°Í¶ûµÄĦÊй«Á¢Ñ§Ð£ÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬Ê¦ÉúÐÅϢй¶
Ðû²¼Ê±¼ä 2025-04-231. °Í¶ûµÄĦÊй«Á¢Ñ§Ð£ÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬Ê¦ÉúÐÅϢй¶
4ÔÂ23ÈÕ£¬£¬£¬£¬£¬½ñÄê2Ô£¬£¬£¬£¬£¬°Í¶ûµÄĦÊй«Á¢Ñ§Ð£ÏµÍ³ÔâÓöÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬ÊýǧÃûѧÉú¡¢Î÷ϯºÍÖÎÀíÖ°Ô±ÐÅÏ¢±»µÁ¡£¡£¡£Öܶþ£¬£¬£¬£¬£¬Ñ§Ð£¹ÙÔ±Ðû²¼Î¥¹æÍ¨Öª£¬£¬£¬£¬£¬ÖÒÑÔ2ÔÂ13ÈÕ±¬·¢µÄÍøÂçÊÂÎñ̻¶ÁËijЩITϵͳ¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬Ò»Ð©Îļþ¿ÉÄÜÒѱ»·¸·¨·Ö×Óй¶£¬£¬£¬£¬£¬Éæ¼°ÏÖÈκÍǰÈιÍÔ±¡¢×ÔÔ¸ÕߺͳаüÉÌ£¬£¬£¬£¬£¬ÒÔ¼°²»µ½1.5%µÄѧÉú¡£¡£¡£°Í¶ûµÄĦÊй«Á¢Ñ§Ð£¹ÙԱȷÈÏ£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñΪÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬µ«Î´Ö§¸¶Êê½ð¡£¡£¡£Ñ§Ð£Î´Í¸Â¶ÏêϸÊÜÓ°ÏìÈËÊý£¬£¬£¬£¬£¬µ«Ö¸³öÊÜÓ°ÏìѧÉúÁè¼Ý1150ÈË¡£¡£¡£ºÚ¿Í¿ÉÄÜ»ñÈ¡ÁËÔ±¹¤Éç±£ºÅÂë¡¢¼ÝÕÕºÅÂë»ò»¤ÕÕºÅÂ룬£¬£¬£¬£¬ÒÔ¼°Ñ§Éúͨ»°¼Í¼¡¢È±¿Î¼Í¼»òÉúÓý״̬µÈÎļþ¡£¡£¡£Ñ§Ð£ÏµÍ³Ê×ϯִÐйÙÉ£ÌØÀûÈû˹×Ô¼ºÒ²ÊÜÓ°Ï죬£¬£¬£¬£¬ËýÌåÏÖѧУ55%µÄÔ±¹¤Êܵ½Ó°Ïì¡£¡£¡£ÉÐÓб¨µÀ³Æ£¬£¬£¬£¬£¬·¢Ã÷ÁËÒ»·âÀ´×ÔCloakÀÕË÷Èí¼þÍÅ»ïµÄÀÕË÷ÐÅ¡£¡£¡£Ñ§Ð£¹ÙÔ±³Æ£¬£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶ÊÂÎñÓ°ÏìÁËÔ¼2.5ÍòÈË£¬£¬£¬£¬£¬°üÀ¨7000¶àÃûÏÖÈÎÎ÷ϯÒÔ¼°×Ô2010ÄêÒÔÀ´ÔÚ¸ÃÑ§ÇøÊÂÇéµÄËùÓÐÈË¡£¡£¡£Ö´·¨²¿·ÖÒѽӵ½Í¨Öª£¬£¬£¬£¬£¬²¢Ô¼ÇëÍøÂçÇå¾²¹«Ë¾ÐÖú»Ö¸´¡£¡£¡£Ñ§Ð£ÒÑ×îÏÈÏòÊÜÓ°ÏìÓû§·¢³ö֪ͨ£¬£¬£¬£¬£¬ÌṩÁ½ÄêÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬²¢ÉèÁ¢ºô½ÐÖÐÐĽâ´ðÎÊÌâ¡£¡£¡£
