Gemini AIÖúÊÖÒý·¢Google APIÃÜԿ̻¶Σº¦
Ðû²¼Ê±¼ä 2026-02-281. Gemini AIÖúÊÖÒý·¢Google APIÃÜԿ̻¶Σº¦
2ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬£¬TruffleSecurityÑо¿Ö°Ô±ÔÚɨÃèÈ«ÇòÍøÕ¾Ê±·¢Ã÷£¬£¬£¬£¬£¬£¬½ü3000¸öǶÈëÔÚ¹«¹²JavaScript´úÂëÖеÄGoogle APIÃÜÔ¿±£´æÑÏÖØÇ徲Σº¦¡£¡£¡£ÕâЩÃÜÔ¿Ô±¾ÓÃÓÚµØÍ¼¡¢YouTubeǶÈë¡¢FirebaseµÈЧÀÍ£¬£¬£¬£¬£¬£¬ÔÚGoogleÍÆ³öGemini AIÖúÊֺ󣬣¬£¬£¬£¬£¬ÆäȨÏÞ±»ÒâÍâÀ©Õ¹ÖÁGeminiÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬µ¼Ö¹¥»÷Õ߿ɸ´ÖÆÃÜÔ¿»á¼û˽ÓÐÊý¾Ý²¢ÀÄÓÃAPIŲÓÃ׬Ǯ¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬£¬£¬ÕâЩ̻¶ÃÜÔ¿¶à°²ÅÅÓÚ½ðÈÚ»ú¹¹¡¢°²±£¹«Ë¾¡¢ÕÐÆ¸ÆóÒµµÈ×éÖ¯µÄÍøÕ¾Ô´´úÂëÖУ¬£¬£¬£¬£¬£¬²¿·ÖÃÜÔ¿×Ô2023Äê2ÔÂÆð±ãÒ»Á¬Ì»Â¶¡£¡£¡£TruffleSecurityͨ¹ý²âÊÔGemini APIµÄ/models¶ËµãÑéÖ¤ÁËÃÜÔ¿µÄÓÐÓÃÐÔ£¬£¬£¬£¬£¬£¬·¢Ã÷µ¥ÈÕ×î¸ß¿É±¬·¢ÊýǧÃÀÔªÓöȡ£¡£¡£ÎÊÌâȪԴÔÚÓÚ£¬£¬£¬£¬£¬£¬¿ª·¢Õß´Ëǰ½«GoogleÔÆAPIÃÜÔ¿ÊÓΪ·ÇÃô¸ÐÊý¾Ý¹ûÕæ£¬£¬£¬£¬£¬£¬¶øGeminiÍÆ³öºó£¬£¬£¬£¬£¬£¬ÕâЩÃÜԿͻȻ»ñµÃ¸ü¸ßȨÏÞȴδ±»ÊµÊ±²ì¾õ¡£¡£¡£Ñо¿Ö°Ô±ÓÚ2025Äê11ÔÂ21ÈÕÏò¹È¸è±¨¸æÎó²î£¬£¬£¬£¬£¬£¬¹È¸èÀúʱÊýÔÂÓÚ2026Äê1ÔÂ13ÈÕ½«Æä¹éÀàΪ¡°µ¥Ð§ÀÍȨÏÞÌáÉý¡±¡£¡£¡£¹È¸èÒѽÓÄÉÆð¾¢²½·¥¡£¡£¡£
https://www.bleepingcomputer.com/news/security/previously-harmless-google-api-keys-now-expose-gemini-ai-data/
2. ManoManoÔâµÚÈý·½Ð§ÀÍÉ̺ڿÍÈëÇÖÖÂÊý¾Ýй¶
2ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬·¨¹úDIYµçÉ̾ÞÍ·ManoMano¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬ÆäÒ»¼ÒµÚÈý·½¿Í»§Ð§ÀÍÌṩÉÌÓÚ2026Äê1ÔÂÔâÓöºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÔ¼3800ÍòÓû§Êý¾Ýй¶¡£¡£¡£¸Ã¹«Ë¾Ö¤Êµ£¬£¬£¬£¬£¬