ÐÂÐ͹©Ó¦Á´¹¥»÷GlassWormͨ¹ýVS CodeÊг¡Ñ¬È¾¿ª·¢Õß
Ðû²¼Ê±¼ä 2025-10-221. ÐÂÐ͹©Ó¦Á´¹¥»÷GlassWormͨ¹ýVS CodeÊг¡Ñ¬È¾¿ª·¢Õß
10ÔÂ20ÈÕ£¬£¬£¬£¬£¬Ò»ÖÖÃûΪGlassWormµÄ×ÔÎÒÈö²¥¶ñÒâÈí¼þÕýͨ¹ýOpenVSXºÍMicrosoft Visual StudioÊг¡Ìᳫ¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬ÒÑÔì³ÉÔ¼35,800´Î×°Ö㬣¬£¬£¬£¬³ÉΪÊ×ÀýÕë¶ÔVS CodeµÄÈä³æÊ½¹©Ó¦Á´¹¥»÷°¸Àý¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þʹÓÃÒþÐÎUnicode×Ö·ûÒþ²Ø¶ñÒâ´úÂ룬£¬£¬£¬£¬Í¨¹ýÇÔÈ¡µÄÕË»§ÐÅÏ¢Èö²¥ÖÁ¸ü¶à¿É»á¼ûµÄÀ©Õ¹³ÌÐò£¬£¬£¬£¬£¬²¢½ÓÄÉSolanaÇø¿éÁ´¾ÙÐп¹É¾³ýµÄÏÂÁî¿ØÖÆ£¬£¬£¬£¬£¬Í¬Ê±ÒÔGoogleÈÕÀú×÷Ϊ±¸ÓÃͨµÀ¡£¡£¡£¡£¹¥»÷·¾¶ÏÔʾ£¬£¬£¬£¬£¬GlassWormÔÚ×°Öúó»áÇÔÈ¡GitHub¡¢npm¡¢OpenVSXÕË»§Æ¾Ö¤¼°49¸öÀ©Õ¹µÄ¼ÓÃÜÇ®±ÒÇ®°üÊý¾Ý£¬£¬£¬£¬£¬°²ÅÅSOCKSÊðÀí·ÓɶñÒâÁ÷Á¿£¬£¬£¬£¬£¬²¢×°ÖÃVNC¿Í»§¶ËʵÏÖÒþÐÎÔ¶³Ì»á¼û¡£¡£¡£¡£Æä×îÖÕÓÐÓÃÔØºÉZOMBIͨ¹ýSolanaÇø¿éÁ´ÉúÒâÁ´½Ó·Ö·¢£¬£¬£¬£¬£¬½«ÊÜѬȾϵͳת»¯ÎªÍøÂç·¸·¨½Úµã¡£¡£¡£¡£Ñо¿Ö¸³ö£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹Ê¹ÓÃBitTorrent DHT¾ÙÐÐÊèÉ¢ÏÂÁî·Ö·¢£¬£¬£¬£¬£¬²¢Ö§³ÖÖ±½ÓÅþÁ¬IPµØµãµÄµÚÈý½»¸¶»úÖÆ¡£¡£¡£¡£×èÖ¹±¨¸æÐû²¼£¬£¬£¬£¬£¬OpenVSXÉÏÖÁÉÙ11¸öÀ©Õ¹¼°VS CodeÊг¡1¸öÀ©Õ¹±»Ñ¬È¾¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬OpenVSXÉÏÈÔÓÐÖÁÉÙ4¸öÊÜѬȾÀ©Õ¹¿ÉÏÂÔØ£¬£¬£¬£¬£¬Î¢ÈíÒÑÒÆ³ý¶ñÒâÀ©Õ¹£¬£¬£¬£¬£¬²¿·ÖÐû²¼ÕßÒѸüÐÂÐÞ¸´¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/self-spreading-glassworm-malware-hits-openvsx-vs-code-registries/
2. ºÚ¿ÍÉù³ÆÍâÂôƽ̨GetirÊý¾Ýй¶
