´óº«º½¿Õǰ×Ó¹«Ë¾ÔâClopÀÕË÷ÍŻ﹥»÷
°ä²¼¹¦·ò 2025-12-301. ´óº«º½¿Õǰ×Ó¹«Ë¾ÔâClopÀÕË÷ÍŻ﹥»÷
12ÔÂ29ÈÕ£¬£¬£¬º«¹ú¹ú¶Èº½¿Õ¹«Ë¾´óº«º½¿Õ½üÈÕÅû¶£¬£¬£¬Æä»úÉϲÍÒû¹©¸øÉ̼°Ç°×Ó¹«Ë¾´óº«º½¿Õ²ÍÒûÃâ˰¹«Ë¾£¨KC&D£©Ôâ·êºÚ¿Í¹¥»÷£¬£¬£¬µ¼ÖÂÔ¼3ÍòÃûÔ±¹¤Ð¡ÎÒÐÅϢй¶¡£¡£¡£KC&DÓÚ2020Äê´Ó´óº«º½¿Õ·Ö²ðΪ¶ÀÁ¢¹«Ë¾£¬£¬£¬Õâ´ÎÊÂÎñÖУ¬£¬£¬ÆäERPϵͳÖд洢µÄÔ±¹¤ÐÕÃû¡¢ÒøÐÐÕ˺ŵÈÃô¸ÐÐÅÏ¢±»ÇÔÈ¡¡£¡£¡£´óº«º½¿ÕÊ×ϯִÐйÙÓí»ùºéÔÚÄÚ²¿±¸Íü¼ÖÐÇ¿µ÷£¬£¬£¬Ö»¹ÜÊÂÎñ²úÉúÔÚÍⲿºÏ×÷ͬ°éÖÎÀíÁìÓòÄÚ£¬£¬£¬µ«Éæ¼°Ô±¹¤ÐÅÏ¢°²È«£¬£¬£¬¹«Ë¾¸ß¶ÈÆ÷ÖØ¡£¡£¡£×÷Ϊº«¹ú×î´óº½¿Õ¹«Ë¾£¬£¬£¬´óº«º½¿ÕÕ¼Óг¬2ÍòÃûÔ±¹¤¡¢160Óà¼Ü·É»ú£¬£¬£¬2024ÄêÔËËͳ˿ͳ¬2300ÍòÈ˴Σ¬£¬£¬ÓªÊÕ³¬110ÒÚÃÀÔª¡£¡£¡£Õâ´ÎÊý¾Ýй¶¹æÄ£¾Þ´ó£¬£¬£¬±¾µØÃ½Ì屨µÀ³Æ¹¥»÷ÕßÇÔÈ¡ÁËÔ¼3ÍòÌõÊý¾Ý¼Í¼£¬£¬£¬Ö»¹Ü´óº«º½¿ÕδÃ÷È·¾ßÌåÊýÁ¿£¬£¬£¬µ«ÒÑÏòÓйز¿ÃŻ㱨²¢Æô¶¯µ÷²é¡£¡£¡£Ä¿Ç°ÉÐδ·¢ÏÖ±»µÁÊý¾Ý±»ÓÃÓÚڲƵÄÖ¤¾Ý£¬£¬£¬µ«¹«Ë¾ÌáÐÑÔ±¹¤¾¯Ìè¼ÙÒ⹫˾»ò½ðÈÚ»ú¹¹µÄÚ¿ÆÓʼþ¼°¶ÌÐÅ¡£¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬£¬ClopÀÕË÷Èí¼þÍÅ»ïÒÑÐû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü£¬£¬£¬²¢ÔÚÆä°µÍøÐ¹Â¶ÍøÕ¾°ä²¼±»µÁÊý¾Ý£¬£¬£¬ÔÊÐíͨ¹ýTorrentÏÂÔØ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/korean-air-data-breach-exposes-data-of-thousands-of-employees/
2. EmEditorÔ⹩¸øÁ´¹¥»÷£º¶ñÒâÈí¼þÇÔÈ¡Êý¾Ý²¢²¿ÊðÀ©´ó