£¬ºÚ¿Íͨ¹ýδ¾ÊÚȨ»á¼û¸ÃÍ»Äá˹·Ö°üÉÌϵͳ£¬£¬£¬£¬£¬£¬ÇÔÈ¡ÁËÓëÓû§ÕË»§¼°¿Í·þ»¥¶¯Ïà¹ØµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¼°¿Í»§Ð§ÀÍÏàͬ¼Í¼£¬£¬£¬£¬£¬£¬µ«Î´Éæ¼°ÕË»§ÃÜÂë»ò¹«Ë¾ÏµÍ³Êý¾ÝÐ޸ġ£¡£¡£×÷ΪŷÖÞÁìÏȵļҾÓ×°ÐÞ¡¢Ô°ÒÕ²úÆ·ÔÚÏßÊг¡£¡£¡£¬£¬£¬£¬£¬£¬ManoManoÔÚ·¨¡¢±È¡¢Î÷¡¢Òâ¡¢µÂ¡¢Ó¢Áù¹úÔËÓª£¬£¬£¬£¬£¬£¬Ô¾ù×ÔÁ¦·Ã¿Í´ï5000Íò¡£¡£¡£´Ë´ÎÊÂÎñÔ´ÓÚºÚ¿ÍÂÛ̳ÉϼÙÃû¡°Indra¡±µÄ¹¥»÷ÕßÐû³Æ¶ÔÈëÇÖÈÏÕæ£¬£¬£¬£¬£¬£¬²¢Éù³Æ»ñÈ¡ÁË3780ÍòÓû§ÕË»§¼°Êýǧ·ÝÖ§³Ö¹¤µ¥Ó븽¼þ¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾HackmanacÖ¸³ö£¬£¬£¬£¬£¬£¬Ð¹Â¶ÈªÔ´»òÓëZendeskÊý¾Ýй¶Ïà¹Ø£¬£¬£¬£¬£¬£¬µ«ManoManoδֱ½ÓÈ·ÈÏÊÖÒÕϸ½Ú¡£¡£¡£ÊÂÎñÆØ¹âºó£¬£¬£¬£¬£¬£¬ManoManoÁ¬Ã¦½ÓÄÉÓ¦¼±²½·¥£º½ûÓÃÏà¹Ø»á¼ûȨÏÞ¡¢×÷·Ï·Ö°üÉÌÊý¾Ý»á¼ûȨ¡¢Ç¿»¯»á¼û¿ØÖÆÓë¼à¿Ø£¬£¬£¬£¬£¬£¬²¢Í¬²½×ª´ï·¨¹ú¹ú¼ÒÐÅÏ¢Óë×ÔÓÉίԱ»á£¨CNIL£©¼°¹ú¼Ò¿ÆÑ§Ó빤ҵÖÎÀí¾Ö£¨ANSSI£©¡£¡£¡£
https://www.bleepingcomputer.com/news/security/european-dyi-chain-manomano-data-breach-impacts-38-million-customers/
3. ÂíÈü×ãÇò¾ãÀÖ²¿ÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬40ÍòÓû§ÐÅÏ¢ÃæÁÙΣº¦
2ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬·¨¹úÂíÈü°ÂÁÖÆ¥¿Ë×ãÇò¾ãÀÖ²¿£¨OM£©¿ËÈÕ֤ʵÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬³ÉΪ½üÆÚÕë¶Ô´óÐÍÌåÓý×éÖ¯ÍøÂçÇå¾²ÊÂÎñµÄ×îа¸Àý¡£¡£¡£¸Ã¾ãÀÖ²¿½¨ÉèÓÚ1899Ä꣬£¬£¬£¬£¬£¬ÊÇ·¨¼×ÁªÈüÊ×´´³ÉÔ±Ö®Ò»£¬£¬£¬£¬£¬£¬²¢ÓÚ1993Äê³ÉΪÊ×Ö§¶áµÃÅ·ÖÞ¹Ú¾üÁªÈü¹Ú¾üµÄ·¨¹úÇò¶Ó¡£¡£¡£¾ÝÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳Åû¶£¬£¬£¬£¬£¬£¬ÆäÓÚ±¾Ô³õÈëÇÖ¾ãÀÖ²¿²¿·ÖЧÀÍÆ÷£¬£¬£¬£¬£¬£¬ÇÔÈ¡Á˰üÀ¨40ÍòÃûÔ±¹¤¡¢ÇòÃÔ¼°Ö§³ÖÕßÐÅÏ¢µÄÊý¾Ý¿â£¬£¬£¬£¬£¬£¬ÏêϸÊý¾ÝÉæ¼°ÐÕÃû¡¢µØµã¡¢¶©µ¥¼Í¼¡¢µç×ÓÓʼþ¼°ÊÖ»úºÅÂë¡£¡£¡£¹¥»÷Õß»¹Éù³Æ»ñÈ¡ÁË2050¸öDrupal