https://therecord.media/baltimore-public-schools-data-breach-ransomware
2. Âêɯ°Ù»õÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂÖ÷¹Ë¶©µ¥ÑÓ³Ù
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬Ó¢¹ú¿ç¹úÁãÊÛ¾ÞÍ·Âêɯ°Ù»õ£¨M&S£©¿ËÈÕÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬¶ÔÆäÔËÓªÔì³ÉÒ»¶¨×ÌÈÅ£¬£¬£¬£¬£¬ÓÈÆäÊÇClick and Collect¶©µ¥ÏµÍ³¡£¡£¡£Âêɯ°Ù»õÔÚÈ«ÇòÓµÓÐ1400¶à¼ÒÃŵ꣬£¬£¬£¬£¬Ô±¹¤×ÜÊý´ï6.4ÍòÃû£¬£¬£¬£¬£¬ÒÔÏúÊÛ´ò°ç¡¢Ê³ÎïºÍ¼Ò¾ÓÓÃÆ·µÈ¶àÑù»¯²úÆ·¶øÖøÃû¡£¡£¡£ÔÚÂ×¶ØÖ¤È¯ÉúÒâËùÐû²¼µÄÐÂΟåÖУ¬£¬£¬£¬£¬Âêɯ°Ù»õ֤ʵÁË´Ë´ÎÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬²¢ÌåÏÖÕýÔÚÓëÍøÂçÇ徲ר¼ÒϸÃÜÏàÖú£¬£¬£¬£¬£¬ÒÔÖÎÀíÏ¢Õù¾öÕâÒ»½ôÆÈÇéÐΡ£¡£¡£¹«Ë¾ÒѽÓÄÉС¹æÄ£ÔÝʱµ÷½â²½·¥±£»£»£»£»¤Ö÷¹ËºÍÓªÒµÇå¾²£¬£¬£¬£¬£¬²¢¶Ô´ËÔì³ÉµÄδ±ãÉî±íǸÒâ¡£¡£¡£Ö»¹ÜÃæÁÙÌôÕ½£¬£¬£¬£¬£¬Âêɯ°Ù»õµÄÃÅµê¡¢ÍøÕ¾ºÍÓ¦ÓóÌÐòÈÔÔÚÕý³£ÔËÓª¡£¡£¡£¹«Ë¾ÒÑÔ¼ÇëÍâ²¿ÍøÂçÇ徲ר¼ÒÐÖúÊӲ죬£¬£¬£¬£¬²¢½ÓÄɲ½·¥½øÒ»²½±£»£»£»£»¤ÆäÍøÂ磬£¬£¬£¬£¬È·±£¿£¿£¿£¿Í»§Ð§ÀͲ»ÊÜÓ°Ïì¡£¡£¡£Âêɯ°Ù»õÒÑ֪ͨÊý¾Ý±£»£»£»£»¤¼àÊÓ»ú¹¹ºÍ¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¬£¬£¬£¬£¬µ«Î´Ìá¹©ÍøÂçÊÂÎñµÄÏêϸϸ½Ú¡£¡£¡£Ö»¹ÜÏÖÔÚÉÐÎÞÀÕË÷Èí¼þÍÅ»ï»òÆäËûÍþвÐÐΪÕßÉù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬µ«Èô´Ë´Î¹¥»÷Éæ¼°ÀÕË÷Èí¼þ£¬£¬£¬£¬£¬Êý¾ÝºÜ¿ÉÄÜÒѱ»ÍµÈ¡£¬£¬£¬£¬£¬²¢¿ÉÄܱ»ÓÃ×÷½øÒ»²½Ê©Ñ¹¹«Ë¾Ö§¸¶ÀÕË÷½ðµÄ³ïÂë¡£¡£¡£Âêɯ°Ù»õÒÑÏòÊÜÓ°Ïì¿Í»§ÖÂǸ£¬£¬£¬£¬£¬²¢ÔÊÐí¾¡¿ì»Ö¸´Õý³£Ð§ÀÍ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/marks-and-spencer-confirms-a-cyberattack-as-customers-face-delayed-orders/
