ë´ÎÊÂÎñÔ´ÓںڿͶÔÒ»¼ÒΪ¶à¼Ò´óÐÍÆóÒµÌṩЧÀ͵ĵÚÈý·½³Ð°üÉ̵ÄÈëÇÖ£¬£¬£¬Í¨¹ý¸Ã³Ð°üÉ̵Ļá¼ûȨÏÞ£¬£¬£¬¹¥»÷ÕßÉøÍ¸ÖÁÈýÐDz¿·Ö»ù´¡ÉèÊ©£¬£¬£¬°üÀ¨MSSQLÊý¾Ý¿â¼°AWS S3´æ´¢Í°£¬£¬£¬ÇÔÈ¡Á˰üÀ¨Ô´´úÂ롢˽Կ¡¢SMTPƾ֤¡¢ÉèÖÃÎļþ¡¢Ó²±àÂëÆ¾Ö¤¡¢Óû§Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢µÈÔÚÄÚµÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£CybernewsÑо¿ÍŶÓÑéÖ¤Á˺ڿÍÐû²¼µÄÊý¾ÝÑù±¾£¬£¬£¬È·ÈÏÆäÖаüÀ¨ÈýÐÇÂóµÏÑ·£¨ÈýÐǵç×ÓÆìÏÂÒ½ÁÆ×°±¸×Ó¹«Ë¾£©µÄÄÚ²¿JavaÏîÄ¿½á¹¹ÎļþÊ÷£¬£¬£¬ÌåÏÖÔ´´úÂë¼°Ó²±àÂëÆ¾Ö¤¿ÉÄÜй¶¡£¡£¡£¡£±ðµÄ£¬£¬£¬±»ÇÔÊý¾Ý¿â½ØÍ¼ÏÔʾԱ¹¤ÁªÏµÐÅÏ¢£¨Èçµç×ÓÓʼþ¡¢Óû§Ãû£©£¬£¬£¬±íÃûÌáÐÑ¿ÉÄܱ£´æÖÎÀíԱƾ֤£¬£¬£¬Õ⽫ÔöÌíÔ±¹¤ÔâÊÜ´¹ÂÚ¹¥»÷»òƾ֤Ìî³ä¹¥»÷µÄΣº¦¡£¡£¡£¡£ºÚ¿ÍÒÔ¡°Ò»´ÎÐÔÂò¶Ï¡±ÎªÓÕ¶ü£¬£¬£¬ÒªÇóʹÓÃÃÅÂÞ±ÒÖ§¸¶£¬£¬£¬µ«ÊÛ¼ÛÉÐδÐû²¼¡£¡£¡£¡£
https://cybernews.com/security/samsung-data-third-party-breach/
5. Aisuru½©Ê¬ÍøÂçÏÆÆð³¬´ó¹æÄ£DDoS¹¥»÷·ç±©
11ÔÂ17ÈÕ£¬£¬£¬Î¢ÈíÅû¶£¬£¬£¬Aisuru½©Ê¬ÍøÂç½üÆÚ¶ÔAzureÍøÂçÌᳫ·åÖµ´ï15.72TbpsµÄDDoS¹¥»÷£¬£¬£¬½ÓÄÉUDPºéË®¹¥»÷ģʽ£¬£¬£¬Ä¿µÄÖ±Ö¸°Ä´óÀûÑÇij¹«¹²IP£¬£¬£¬Êý¾Ý°üËÙÂʸߴï36.4ÒÚbps¡£¡£¡£¡£¸ÃÍøÂçÓÉTurbo Mirai¼¶ÎïÁªÍø½©Ê¬ÍøÂçÇý¶¯£¬£¬£¬Ö÷ҪʹÓñ»ÈëÇֵļÒͥ·ÓÉÆ÷¡¢ÉãÏñÍ·µÈ×°±¸£¬£¬£¬ºã¾ÃÕë¶ÔÃÀ¹ú¼°ÆäËû¹ú¼ÒסլISPÌá³«ÆÆ¼Í¼¹¥»÷¡£¡£¡£¡£AzureÇ徲ר¼ÒÖ¸³ö£¬£¬£¬¹¥»÷Á÷Á¿ÌØÕ÷ÏÔ×Å£¬£¬£¬ÎÞÔ´µØµãÓÕÆÇÒʹÓÃËæ»úÔ´¶Ë¿Ú£¬£¬£¬±ãÓÚ×·×ÙÓëЧÀÍÌṩÉÌ×èµ²¡£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬Cloudflare±¾Ô´ӹûÕæ¡°ÈÈÃÅÓòÃû¡±ÅÅÃûÖÐÒÆ³ý¶à¸öÓëAisuru½©Ê¬ÍøÂçÏà¹ØµÄÓòÃû£¬£¬£¬ÕâЩÓòÃûÔøÒòAisuruÏòDNSЧÀÍ1.1.1.1·¢ËͶñÒâÅÌÎÊÁ÷Á¿£¬£¬£¬µ¼Ö»á¼ûÁ¿Òì³£ìÉý£¬£¬£¬ÉõÖÁÓâÔ½ÑÇÂíÑ·¡¢Î¢Èí¡¢¹È¸èµÈÕýµ±ÍøÕ¾¡£¡£¡£¡£Cloudflare