CMSÕË»§ÐÅÏ¢£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨34Ãû¾ãÀÖ²¿Ô±¹¤ºÍ1770ÃûТ˳Õß¡¢°æÖ÷µÄÕË»§Æ¾Ö¤¡£¡£¡£ÎªÖ¤Êµ¹¥»÷ÕæÊµÐÔ£¬£¬£¬£¬£¬£¬¹¥»÷Õß¹ûÕæÁ˲¿·ÖÊý¾ÝÑù±¾£¬£¬£¬£¬£¬£¬²¢ÊÔͼÔÚÂÛ̳³öÊÛËùν¡°2026Äê2Ô½ÇÖðÊý¾Ý¡±¡£¡£¡£¾ãÀÖ²¿ÔÚÖܶþÐû²¼µÄÉùÃ÷ÖÐÈ·ÈÏÁ˹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬£¬µ«Ç¿µ÷¡°µÃÒæÓÚÊÖÒÕÍŶÓÓëרҵЧÀÍÉ̵ĿìËÙÏìÓ¦£¬£¬£¬£¬£¬£¬ÊÂ̬ÒÑ»ñµÃ¿ØÖÆ¡±¡£¡£¡£ÏÖÔÚ¾ãÀÖ²¿ËùÓÐÓªÒµ¾ùÔÚÇå¾²ÇéÐÎÏÂÕý³£ÔËÐУ¬£¬£¬£¬£¬£¬ÇÒÎÞÒøÐÐÐÅÏ¢»òÃÜÂëй¶¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬¾ãÀÖ²¿ÌåÏÖÈÔÔÚÊÓ²ìÊÂÎñÏêϸ¹æÄ££¬£¬£¬£¬£¬£¬²¢ÒÑÏò·¨¹úÊý¾Ý±£»£»£»£»£»£»¤»ú¹¹£¨CNIL£©Õýʽ±¨¸æ£¬£¬£¬£¬£¬£¬Í¬Ê±ºôÓõÇòÃÔСÐÄ´¹ÂÚ¹¥»÷¼°¿ÉÒɻ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/olympique-marseille-football-club-confirms-cyberattack-after-data-leak/
4. UAT-10027ʹÓÃDohdoorºóÃŹ¥»÷ÃÀ¹ú½ÌÓýºÍÒ½ÁƱ£½¡ÏµÍ³
2ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬Cisco Talos¿ËÈÕÅû¶±àºÅΪUAT-10027µÄÍþв¼¯Èº£¬£¬£¬£¬£¬£¬¸Ã¼¯Èº×Ô2025Äê12ÔÂÆðÒÔÃÀ¹ú½ÌÓý¼°Ò½ÁƱ£½¡»ú¹¹ÎªÄ¿µÄ£¬£¬£¬£¬£¬£¬°²ÅÅÁËÐÂÐͺóÃųÌÐòDohdoor¡£¡£¡£¹¥»÷³õʼ½×¶Îͨ¹ý´¹ÂÚÓʼþ´¥·¢PowerShell¾ç±¾£¬£¬£¬£¬£¬£¬ÏÂÔØ¶ñÒâ.batÎļþ²¢Ê¹ÓÃDLL²àÔØÊÖÒÕ¼ÓÔØDohdoor¶ñÒâDLL¡£¡£¡£¸ÃºóÃÅͨ¹ýDNS over HTTPS£¨DoH£©ÓëCloudflare»ù´¡ÉèÊ©Òþ²ØC2ͨѶ£¬£¬£¬£¬£¬£¬½«Á÷Á¿Î±×°³ÉÕýµ±HTTPSÅþÁ¬£¬£¬£¬£¬£¬£¬ÊµÏÖÈÆ¹ý¹Å°åÇå¾²¼ì²âµÄÒ»Á¬»á¼û¡£¡£¡£DohdoorΪ2025Äê11Ô±àÒëµÄ64λDLL¼ÓÔØÆ÷£¬£¬£¬£¬£¬£¬½ÓÄÉË«ÖØ½âÃÜ»úÖÆ£ºÅúÁ¿Êý¾ÝʹÓÃSIMDÖ¸ÁîµÄXOR-SUBËã·¨´¦Öóͷ££¬£¬£¬£¬£¬£¬Ê£ÓàÊý¾Ýͨ¹ýλÖÃÏà¹Ø¹«Ê½½âÃÜ¡£¡£¡£ÆäC2ͨѶͨ¹ýÆÊÎöCloudflareµÄJSONÏìÓ¦»ñȡЧÀÍÆ÷IP£¬£¬£¬£¬£¬£¬²¢Ä£ÄâcurlÁ÷Á¿·¢ËÍHTTPS GETÇëÇóÏÂÔØ¼ÓÃÜÔØºÉ¡£¡£¡£Îª¹æ±ÜEDR¼ì²â£¬£¬£¬£¬£¬£¬Dohdoor»á¶¯Ì¬¶¨Î»ntdll.dllÖеÄNtProtectVirtualMemoryº¯Êý£¬£¬£¬£¬£¬£¬Í¨¹ýÐÞ²¹ÏµÍ³Å²Óôæ¸ù½¨ÉèÖ±½ÓϵͳŲÓÃÌø×ª£¬£¬£¬£¬£¬£¬ÈƹýÓû§Ä£Ê½¹³×Ó¡£¡£¡£TalosÆÀ¹ÀÒÔΪ£¬£¬£¬£¬£¬£¬Ö»¹ÜUAT-10027ÓëLazarus±£´æÊÖÒÕ¹ØÁª£¬£¬£¬£¬£¬£¬µ«ÆäÄ¿µÄÁìÓòÌØÊâÐÔÈÔÐèÒýÆðÏà¹ØÐÐÒµ¸ß¶ÈСÐÄ¡£¡£¡£
https://securityaffairs.com/188558/apt/uat-10027-campaign-hits-u-s-education-and-healthcare-with-stealthy-dohdoor-backdoor.html
5. ³¯ÏÊAPT37×éÖ¯ÌᳫRuby Jumper¶ñÒâ»î¶¯
2ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬ÔÆÇå¾²¹«Ë¾Zscaler¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬Óɳ¯Ïʹú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯APT37ÌᳫµÄ"Ruby Jumper"¶ñÒâ»î¶¯£¬£¬£¬£¬£¬£¬Õýͨ¹ý¿ÉÒÆ¶¯´æ´¢Çý¶¯Æ÷ÔÚÎïÀí¸ôÀëϵͳÓëÁªÍøÏµÍ³¼ä½¨ÉèÒþ²ØÊý¾Ý´«ÊäͨµÀ¡£¡£¡£¹¥»÷Á´Ê¼ÓÚÊܺ¦Õß·¿ªÎ±×°³É³¯ÏÊýÌ幨ÓÚ°ÍÒÔ³åÍ»°¢À²®ÓïÒë±¾µÄ¶ñÒâLNKÎļþ£¬£¬£¬£¬£¬£¬¸ÃÎļþ»á°²ÅÅPowerShell¾ç±¾ÌáÈ¡ÓÐÓÃÔØºÉ²¢Æô¶¯ÓÕ¶üÎĵµ¡£¡£¡£¾ç±¾Ê×ÏȼÓÔØRESTLEAFÖ²Èë³ÌÐò£¬£¬£¬£¬£¬£¬Í¨¹ýZoho WorkDriveÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬£¬»ñÈ¡¼ÓÃÜshellcodeºóÏÂÔØ»ùÓÚRubyµÄSNAKEDROPPER¼ÓÔØÆ÷¡£¡£¡£¸Ã¼ÓÔØÆ÷»á×°ÖÃαװ³Éusbspeed.exeµÄRuby 