3. SK TelecomÔâ¶ñÒâÈí¼þ¹¥»÷£¬£¬£¬£¬£¬¿Í»§USIMÐÅÏ¢ÃæÁÙΣº¦
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬º«¹ú×î´óÒÆ¶¯ÔËÓªÉÌSK Telecom¿ËÈÕÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬ÍþвÐÐΪÕßͨ¹ý¶ñÒâÈí¼þѬȾ»ñÈ¡Á˿ͻ§Ãô¸ÐµÄUSIMÏà¹ØÐÅÏ¢¡£¡£¡£´Ë´Î¹¥»÷±¬·¢ÔÚÍâµØÊ±¼ä2025Äê4ÔÂ19ÈÕÐÇÆÚÁùÍíÉÏ11µã£¬£¬£¬£¬£¬ÕýÖµÖÜÄ©ÇÒ´ó¶¼×éÖ¯ÈËÊÖȱ·¦Ö®¼Ê¡£¡£¡£SK TelecomѸËÙÏìÓ¦£¬£¬£¬£¬£¬ÔÚ·¢Ã÷¶ñÒâÈí¼þºóÁ¬Ã¦É¾³ý²¢¸ôÀëÁËÒÉËÆ±»ºÚ¿ÍÈëÇÖµÄ×°±¸¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬ÉÐδȷÈÏй¶ÐÅÏ¢±»ÀÄÓõݸÀý¡£¡£¡£´Ë´ÎÊÂÎñÒýÆðÁ˺«¹ú»¥ÁªÍøÇå¾²¾Ö£¨KISA£©ºÍ¸Ã¹úСÎÒ˽¼ÒÐÅÏ¢±£»£»£»£»¤Î¯Ô±»áµÄ¸ß¶È¹Ø×¢£¬£¬£¬£¬£¬ÊÓ²ìÕýÔÚ¾ÙÐÐÖУ¬£¬£¬£¬£¬ÈëÇÖµÄÏêϸԵ¹ÊÔÓÉ¡¢¹æÄ£»£»£»£»ò¹æÄ£ÉÐδȷ¶¨¡£¡£¡£USIMÊý¾Ý°üÀ¨¹ú¼ÊÒÆ¶¯Óû§Ê¶±ðÂë¡¢ÒÆ¶¯Õ¾ISDNºÅÂëµÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬ÕâЩÊý¾ÝÒ»µ©Ð¹Â¶£¬£¬£¬£¬£¬¿ÉÄܱ»ÓÃÓÚÓÐÕë¶ÔÐԵļàÊÓ¡¢¸ú×ÙºÍSIM¿¨½»Á÷¹¥»÷¡£¡£¡£ÎªÓ¦¶Ô´Ë´Î¹¥»÷£¬£¬£¬£¬£¬SK TelecomÒÑÔöÇ¿¶ÔUSIM½»Á÷ºÍÒì³£Éí·ÝÑé֤ʵÑéµÄ×èÖ¹£¬£¬£¬£¬£¬²¢½«Á¬Ã¦ÔÝÍ£Óë¿ÉÒɻÏà¹ØµÄÕË»§Ð§ÀÍ¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬½¨ÒéÓû§Í¨¹ýÖ¸¶¨ÃÅ»§×¢²áUSIM±£»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬£¬ÒÔ±ÜÃâÊÖ»úºÅÂë±»²»·¨ÒÆÖ²µ½ÁíÒ»ÕÅSIM¿¨ÉÏ¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ÉÐÎÞÍþвÐÐΪÕ߶Դ˴ι¥»÷ÈÏÕæ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/sk-telecom-warns-customer-usim-data-exposed-in-malware-attack/
