Boyd GamingÔâÍøÂç¹¥»÷ÖÂÔ±¹¤Êý¾Ýй¶
Ðû²¼Ê±¼ä 2025-09-251. Boyd GamingÔâÍøÂç¹¥»÷ÖÂÔ±¹¤Êý¾Ýй¶
9ÔÂ23ÈÕ£¬£¬£¬£¬ÃÀ¹úÉÏÊв©²ÊÓéÀÖ¹«Ë¾Boyd Gaming Corporation¿ËÈÕÅû¶ÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬ÍþвÐÐΪÕßÈëÇÖÆäϵͳ²¢ÇÔÈ¡Á˰üÀ¨Ô±¹¤ÐÅÏ¢¼°ÉÙÊýÆäËûСÎÒ˽¼ÒÊý¾ÝµÄÄÚÈÝ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾×ܲ¿Î»ÓÚÄÚ»ª´ïÖÝ£¬£¬£¬£¬ÔÚÈ«ÃÀÊ®¸öÖÝÔËÓª28´¦²©²Ê×ʲú£¬£¬£¬£¬²¢ÖÎÀí¼ÓÖݱ±²¿Ò»¼Ò²¿Âä¶Ä³¡£¡£¡£¡£¡£¡£¬£¬£¬£¬ÓµÓÐÁè¼Ý16,000ÃûÔ±¹¤£¬£¬£¬£¬2024ÄêÓªÊÕ´ï39ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»µÄ8-KÎļþ£¬£¬£¬£¬Boyd GamingÔÚ¹¥»÷±¬·¢ºóÓëÍâ²¿ÍøÂçÇ徲ר¼ÒÏàÖúÓ¦¶Ô£¬£¬£¬£¬²¢Í¨ÖªÁËÖ´·¨²¿·Ö¡£¡£¡£¡£¡£¡£¹«Ë¾È·ÈÏ£¬£¬£¬£¬Î´¾ÊÚȨµÄµÚÈý·½´ÓÆäITϵͳÖÐɾ³ýÁËÌØ¶¨Ãü¾Ý£¬£¬£¬£¬Éæ¼°Ô±¹¤¼°ÉÙÊýÆäËûСÎÒ˽¼Ò¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¹«Ë¾ÕýÖðÒ»ÖÂÐÅÊÜÓ°ÏìСÎÒ˽¼Ò£¬£¬£¬£¬²¢½«Æ¾Ö¤ÒªÇóÏòÏà¹Øî¿Ïµ»ú¹¹¼°Õþ¸®²¿·Ö±¨¸æÊÂÎñϸ½Ú¡£¡£¡£¡£¡£¡£Ö»¹Ü±¬·¢Êý¾Ýй¶£¬£¬£¬£¬Boyd GamingÇ¿µ÷ÆäÔËӪδÊÜ×ÌÈÅ£¬£¬£¬£¬Ô¤¼ÆÊÂÎñ²»»á¶Ô²ÆÎñ״̬±¬·¢ÖØ´óµ¹ÔËÓ°Ïì¡£¡£¡£¡£¡£¡£¹«Ë¾ÒѹºÖÃÍøÂçÇå¾²°ü¹Ü£¬£¬£¬£¬Ïà¹ØÓöÈÔ¤¼Æ¿ÉÓɰü¹ÜÁýÕÖ¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯»òÆäËûÍþвÐÐΪÕßÐû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/boyd-gaming-discloses-data-breach-after-suffering-a-cyberattack/
2. CISA½«Google ChromiumÎó²îÌí¼Óµ½ÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖÐ
9ÔÂ23ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Google ChromiumÎó²îCVE-2025-10585ÁÐÈëÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼¡£¡£¡£¡£¡£¡£¸ÃÎó²îÊÇV8 JavaScriptºÍWebAssemblyÒýÇæÖеÄÀàÐÍ»ìÏýÎÊÌ⣬£¬£¬£¬µ±Èí¼þÎó½«ÄÚ´æÊ¶±ðΪ¹ýʧÀàÐ͹¤¾ßʱ£¬£¬£¬£¬¹¥»÷Õ߿ɽè´ËÆÆËðÄÚ´æ¡¢µ¼Ö³ÌÐòÍ߽⻣»£»òÖ´ÐжñÒâ´úÂë¡£¡£¡£¡£¡£¡£´ËÀàÎó²îÔÚC/C++±àдµÄä¯ÀÀÆ÷Ó¦ÓÃÖÐÓÈΪ³£¼û£¬£¬£¬£¬ÒòÄÚ´æÇå¾²ÐÔ½ÏÈõÒ×±»Ê¹Óᣡ£¡£¡£¡£¡£¹È¸èÓÚ2025Äê9ÔÂÖÐÑ®Ðû²¼Çå¾²¸üÐÂÐÞ¸´Á˰üÀ¨CVE-2025-10585ÔÚÄÚµÄËĸöChromeÎó²î£¬£¬£¬£¬²¢È·ÈϸÃÎó²îÒÑÔÚÒ°ÍⱻʹÓᣡ£¡£¡£¡£¡£¹È¸èÍþвÆÊÎöС×飨TAG£©ÓÚ9ÔÂ16ÈÕ·¢Ã÷¸ÃÎó²î£¬£¬£¬£¬ÏÖÔÚÕýÊÓ²ìÃñ×å¹ú¼ÒÐÐΪÕߺÍÉÌÒµÌØ¹¤Èí¼þ¹©Ó¦É̵Ĺ¥»÷£¬£¬£¬£¬ÍƲâÆäÖÐÒ»ÍþвÐÐΪÕßÒÑʹÓôËÎó²îʵÑé¹¥»÷¡£¡£¡£¡£¡£¡£Æ¾Ö¤¾ßÓÐÔ¼ÊøÁ¦µÄÔËÓªÖ¸ÁBOD£©22-01£¬£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÐèÔÚ2025Äê10ÔÂ14ÈÕǰÍê³ÉÎó²îÐÞ¸´£¬£¬£¬£¬ÒÔ½µµÍÖØ´óΣº¦¡£¡£¡£¡£¡£¡£CISAͬʱ½¨Òé˽ÈË×éÖ¯Éó²éKEVĿ¼²¢ÐÞ¸´×ÔÉí»ù´¡ÉèÊ©ÖеÄÏà¹ØÎó²î¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/182509/security/u-s-cisa-adds-google-chromium-flaw-to-its-known-exploited-vulnerabilities-catalog.html
3. Æû³µ°ü¹Üƽ̨ClaimPixй¶Áè¼Ý500Íò¸öÎļþ
9ÔÂ23ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ô±Jeremiah FowlerÏòWebsite Planet±¨¸æ·¢Ã÷Ò»¸öδ¼ÓÃÜÇÒÎÞÃÜÂë±£»£»£»¤µÄÊý¾Ý¿â£¬£¬£¬£¬¸ÃÊý¾Ý¿â°üÀ¨510Íò¸öÎļþ¡¢×ÜÈÝÁ¿´ï10TB£¬£¬£¬£¬Éæ¼°ÊÚȨÊé¡¢³µÁ¾¹ÒºÅ¡¢Î¬ÐÞ·¢Æ±¼°´øÓÐÇåÎú³µÅƺÍVINÂëµÄÊÜËð³µÁ¾Í¼ÏñµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¾ÆÊÎö£¬£¬£¬£¬ÕâЩ¼Í¼ÊôÓÚÒÁÀûŵÒÁÖÝÆû³µ°ü¹ÜË÷ÅâÆ½Ì¨ClaimPix¡£¡£¡£¡£¡£¡£Êý¾Ý¿âÖаüÀ¨ÐÕÃû¡¢µØµã¡¢µç»°¡¢µç×ÓÓʼþµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©£¬£¬£¬£¬ÒÔ¼°½ü1.6Íò·Ýµç×ÓÊðÃûÊÚȨίÍÐÊ飬£¬£¬£¬ÆäÖаüÀ¨ÊðÃûÕßIPµØµã¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬»¹°üÀ¨Èí¼þÔÊÐíÐÒéµÈÄÚ²¿Îļþ£¬£¬£¬£¬Ì»Â¶Á˲»Ó¦¹ûÕæµÄÌõ¿îºÍÓöÈÐÅÏ¢¡£¡£¡£¡£¡£¡£Fowlerͨ¹ýÈÏÕæÈÎÅû¶֪ͨClaimPixºó£¬£¬£¬£¬¸ÃÊý¾Ý¿â±»Ñ¸ËÙÏÞÖÆ»á¼û¡£¡£¡£¡£¡£¡£ClaimPix»ØÓ¦³ÆÒѸüÐÂÕþ²ßºÍ´úÂëÐÞ¸´Îó²î¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬Êý¾Ý¿â¹éÊô¼°Ì»Â¶Ê±³¤ÈÔ´æÒÉ£¬£¬£¬£¬ÐèÄÚ²¿Éó¼ÆÈ·ÈÏÊÇ·ñÓÐÆäËû»á¼û»ò¿ÉÒɻ¡£¡£¡£¡£¡£¡£½¨Òé°ü¹ÜÐÐÒµÆóÒµ¼ÓÃÜËùÓÐÃô¸ÐÊý¾Ý£¬£¬£¬£¬ÊµÑé¶àÒòËØÈÏÖ¤ºÍ»ùÓÚ½ÇÉ«µÄ»á¼û¿ØÖÆ£¬£¬£¬£¬°´ÆÚÉóºËÔÆ´æ´¢ÏµÍ³²¢¾ÙÐÐÎó²î²âÊÔ¡£¡£¡£¡£¡£¡£Ð¡ÎÒ˽¼ÒÈôÏÓÒÉÐÅϢй¶£¬£¬£¬£¬Ó¦¼à¿ØÐÅÓñ¨¸æ¡¢Ê¹ÓÃÐÅÓö³½áЧÀÍ£¬£¬£¬£¬²¢Í¨¹ýFTCµÄIdentityTheft.gov¾Ù±¨¡£¡£¡£¡£¡£¡£
https://www.websiteplanet.com/news/claimpix-breach-report/
4. Motility Software SolutionsÊý¾Ýй¶£¬£¬£¬£¬Ó°Ïì76ÍòÏûºÄÕß
9ÔÂ24ÈÕ£¬£¬£¬£¬×¨ÓÃÆû³µ¾ÏúÉÌÖÎÀíÈí¼þ¹©Ó¦ÉÌMotility Software Solutions 8ÔÂ19ÈÕÔÚÆäÍøÂçÖз¢Ã÷¿ÉÒɻ£¬£¬£¬£¬Ñ¸ËÙÏÂÏßÊÜÓ°ÏìЧÀÍÆ÷ÒÔ¿ØÖÆÊÂÎñ£¬£¬£¬£¬²¢ÁªºÏÍøÂçÇ徲ר¼ÒÕö¿ªÊӲ졣¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñµ¼ÖÂÔ¼76ÍòÃûÃÀ¹úÏûºÄÕßµÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©±»Î´¾ÊÚȨ»á¼û£¬£¬£¬£¬Ð¹Â¶Êý¾Ý°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢¼ÝÕÕºÅÂë¼°Éç»áÇå¾²ºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£MotilityÇ¿µ÷£¬£¬£¬£¬Êý¾Ýй¶½öÏÞÓÚÆä×ÔÉíÍøÂ磬£¬£¬£¬Î´²¨¼°Ä¸¹«Ë¾À×ŵ×È£¨Reynolds and