3.3.0ÔËÐÐʱÇéÐΣ¬£¬£¬£¬£¬£¬²¢Í¨¹ýÿÎå·ÖÖÓÖ´ÐеÄÍýÏëʹÃüÌæ»»RubyGemsĬÈÏÎļþ£¬£¬£¬£¬£¬£¬ÊµÏÖ×Ô¶¯¼ÓÔØ¡£¡£¡£THUMBSBDºóÃÅÒÔascii.rbÎļþÐÎʽÏÂÔØ£¬£¬£¬£¬£¬£¬ÈÏÕæÍøÂçϵͳÐÅÏ¢¡¢ÔÝ´æÏÂÁîÎļþ£¬£¬£¬£¬£¬£¬²¢ÔÚUSBÇý¶¯Æ÷½¨ÉèÒþ²ØÄ¿Â¼¾ÙÐÐÊý¾ÝË«Ïò´«Ê䣬£¬£¬£¬£¬£¬½«¿ÉÒÆ¶¯½éÖÊת»¯Îª"Òþ²ØC2ÖмÌ"¡£¡£¡£VIRUSTASKÔòͨ¹ýÌæ»»Õýµ±ÎļþΪ¶ñÒâ¿ì½Ý·½·¨£¬£¬£¬£¬£¬£¬ÔÚÇý¶¯Æ÷ÓÐ2GBÒÔÉϿռäʱ´¥·¢Ñ¬È¾£¬£¬£¬£¬£¬£¬ÏòÐÂÎïÀí¸ôÀë×°±¸Èö²¥¡£¡£¡£FOOTWINEÌØ¹¤Èí¼þαװ³ÉAPKÎļþ£¬£¬£¬£¬£¬£¬Ö§³Ö¼üÅ̼ͼ¡¢ÆÁÄ»½ØÍ¼¡¢ÒôÊÓÆµÂ¼ÖƵÈÔ¶³Ì²Ù×÷¡£¡£¡£
https://www.bleepingcomputer.com/news/security/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/
6. RESURGE¶ñÒâÈí¼þʵÏÖIvanti×°±¸Òþ²Ø³¤ÆÚÈëÇÖ
2ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕÐû²¼Á˹ØÓÚRESURGE¶ñÒâÖ²Èë³ÌÐòµÄ×îÐÂÊÖÒÕϸ½Ú¡£¡£¡£¸Ã³ÌÐò±»ÓÃÓÚʹÓÃCVE-2025-0282ÁãÈÕÎó²îÈëÇÖIvanti Connect Secure×°±¸£¬£¬£¬£¬£¬£¬¾ßÓÐÑÓ³ÙÆô¶¯¡¢ÖØ´óÍøÂç¼¶¹æ±ÜºÍÈÏÖ¤ÊÖÒÕµÈÌØÕ÷£¬£¬£¬£¬£¬£¬¿ÉʵÏÖÒþ²ØÍ¨Ñ¶Ó볤ÆÚÐÔפÁô¡£¡£¡£¾ÝCISAÆÊÎö£¬£¬£¬£¬£¬£¬RESURGEÊÇÒ»¸öÃûΪlibdsupgrade.soµÄ32λLinux¹²Ïí¹¤¾ßÎļþ£¬£¬£¬£¬£¬£¬¾ß±¸rootkit¡¢bootkit¡¢ºóÃÅ¡¢Í¶·ÅÆ÷¡¢ÊðÀíºÍËíµÀµÈ¶àÖØ¹¦Ð§¡£¡£¡£ÆäÆæÒìÖ®´¦ÔÚÓÚ²»×Ô¶¯ÏòC2ЧÀÍÆ÷·¢ËÍÐű꣬£¬£¬£¬£¬£¬¶øÊÇÎÞÏÞÆÚÆÚ´ýÌØ¶¨ÈëÕ¾TLSÅþÁ¬£¬£¬£¬£¬£¬£¬Í¨¹ýCRC32 TLSÖ¸ÎÆ¹þÏ£¼Æ»®Ê¶±ð¹¥»÷ÕßµÄÅþÁ¬ÊµÑé¡£¡£¡£µ±ÔÚ"web"Àú³ÌϼÓÔØÊ±£¬£¬£¬£¬£¬£¬Ëü»á¹Ò¹³"accept()"º¯Êý£¬£¬£¬£¬£¬£¬ÔÚÁ÷Á¿µÖ´ïЧÀÍÆ÷ǰ¼ì²éTLSÊý¾Ý°ü£¬£¬£¬£¬£¬£¬ÈôÖ¸ÎÆÆ¥ÅäÔò½¨ÉèË«ÏòTLS»á»°£¬£¬£¬£¬£¬£¬²»È»½«Á÷Á¿µ¼ÏòÕýµ±IvantiЧÀÍÆ÷¡£¡£¡£¹¥»÷Õß»¹Ê¹ÓÃαÔìµÄIvantiÖ¤Êé¾ÙÐÐÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬¸ÃÖ¤Êé½öÓÃÓÚÈÏÖ¤¶ø·Ç¼ÓÃÜ£¬£¬£¬£¬£¬£¬ÇÒͨ¹ý»¥ÁªÍøÃ÷ÎÄ´«Ê䣬£¬£¬£¬£¬£¬·ÀÓùÕ߿ɽ«Æä×÷ÎªÍøÂçÊðÃû¼ì²âÈëÇÖ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-warns-that-resurge-malware-can-be-dormant-on-ivanti-devices/


¾©¹«Íø°²±¸11010802024551ºÅ