4. Active! MailÁãÈÕÎó²îÔâÆð¾¢Ê¹Ó㬣¬£¬£¬£¬ÈÕ±¾¶à»ú¹¹ÊÜÓ°Ïì
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬Active! Mail±£´æÑÏÖØÁãÈÕÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2025-42599£¬£¬£¬£¬£¬CVSS v3ÆÀ·Ö9.8£©£¬£¬£¬£¬£¬Õý±»Æð¾¢Ê¹ÓÃÓÚÕë¶ÔÈÕ±¾´óÐÍ×éÖ¯µÄ¹¥»÷¡£¡£¡£¸ÃÎó²îÓ°ÏìËùÓа汾Active!£¬£¬£¬£¬£¬°üÀ¨ËùÓÐÊÜÖ§³Ö²Ù×÷ϵͳƽ̨Éϵġ°BuildInfo£º6.60.05008561¡±£¬£¬£¬£¬£¬ÈôÔ¶³ÌµÚÈý·½·¢ËͶñÒâÇëÇ󣬣¬£¬£¬£¬Ôò¿ÉÄÜÖ´ÐÐí§Òâ´úÂë»ò´¥·¢¾Ü¾øÐ§ÀÍÌõ¼þ¡£¡£¡£Active!mail×÷Ϊ»ùÓÚÍøÂçµÄµç×ÓÓʼþ¿Í»§¶Ë£¬£¬£¬£¬£¬ËäÔÚÈ«Çò¹æÄ£ÄÚ²»ÈçGmail»òOutlookÆÕ±éʹÓ㬣¬£¬£¬£¬µ«ÔÚÈÕ±¾´óÐÍÆóÒµ¡¢´óѧ¡¢Õþ¸®»ú¹¹ºÍÒøÐеÄÈÕÓïÇéÐÎÖг£±»ÓÃ×÷Ⱥ¼þ×é¼þ£¬£¬£¬£¬£¬Òѱ»Áè¼Ý2,250¸ö×éÖ¯½ÓÄÉ£¬£¬£¬£¬£¬ÓµÓÐÁè¼Ý11,000,000¸öÕÊ»§£¬£¬£¬£¬£¬ÊǸùúÉÌÒµÍøÂçÓʼþÊг¡µÄÖ÷Òª¼ÓÈëÕß¡£¡£¡£ÈÕ±¾CERTÒÑÈ·ÈϸÃÎó²î´¦ÓÚ»îԾʹÓÃ״̬£¬£¬£¬£¬£¬²¢±Þ²ßËùÓÐÓû§¾¡¿ì¸üÐÂÖÁActive!Mail 6 BuildInfo: 6.60.06008562¡£¡£¡£ÈÕ±¾ÍøÂçÍйܺÍITЧÀÍÌṩÉÌKagoya Japan¼°WADAX¾ù±¨¸æÁËÒòÊÔͼʹÓøÃÎó²îÔì³ÉµÄЧÀÍÖÐÖ¹£¬£¬£¬£¬£¬²¢ÒÑÔÝʱ×èÖ¹Active!ÓʼþЧÀÍ¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬MacnicaÇå¾²Ñо¿Ô±Ö¸³ö£¬£¬£¬£¬£¬ÖÁÉÙÓÐ227̨̻¶ÔÚ»¥ÁªÍøÉϵÄActive!ЧÀÍÆ÷¿ÉÄÜÊܵ½¹¥»÷£¬£¬£¬£¬£¬ÆäÖÐ63̨ÔÚ´óѧʹÓᣡ£¡£ÈÕ±¾CERTΪÎÞ·¨Á¬Ã¦Ó¦ÓÃÇå¾²¸üеÄÓû§Ìá³öÁËÏêϸ»º½â²½·¥£¬£¬£¬£¬£¬ÒÔÓ¦¶Ô´ËÎó²î´øÀ´µÄÍþв¡£¡£¡£
https://www.bleepingcomputer.com/news/security/active-mail-rce-flaw-exploited-in-attacks-on-japanese-orgs/