Reynolds£©µÄϵͳ»òÍøÂç¡£¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬MotilityÁ¬Ã¦½ÓÄɶàÏîµ÷½â²½·¥£º¸ôÀëÊÜÓ°ÏìЧÀÍÆ÷¡¢Ô¼ÇëÍâ²¿ÍøÂçÇ徲ר¼ÒÐÖúÊӲ죬£¬£¬£¬²¢Í¨ÖªÖ´·¨²¿·Ö½éÈë¡£¡£¡£¡£¡£¡£ÎªÔöÇ¿Çå¾²·À»¤£¬£¬£¬£¬¹«Ë¾ÊµÑéÁËÌØÊâÇå¾²²½·¥£¬£¬£¬£¬°üÀ¨ÒýÈëй¤¾ß¡¢½¨ÉèÈßÓàµÄµÚÈý·½¼à¿Ø»úÖÆ£¬£¬£¬£¬²¢ÖÜÈ«Éó²éÏÖÓÐÍøÂçÇ徲ʵ¼ù¡£¡£¡£¡£¡£¡£Õë¶ÔÊÜÓ°ÏìÏûºÄÕߣ¬£¬£¬£¬MotilityÕýÖðÒ»ÖÂÐŲ¢ÌṩÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬½¨ÒéÓû§°´ÆÚºË²éÐÅÓñ¨¸æÒì³£»£»£»î¶¯£¬£¬£¬£¬Ð¡ÐÄʹÓÃй¶ÐÅϢʵÑéµÄÍøÂç´¹ÂÚ»òÚ²ÆÐÐΪ¡£¡£¡£¡£¡£¡£Èô·¢Ã÷ÐÅÏ¢±»µÁÓ㬣¬£¬£¬ÏûºÄÕß¿ÉÏòÖ÷ÒªÐÅÓûú¹¹ÉêÇëڲƾ¯±¨»òÐÅÓö³½áÒÔÏÞÖÆËðʧ¡£¡£¡£¡£¡£¡£
https://www.claimdepot.com/data-breach/motility-2025
5. Libraesvaµç×ÓÓʼþÇå¾²Íø¹ØÎó²îÔâ¹ú¼ÒºÚ¿ÍʹÓÃ
9ÔÂ24ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²³§ÉÌLibraesvaÒÑÐÞ¸´Æäµç×ÓÓʼþÇ徲ƽ̨ÖÐÒ»¸ö±»Ò°ÍâʹÓõĸßΣÎó²îCVE-2025-59689¡£¡£¡£¡£¡£¡£¸ÃÎó²îCVSSÆÀ·ÖΪ6.1£¬£¬£¬£¬ÊôÓÚÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓðüÀ¨¶ñÒâѹËõ¸½¼þµÄµç×ÓÓʼþ´¥·¢Îó²î£¬£¬£¬£¬ÔÚ·ÇÌØÈ¨Óû§È¨ÏÞÏÂÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£Îó²îȪԴÔÚÓÚÆ½Ì¨´¦Öóͷ£Ìض¨Ñ¹ËõÎļþÃûÌÃʱ±£´æÊäÈëÕûÀíȱÏÝ£¬£¬£¬£¬µ¼ÖÂÓÐÓÃÔØºÉÈÆ¹ýÇå¾²»úÖÆÖ´ÐÐshellÏÂÁî¡£¡£¡£¡£¡£¡£´Ë´ÎÎó²îÓ°ÏìLibraesva ESG 4.5ÖÁ5.5°æ±¾£¬£¬£¬£¬µ«¼øÓÚ4.x°æ±¾ÒÑÍ£²ú£¬£¬£¬£¬³§É̽öÕë¶Ô5.x°æ±¾Ðû²¼²¹¶¡¡£¡£¡£¡£¡£¡£¹«Ë¾ÒÑÏòÔÆ¶ËºÍÍâµØ°²ÅÅÇéÐÎÍÆËÍÐÞ¸´³ÌÐò£¬£¬£¬£¬ÏÖÔÚËùÓÐ×°±¸¾ùÔËÐÐÐÞ¸´ºóµÄÈí¼þ¡£¡£¡£¡£¡£¡£¹ØÓÚÈÔÔËÐÐÍâµØESG 4.x°æ±¾µÄ¿Í»§£¬£¬£¬£¬LibraesvaÇ¿ÁÒ½¨ÒéÊÖ¶¯Éý¼¶ÖÁÒÑÐÞ²¹µÄ5.x°æ±¾£¬£¬£¬£¬ÒÔ¹æ±ÜDZÔÚΣº¦¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬¸ÃÎó²îÒѱ»ÏÖʵʹÓᣡ£¡£¡£¡£¡£LibraesvaÈ·Èϱ¬·¢Ò»ÆðÀÄÓÃÊÂÎñ£¬£¬£¬£¬ÍþвÐÐΪÕß±»ËÝÔ´ÖÁÍâ¹ú³ðÊÓ¹ú¼ÒʵÌå¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÔٴξ¯Ê¾ÆóÒµÐèÖØÊÓ¹©Ó¦Á´Çå¾²£¬£¬£¬£¬ÊµÊ±¸üÐÂϵͳ²¹¶¡£¡£¡£¡£¡£¡£¬£¬£¬£¬²¢½¨Éè¶àÌõÀí·ÀÓù»úÖÆÒÔÓ¦¶Ô¹ú¼ÒÖ§³ÖµÄ¸ß¼¶ÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/libraesva-email-security-gateway-vulnerability-exploited-by-nation-state-hackers/
6. µÂ¹úFAIº½¿Õ¼¯ÍÅÔâJ GroupÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬3TBÃô¸ÐÊý¾Ýй¶
9ÔÂ24ÈÕ£¬£¬£¬£¬µÂ¹ú°ü»úÔËÓªÉÌFAIº½¿Õ¼¯ÍÅ¿ËÈÕÔâJ GroupÀÕË÷Èí¼þÍÅ»ïÍøÂç¹¥»÷£¬£¬£¬£¬¹¥»÷ÕßÐû³ÆÒÑÇÔÈ¡½ü3TBÃô¸ÐÊý¾Ý£¬£¬£¬£¬º¸Ç¹«Ë¾ÏêϸÐÅÏ¢¡¢Ò½ÁÆÊý¾Ý¼°Ô±¹¤Òþ˽Îļþ¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïͨ¹ý°µÍø²©¿Í¹ûÕæÊܺ¦ÕßÐÅÏ¢²¢Íþвй¶Êý¾Ý£¬£¬£¬£¬ÏÖÔÚFAIÉÐδ»ØÓ¦¡£¡£¡£¡£¡£¡£¾ÝÑо¿ÍŶӯÊÎö£¬£¬£¬£¬Ð¹Â¶Êý¾Ý°üÀ¨»¼ÕßÁÙ´²ÐÅÏ¢¡¢Ô±¹¤ÅàѵÎļþ¡¢Éó¼ÆÎĵµ¡¢·É»ú¹æ¸ñÎļþ¡¢¼òÀú¼°»¤ÕÕ¸´Ó¡¼þµÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£¡£Ò½ÁÆÊý¾ÝÒò²»¿É»Ö¸´ÌØÕ÷£¬£¬£¬£¬Ò»µ©Ð¹Â¶½«µ¼Ö»¼Õß²¡Ê·ÓÀÊÀ̻¶£¬£¬£¬£¬ÔöÌíÉí·Ý͵ÇÔ¡¢Ú²Æ¼°Éç»á¹¤³Ì¹¥»÷Σº¦¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÄÜʹÓÃй¶ÐÅϢð³äFAI»ò¹ØÁªÐ§ÀÍ£¬£¬£¬£¬Õë¶Ô¸ß¾»Öµ¿Í»§ÊµÑ龫׼թƣ¬£¬£¬£¬Í¬Ê±ÄÚ²¿Éó¼ÆÎļþ¿É̻¶¹«Ë¾ÔËÓªÈõµã£¬£¬£¬£¬ÎªºóÐø¹¥»÷ÌṩĿµÄ¡£¡£¡£¡£¡£¡£J Group×÷Ϊ2025ÄêÍ·ÐÂÐËÍøÂç·¸·¨¼¯ÍÅ£¬£¬£¬£¬ÒÔÊý¾Ý¾¼ÍģʽIJÀû£¬£¬£¬£¬ÈôÊê½ð̸ÅÐʧ°Ü£¬£¬£¬£¬½«¹ûÕæ³öÊÛÊý¾Ý¶ø·Ç´¿´âй¶¡£¡£¡£¡£¡£¡£¸Ã×é֯ĿµÄ¹æÄ£ÆÕ±é£¬£¬£¬£¬´ÓÓÎÀÖÔ°µ½º½¿ÕÒµ¾ùÓÐÉæÁÔ£¬£¬£¬£¬Òѹ¥»÷ÖÁÉÙ32¸ö×éÖ¯£¬£¬£¬£¬³ÉΪÀÕË÷Èí¼þÁìÓò»îÔ¾ÐÂÊÆÁ¦¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/fai-aviation-group-data-breach-claims/


¾©¹«Íø°²±¸11010802024551ºÅ