12ÔÂ29ÈÕ£¬£¬£¬½üÈÕ£¬£¬£¬¹ãÊÜ»¶ÓµÄÎı¾ºÍ´úÂë±à×ëÈí¼þEmEditorÔâ·ê¹©¸øÁ´¹¥»÷£¬£¬£¬µ¼ÖÂÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ´«²¼¡£¡£¡£EmEditorÓÉÀ×µÂÃɵÂEmurasoft¹«Ë¾¿ª·¢£¬£¬£¬ÊÇÒ»¿î¸ß»úÄÜWindows¹¤¾ß£¬£¬£¬×¨Îª±àÂë¡¢Îı¾±à×ë¼°´¦ÖôóÐÍÎļþÉè¼Æ¡£¡£¡£12ÔÂ19ÈÕ18:39ÖÁ22ÈÕ12:50ÆÚ¼ä£¬£¬£¬Í¨¹ýEmEditorÖ÷Ò³¡°Á¢¼´ÏÂÔØ¡±°´Å¥ÏÂÔØ×°Ö÷¨Ê½µÄÓû§¿ÉÄÜÔâ·ê¶ñÒâ°æ±¾¡£¡£¡£¸Ã°´Å¥µÄURL±»´Û¸Ä£¬£¬£¬Ö¸ÏòÍøÕ¾·ÖÆçµØÎ»ÍйܵĶñÒâ.msiÎļþ¡£¡£¡£¼Ù×°Ö÷¨Ê½ÓëÕæÆ·Ãû³Æ¡¢Ìå»ýÀàËÆ£¬£¬£¬µ«ÊðÃûÖ¤ÊéÊôÓÚÆäËû¹«Ë¾¡£¡£¡£ÔËÐк󣬣¬£¬¶ñÒⷨʽִÐÐPowerShellºÅÁ£¬£¬´ÓαÔìÓòÏÂÔØ²¢Ö´ÐÐÎļþ¡£¡£¡£¸Ã¶ñÒâÈí¼þÍøÂçϵͳÐÅÏ¢¡¢×ÀÃæ/Îĵµ/ÏÂÔØÎļþ¼ÐÎļþ¡¢VPNÅäÖá¢ä¯ÀÀÆ÷Êý¾Ý¼°Zoho Mail¡¢Discord¡¢SlackµÈÀûÓÃÍ´´¦¡£¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬£¬Èôϵͳ˵»°ÎªÇ°ËÕÁª¹ú¶È»òÒÁÀÊ£¬£¬£¬¶ñÒâÈí¼þ»áÖÕÖ¹ÔËÐС£¡£¡£¸üÑÏÖØµÄÊÇ£¬£¬£¬¹¥»÷Õß²¿ÊðÁËÃûΪ¡°Google Drive Caching¡±µÄä¯ÀÀÆ÷À©´ó£¬£¬£¬¸ÃÀ©´ó¾ß±¸ÆëÈ«ÐÅÏ¢ÇÔȡְÄÜ£¬£¬£¬¿ÉÓÆ¾Ã»¯ÍøÂçä¯ÀÀÆ÷º¹Çà¡¢ÊéÇ©¡¢cookie£¬£¬£¬Ö´ÐмôÌù°å½Ù³Ö£¨´úÌæ¼ÓÃÜÇ®±ÒµØÖ·£©¡¢¼üÅ̼ͼ¼°ÇÔÈ¡Facebook¸æ°×ÕË»§¡£¡£¡£
https://www.securityweek.com/infostealer-malware-delivered-in-emeditor-supply-chain-attack/
3. FortiGate·À»ðǽ2FAÈÆ¹ý·ì϶³ÖÐøÔâÀûÓÃ