5. ÀÕË÷Èí¼þÖÂÁ½Ò½ÁƱ£½¡×éÖ¯Êý¾Ýй¶£¬£¬£¬£¬£¬³¬24ÍòÈËÊÜÓ°Ïì
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬Á½¼ÒÒ½ÁƱ£½¡×éÖ¯Ïà¼ÌÈ·ÈÏÔÚÔâÊÜÀÕË÷Èí¼þ¹¥»÷ºó·ºÆðÊý¾Ýй¶£¬£¬£¬£¬£¬Ó°ÏìÈËÊý¾ùÁè¼Ý10Íò¡£¡£¡£Î»ÓÚÍþ˹¿µÐÇÖÝÃܶûÎÖ»ùµÄ±´¶û¾È»¤³µ¹«Ë¾£¬£¬£¬£¬£¬ÔÚ2025Äê2ÔÂ13ÈÕ¼ì²âµ½ÍøÂçÈëÇÖ£¬£¬£¬£¬£¬ºÚ¿Í»ñÈ¡Á˰üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¼°¼ÝÕÕºÅÂëµÈÃô¸ÐÐÅÏ¢µÄÎļþ£¬£¬£¬£¬£¬ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿Êý¾ÝÏÔʾ£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÓ°ÏìÁË114,000ÈË¡£¡£¡£ÃÀ¶ÅɯÀÕË÷Èí¼þ×éÖ¯Ðû³Æ´Ó±´¶û¾È»¤³µÇÔÈ¡ÁËÁè¼Ý200GBµÄÊý¾Ý¡£¡£¡£ÁíÒ»¼ÒÊÜÓ°ÏìµÄÒ½ÁƱ£½¡×éÖ¯ÊÇλÓÚ°¢À°ÍÂíÖݲ®Ã÷º²µÄÑÛ¿ÆÕïËù°¢À°ÍÂíÑÛ¿ÆÐ»á¡£¡£¡£¸ÃÕïËùÓÚ4ÔÂ10ÈÕ͸¶£¬£¬£¬£¬£¬ÏÖÓкÍÒÔǰ»¼ÕßµÄСÎÒ˽¼Ò¼°Êܱ£»£»£»£»¤¿µ½¡ÐÅÏ¢Ô⵽й¶£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢¼ÝÕÕÐÅÏ¢¡¢Éç»áÇå¾²ºÅÂë¡¢Ò½ÁÆÐÅÏ¢ºÍ¿µ½¡°ü¹ÜÐÅÏ¢µÈ¡£¡£¡£¸Ã×éÖ¯ÓÚ1ÔÂ30ÈÕ·¢Ã÷ÍøÂçÎó²î£¬£¬£¬£¬£¬ºÚ¿Í×Ô1ÔÂ22ÈÕÆð¼´¿É»á¼ûÆäϵͳ¡£¡£¡£BianLianÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬¾ÝÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿Êý¾ÝÏÔʾ£¬£¬£¬£¬£¬¸ÃÊÂÎñÓ°ÏìÁËÁè¼Ý131,000ÈË¡£¡£¡£È¥Ä꣬£¬£¬£¬£¬ÃÀ¹ú±¬·¢ÁË700¶àÆðÒ½ÁƱ£½¡Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬Ð¹Â¶µÄ¼Í¼×ÜÊýÁè¼Ý1.8ÒÚÌõ¡£¡£¡£
https://www.securityweek.com/two-healthcare-orgs-hit-by-ransomware-confirm-data-breaches-impacting-over-100000/