CEO֤ʵ£¬£¬£¬´Ë¾ÙÖ¼ÔÚά»¤ÅÅÃûϵͳ¿ÉÐŶȣ¬£¬£¬Î´À´½«Ò»Á¬¶ÔÒÉËÆ¶ñÒâÓòÃû¾ÙÐб༻òÒþ²Ø¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-aisuru-botnet-used-500-000-ips-in-15-tbps-azure-ddos-attack/
6. ÆÕÁÖ˹¶Ù´óѧÊý¾Ýй¶£¬£¬£¬Ó°Ïì¾èÔùÕߺÍУÓÑ
11ÔÂ17ÈÕ£¬£¬£¬ÆÕÁÖ˹¶Ù´óѧ11ÔÂ10ÈÕÔâÓöÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬µ¼ÖÂУÓÑ¡¢¾èÔùÕß¡¢½ÌÖ°Ô±¹¤¼°Ñ§ÉúСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¾ÝУ·½Ðû²¼µÄ³£¼ûÎÊÌâ½â´ðÏÔʾ£¬£¬£¬¹¥»÷Õßͨ¹ý´¹ÂÚÓʼþÈëÇÖÒ»ÃûÔ±¹¤ÕË»§£¬£¬£¬½ø¶ø»á¼ûÁË´æ´¢³ï¿îÓëУÓѼÓÈë»î¶¯Êý¾ÝµÄÊý¾Ý¿â£¬£¬£¬Ð¹Â¶ÐÅÏ¢°üÀ¨ÐÕÃû¡¢µç×ÓÓÊÏä¡¢µç»°ºÅÂë¼°¼ÒÍ¥/°ì¹«µØµã¡£¡£¡£¡£¸ÃУǿµ÷£¬£¬£¬±»Ð¹Â¶Êý¾Ý¿âδ´æ´¢²ÆÎñÐÅÏ¢¡¢ÕË»§Æ¾Ö¤»òÊÜÁª°îÒþ˽·¨±£»£»£»£»¤µÄѧÉú/½ÌÖ°¹¤Ïêϸ¼Í¼£¬£¬£¬½öÉæ¼°Ð£ÓÑ¡¢¾èÔùÕß¼°¹ØÁªÈºÌ壨ÈçУÓÑÅäż¡¢Ñ§Éú¼Ò³¤µÈ£©µÄ»ù´¡ÁªÏµÐÅÏ¢¡£¡£¡£¡£±öϦ·¨ÄáÑÇ´óѧÔÚ10ÔÂÒ౬·¢ÀàËÆÊÂÎñ¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÇÔÈ¡µÄÔ±¹¤PennKeyµ¥µãµÇ¼ÕË»§£¬£¬£¬ÈëÇÖ¸ÃУSalesforce¾èÔùÕßÊý¾Ý¿â¡¢SAPÉÌÒµÖÇÄÜϵͳ¼°SharePointÎļþƽ̨£¬£¬£¬ÇÔÈ¡ÁË1.71GBÄÚ²¿Îĵµ£¬£¬£¬Éæ¼°120ÍòÌõ¼Í¼¡£¡£¡£¡£Á½ÆðÊÂÎñ¾ùÖ¸ÏòУÓѹØÏµÖÎÀíϵͳÎó²î£¬£¬£¬ÆÕÁÖ˹¶ÙµÄй¶ԴÓÚÔ±¹¤ÕË»§±»ÈëÇÖ£¬£¬£¬±ö´óÔòÒòÔ±¹¤ÕË»§È¨ÏÞ¹ý´óµ¼ÖÂϵͳ±»ºáÏòÉøÍ¸¡£¡£¡£¡£Ö»¹ÜÁ½ÆðÊÂÎñÊÖ·¨ÏàËÆ£¬£¬£¬ÆÕÁÖ˹¶Ù´óѧÉùÃ÷ÔÝÎÞÖ¤¾ÝÅú×¢¶þÕß±£´æ¹ØÁª¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/princeton-university-discloses-data-breach-affecting-donors-alumni/


¾©¹«Íø°²±¸11010802024551ºÅ