12ÔÂ29ÈÕ£¬£¬£¬ÍøÂ簲ȫ³§ÉÌFortinet½üÈÕÏò¿Í»§·¢³öÖҸ棬£¬£¬ÍþвÐÐΪÕßÈÔÔÚ»ý¼«ÀûÓñàºÅΪCVE-2020-12812µÄÑÏÖØ·ì϶¹¥»÷δÐÞ¸´µÄFortiGate·À»ðǽÉ豸¡£¡£¡£¸Ã·ì϶×îÔçÓÚ2020Äê7Ô±»Åû¶²¢ÐÞ¸´£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÅú¸ÄÓû§Ãû¾ÞÏ¸Ð´ÈÆ¹ýË«³É·ÖÉí·ÝÑéÖ¤£¨2FA£©»úÖÆ£¬£¬£¬ÔÚÅäÖÃÁËLDAPÔ¶³ÌÉí·ÝÑéÖ¤ÇÒÆôÓÃ"Óû§±¾µØ"2FAµÄFortiGate SSL VPNÉ豸ÉÏʵÏÖδÊÚȨ½Ó¼û¡£¡£¡£·ì϶³ÉÒòÔÚÓÚ±¾µØÉí·ÝÑéÖ¤ÓëÔ¶³ÌLDAPÉí·ÝÑéÖ¤Ö®¼äµÄ¾ÞϸдƥÅäÂß¼²»Ò»Ö¡£¡£¡£FortinetÆäʱͨ¹ý°ä²¼FortiOS 6.4.1/6.2.4/6.0.10°æ±¾ÐÞ¸´¸ÃÎÊÌ⣬£¬£¬²¢½¨ÒéÎÞ·¨Á¢¼´Éý¼¶µÄ¿Í»§¹Ø±ÕÓû§Ãû·Ö±æ¾ÞϸдְÄÜ¡£¡£¡£È»¶ø£¬£¬£¬×îмà²âÏÔʾ£¬£¬£¬¹¥»÷ÕßÈÔÔÚÕë¶ÔÅäÖÃÁËLDAP¹ØÁª±¾µØÓû§ÇÒÆôÓÃ2FAµÄÌØ¶¨ÏµÍ³Ö´Ðй¥»÷¡£¡£¡£Èô¸¨ÖúLDAP×éÅäÖò»µ±£¬£¬£¬¹¥»÷³É¹¦Âʽ«½øÒ»²½ÌáÉý£¬£¬£¬¸Ã×é±¾Ó¦ÔÚÖ÷LDAPÈÏ֤ʧ°ÜʱÆôÓ㬣¬£¬µ«Èô·Ç±ØÒªÓ¦Ö±½Óɾ³ý¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fortinet-warns-of-5-year-old-fortios-2fa-bypass-still-exploited-in-attacks/
4. LangChain CoreÏÖ"LangGrinch"¸ßΣ·ì϶
12ÔÂ27ÈÕ£¬£¬£¬°²È«×êÑÐÔ±Yarden PoratÓÚ2025Äê12ÔÂ4ÈÕÅû¶ÁËLangChainÉú̬Ö÷ÌâPython°ülangchain-coreÖеÄÑÏÖØ·ì϶CVE-2025-68664£¨´úºÅ"LangGrinch"£©£¬£¬£¬CVSSÆÀ·Ö´ï9.3¡£¡£¡£·ì϶¸ùÒòÔÚÓÚº¯Êýδ¶Ôº¬"lc"¼üµÄÓû§×ֵ佸ÐÐתÒå´¦Öᣡ£¡£¹¥»÷Õß¿ÉÀûÓÃmetadata¡¢responseµÈÒµÎñ×Ö¶Î×¢Èë¶ñÒâ¶ÔÏó½á¹¹£¬£¬£¬ÔÚºóÐøload()/loads()·´ÐòÁл¯Ê±£¬£¬£¬ÔÚlangchain_core¡¢langchain_communityµÈÊÜÐżÓÃÃû¿Õ¼äÄÚʵÀý»¯Serializable×ÓÀà¡£¡£¡£²¿ÃÅÀàÔÚ³õʼ»¯Ê±¿ÉÄÜ´¥·¢¸±×÷Ó㬣¬£¬Èç»·¾³±äÁ¿Ð¹Â¶¡¢Jinja2Ä£°å´úÂëÖ´ÐС¢Î£ÏÕÀàʵÀý»¯µÈ£¬£¬£¬ÉõÖÁ¿Éͨ¹ýÌáÐÑ×¢È뽫¶ñÒâ¶ÔÏó°µ²ØÓÚÓû§¿É¿Ø×ֶΣ¬£¬£¬ÊµÏÖÒñ±Î¹¥»÷¡£¡£¡£¸Ã·ì϶ÓÈΪÑÏÖØ£ºÆäÒ»£¬£¬£¬Î»ÓÚlangchain-core±¾Ìå¶ø·ÇÍâΧ¹¤¾ß£¬£¬£¬Ó°ÏìÃæ¹ã£»Æä¶þ£¬£¬£¬dumps()/dumpd()×÷Ϊ¿ò¼ÜÖ÷ÌâAPI£¬£¬£¬È«ÇòÀÛ¼Æ×°ÖÃÁ¿ÊýÒÚ£»ÆäÈý£¬£¬£¬¹¥»÷¿Éͨ¹ýµ¥ÌõLLMÊä³ö¼ä½Ó´¥·¢£¬£¬£¬Õý³£ÒµÎñÁ÷³ÌÖУ¬£¬£¬LLMÌìÉúµÄmetadataÈô±»ÐòÁл¯£¬£¬£¬¼´¿É´¥·¢·ì϶£¬£¬£¬Òñ±ÎÐÔÇ¿ÇÒ¹¥»÷Ãż÷µÍ¡£¡£¡£ÐÞ¸´¹æ»®ÒÑËæ°æ±¾1.2.5¡¢0.3.81°ä²¼¡£¡£¡£
https://securityaffairs.com/186185/hacking/langchain-core-vulnerability-allows-prompt-injection-and-data-exposure.html
5. ¾ÈÊÀ¾üÔâInterlockÀÕË÷ÍŻ﹥»÷
12ÔÂ29ÈÕ£¬£¬£¬¹ú¼Ê´È±¯×éÖ¯¾ÈÊÀ¾ü½üÈÕÔâ·êÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬£¬¹¥»÷ÕßÐû³ÆÇÔÈ¡ÁË93GBÃô¸ÐÐÅÏ¢²¢°ä²¼ÔÚInterlockÀÕË÷Èí¼þÍÅ»ïµÄ°µÍø²©¿ÍÉÏ¡£¡£¡£Õâ´ÎÐ¹Â¶Éæ¼°160Íò±ÊÃÀ¹ú¾ÓÃñ¾è¿îÂòÂô¼Í¼£¬£¬£¬×ܶî´ïÊýǧÍòÃÀÔª£¬£¬£¬Ô̺¬È«Ãû¡¢µç»°¡¢×¡Ö·¡¢¾è¿î½ð¶îµÈСÎÒÉí·ÝÐÅÏ¢£¨PII£©£¬£¬£¬Êý¾Ý½á¹¹ÏÔʾ¹¥»÷Õß»ñÈ¡ÁËÏ꾡µÄ¾èÔùÈËÃûµ¥¡£¡£¡£¾ÈÊÀ¾ü×÷ΪȫÇò×î´ó´È±¯»ú¹¹Ö®Ò»£¬£¬£¬³ÉÁ¢ÓÚ1865Ä꣬£¬£¬2024ÄêÊÕÈë½ü50ÒÚÃÀÔª£¬£¬£¬Î»ÁÐÃÀ¹úµÚÁù´ó´È±¯»ú¹¹£¬£¬£¬ÔÚ134¸ö¹ú¶È·¢Õ¹ÔöÔ®ÏîÄ¿£¬£¬£¬²¢µ£ÈνáºÏ¹ú´ÓÊô»ú¹¹¡£¡£¡£Õâ´ÎÊÂÎñ²¢·ÇÊ×Àý£¬£¬£¬½ñÄê5Ô£¬£¬£¬ChaosÀÕË÷Èí¼þ¼¯ÍÅÔø¹¥»÷¾ÈÊÀ¾ü²¢°ä²¼Êý¾Ý£»¶ø±¾´Î¹¥»÷ÕßInterlockÍÅ»ï×Ô2024Ëêĺ³öÏÖ£¬£¬£¬´Óǰ12¸öÔÂÒÑÇÖº¦ÖÁÉÙ66¸ö×éÖ¯£¬£¬£¬Ñ¡È¡Ë«ÖØÀÕË÷Õ½Êõ£¬£¬£¬Í¨¹ýÈëÇÖÍøÕ¾»òÉç»á¹¤³Ìѧ»ñÈ¡³õ²½°²Éíµã£¬£¬£¬6ÔºÍ8Ô¹¥»÷ÓÈΪ»îÔ¾¡£¡£¡£ÍøÂ簲ȫÍŶӷÖÎöÖ¸³ö£¬£¬£¬Ð¹Â¶Êý¾ÝÔ´ÓÚ΢ÈíSQL