6. Elusive CometºÚ¿Í×é֯ʹÓÃZoomʵÑéÉç»á¹¤³Ì¹¥»÷
4ÔÂ22ÈÕ£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬Ò»¸öÃûΪ¡°Elusive Comet¡±µÄºÚ¿Í×éÖ¯Õë¶Ô¼ÓÃÜÇ®±ÒÓû§ÌᳫÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬£¬Í¨¹ýZoomµÄÔ¶³Ì¿ØÖƹ¦Ð§ÓÕÆÓû§ÊÚÓèÆä»á¼ûȨÏÞ¡£¡£¡£¸Ã×é֯ģÄâLazarusºÚ¿Í×éÖ¯ÔÚ15ÒÚÃÀÔªBybit¼ÓÃÜÇ®±Ò͵ÇÔ°¸ÖÐʹÓõÄÊÖÒÕ£¬£¬£¬£¬£¬Ê¹ÓÃÕýµ±ÊÂÇéÁ÷³ÌʵÑé¹¥»÷¡£¡£¡£¹¥»÷Õßͨ¹ýXƽ̨ÉϵĿþÀÜÕË»§»òµç×ÓÓʼþ£¬£¬£¬£¬£¬ÒÔ¡°Åí²©¼ÓÃÜÇ®±Ò¡±²É·ÃÔ¼ÇëΪ»Ï×Ó£¬£¬£¬£¬£¬Ïò¸ß¼ÛֵĿµÄ·¢ËÍCalendlyÁ´½Ó£¬£¬£¬£¬£¬°²ÅÅZoom¾Û»á¡£¡£¡£ÓÉÓÚÔ¼ÇëÁ´½ÓÕæÊµÓÐÓ㬣¬£¬£¬£¬½µµÍÁËÄ¿µÄµÄÏÓÒÉˮƽ¡£¡£¡£ÔÚZoomͨ»°Ê±´ú£¬£¬£¬£¬£¬¹¥»÷ÕßÌᳫÆÁÄ»¹²Ïí»á»°£¬£¬£¬£¬£¬²¢½«ÆäZoomÏÔʾÃû³ÆÖØÃüÃûΪ¡°Zoom¡±£¬£¬£¬£¬£¬Ê¹Êܺ¦ÕßÎóÒÔΪÇëÇóÀ´×ÔÓ¦ÓóÌÐò×Ô¼º£¬£¬£¬£¬£¬´Ó¶øÅú×¼Ô¶³Ì¿ØÖÆÇëÇ󡣡£¡£Ò»µ©»ñµÃ¿ØÖÆÈ¨£¬£¬£¬£¬£¬¹¥»÷Õß±ã¿ÉÇÔÈ¡Ãô¸ÐÊý¾Ý¡¢×°ÖöñÒâÈí¼þ¡¢»á¼ûÎļþ»òÌᳫ¼ÓÃÜÉúÒâ¡£¡£¡£ËûÃÇ»¹¿ÉÄÜѸËÙÖ²ÈëÒþÃØºóÃÅ£¬£¬£¬£¬£¬½¨É賤ÆÚ»á¼ûȨÏÞ£¬£¬£¬£¬£¬ÒÔ±ãÈÕºóʹÓᣡ£¡£Trail of Bits¹«Ë¾Ö¸³ö£¬£¬£¬£¬£¬´Ë´Î¹¥»÷µÄȨÏÞ¶Ô»°¿òÓëÆäËûÎÞº¦µÄZoom֪ͨÏàËÆ£¬£¬£¬£¬£¬Óû§¿ÉÄÜÔÚ²»ÏàʶЧ¹ûµÄÇéÐÎÏÂÊÚÓèÅÌËã»úÍêÈ«¿ØÖÆÈ¨¡£¡£¡£Îª·ÀÓù´ËÀàÍþв£¬£¬£¬£¬£¬¸Ã¹«Ë¾½¨ÒéʵÑéϵͳ¹æÄ£µÄÒþ˽ƫºÃÕ½ÂÔ¿ØÖÆÉèÖÃÎļþ£¬£¬£¬£¬£¬±ÜÃâ¿É»á¼ûÐÔ»á¼û£¬£¬£¬£¬£¬²¢½¨ÒéÇå¾²Òªº¦ÐÍÇéÐκʹ¦Öóͷ£Ãû¹óÊý×Ö×ʲúµÄ×éÖ¯ÍêÈ«ÒÆ³ýZoom¿Í»§¶Ë£¬£¬£¬£¬£¬ÒÔ½µµÍΣº¦¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-abuse-zoom-remote-control-feature-for-crypto-theft-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