ServerÊý¾Ý¿â±¸·Ý£¬£¬£¬¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩ½á¹¹»¯Êý¾ÝÖ´ÐÐÉí·Ý͵ÇÔ¡¢ÐéαÕË»§´´½¨»òÚ¿Æ¡£¡£¡£ÓÈÆäÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬¹¥»÷Õß¿ÉÄܼÙÒâ¾ÈÊÀ¾ü»òÆäËû´È±¯»ú¹¹½øÐÐÚ¿Æ£¬£¬£¬ÀûÓþèÔùÕßµÄÉÆÐÄÓÕµ¼×ªÕË£¬£¬£¬»òͨ¹ý²ÆÕþ·ÖÎö¾«×¼¶¨Î»¸ß¼ÛÖµÖ¸±ê¡£¡£¡£
https://cybernews.com/security/salvation-army-data-breach-donors/
6. LynxÀÕË÷ÍŻ﹥»÷ÂíÈøÖîÈûÖݹÜÕÊÊÂÎñËù
12ÔÂ29ÈÕ£¬£¬£¬½üÈÕ£¬£¬£¬Óë¶íÂÞ˹¹ØÁªµÄLynxÀÕË÷Èí¼þÍÅ»ïÐû³Æ£¬£¬£¬´ÓÕ¼ÓÐ75Ä꺹ÇàµÄÂíÈøÖîÈûÖݹÜÕÊÊÂÎñËùCSA Tax & AdvisoryÇÔÈ¡ÁË´óÁ¿ÄÉ˰É걨Êý¾Ý¼°Éç»á±£ÏÕºÅÂ룬£¬£¬²¢ÒÔ´ËÀÕË÷Êê½ð¡£¡£¡£CSA×÷ΪרӪ˰Îñ·þÎñµÄ»ú¹¹£¬£¬£¬Æä¿Í»§Êý¾ÝÈôÔâй¶£¬£¬£¬½«Ãæ¶ÔÑÏÖØÍøÂç´¹µö¹¥»÷ºÍÉí·Ý͵ÇÔ·çÏÕ¡£¡£¡£LynxÍÅ»ïÓÚ12ÔÂ26ÈÕÔÚ°µÍøÐ¹Â¶ÍøÕ¾°ä²¼²¼¸æ£¬£¬£¬Ðû³ÆÒÑ»ñÈ¡¸Ã¹«Ë¾¼°¿Í»§µÄÃô¸ÐÐÅÏ¢£¬£¬£¬²¢Ç¿µ÷¡°¼¤Àø¶Ô»°½â¾öÎÊÌâ¶ø·Ç»ìÂÒ·ÛË顱¡£¡£¡£ÎªÖ¤Ã÷¹¥»÷ÕæÊµÐÔ£¬£¬£¬¸ÃÍÅ»ï°ä²¼ÁËÔ̺¬È«Ãû¡¢Éç»á°²È«ºÅÂë¡¢ÎïÀíµØÖ·¡¢ÅäżҽÁƱ£ÏÕºÍ̸¡¢·þÎñ·¢Æ±¡¢Ð¡ÎÒËùµÃ˰É걨Êý¾Ý¡¢¹ú˰¾Öµç×ÓÉ걨ÊðÃûÊÚȨ±í¸ñ¼°¹«Ë¾ÄÚ²¿ÐꝵĽØÍ¼¡£¡£¡£ÈôÊý¾ÝÊôʵ£¬£¬£¬¹¥»÷Õß¿ÉÀûÓÃÕâЩ¾ßÌåСÎÒÐÅÏ¢Ö´Ðо«×¼Ú¿Æ£¬£¬£¬ÀýÈç¼ÙÒâ˰Îñ»ú¹¹»òÒøÐУ¬£¬£¬ÓÕµ¼Êܺ¦ÕßתÕË»òй¶¸ü¶àÃô¸ÐÐÅÏ¢¡£¡£¡£
https://cybernews.com/security/lynx-ransomware-csa-tax-breach/


¾©¹«Íø°²±¸11010802024551ºÅ