10ÔÂ20ÈÕ£¬£¬£¬£¬£¬ÍÁ¶úÆäÍâÂôƽ̨Getir¿ËÈÕÏÝÈëÊý¾Ýй¶ÕùÒé¡£¡£¡£¡£¹¥»÷ÕßÔÚÈÈÃÅÊý¾Ýй¶ÂÛ̳Ðû²¼Ìû×Ó£¬£¬£¬£¬£¬Éù³ÆÒÑ¡°ÈëÇÖ¡±¸Ã¹«Ë¾ÄÚÍøÏµÍ³¡£¡£¡£¡£¾Ý¹¥»÷ÕßÅû¶µÄÑù±¾Êý¾Ý£¬£¬£¬£¬£¬Ð¹Â¶ÄÚÈÝÖ÷ҪΪGetirÄÚ²¿Ó¦ÓóÌÐòÔªÊý¾Ý£¬£¬£¬£¬£¬°üÀ¨Bitbucket´æ´¢¿âURL¡¢Óû§È¨ÏÞ¡¢ÏîÄ¿Ãû³Æ¡¢ÊÂÇéÇøID¼°Ô±¹¤µç×ÓÓʼþµØµã¡£¡£¡£¡£Ñо¿ÍŶӯÊÎöÒÔΪ£¬£¬£¬£¬£¬ÕâЩÊý¾Ý¸ü¿ÉÄÜͨ¹ýµÚÈý·½Ð§ÀÍÌṩÉÌ»ñÈ¡£¡£¡£¡£¬£¬£¬£¬£¬¶ø·ÇÖ±½Ó»á¼û¹«Ë¾½¹µãϵͳ¡£¡£¡£¡£Ö»¹ÜÔÆÔÆ£¬£¬£¬£¬£¬Ð¹Â¶µÄÔªÊý¾ÝÈÔ¿ÉÄÜ´øÀ´¶àÖØÎ£º¦£º¹¥»÷Õß¿ÉʹÓÃÔ±¹¤µç×ÓÓʼþµØµãʵÑéÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬£¬ÓÕµ¼Ô±¹¤Ð¹Â¶Ãô¸ÐÐÅÏ¢»òµã»÷¶ñÒâÁ´½Ó£¬£¬£¬£¬£¬½ø¶ø»ñÈ¡¸üÉî²ãϵͳȨÏÞ£»£»£»£»Ì»Â¶µÄ´æ´¢¿âURLºÍÊÂÇéÇøIDÔò±ãÓÚ¹¥»÷ÕßÔÚÏîÄ¿ÖÐÕ÷²ÉδÊܱ£»£»£»£»¤µÄAPI¶Ëµã»òÉèÖÃÎó²î£¬£¬£¬£¬£¬ÎªºóÐø¹¥»÷£¨ÈçÔ´´úÂëÇÔÈ¡¡¢ÏµÍ³ÈëÇÖ£©´´Á¢Ìõ¼þ¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬GetirÉÐδ¶ÔÊÂÎñ×÷³öÕýʽ»ØÓ¦¡£¡£¡£¡£
https://cybernews.com/security/getir-data-breach-claims/
3. VerisureÔâµÚÈý·½ÏàÖú·½Êý¾Ýй¶£¬£¬£¬£¬£¬Ó°ÏìÈðµä3.5ÍòÓû§
10ÔÂ20ÈÕ£¬£¬£¬£¬£¬ÈðµäÇå¾²¾ÞÍ·Verisure¿ËÈÕÅû¶һÆðÉæ¼°ÆìÏÂAlert Alarm²¿·Ö¿Í»§µÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¸Ã¹«Ë¾Ö¤Êµ£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÆäÈðµäÍⲿ·¢Æ±ÏàÖúͬ°éµÄЧÀÍÆ÷£¬£¬£¬£¬£¬²»·¨»á¼ûÁËÓëAlert Alarm¿Í»§Ïà¹ØµÄÊý¾Ý¡£¡£¡£¡£¾³õ³ÌÐò²é£¬£¬£¬£¬£¬Verisure×ÔÉíÍøÂç¼°½¹µãϵͳδ·¢Ã÷ÈëÇÖºÛ¼££¬£¬£¬£¬£¬ÊÂÎñ½öÓ°ÏìµÚÈý·½¼Æ·Ñϵͳ£¬£¬£¬£¬£¬µ«ÒѲ¨¼°ÈðµäÔ¼3.5ÍòÃûAlert AlarmµÄÏÖÓм°Ç°Óû§¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨¿Í»§È«Ãû¡¢µØµã¡¢µç×ÓÓʼþµØµã¼°Éç»áÇå¾²ºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£VerisureÇ¿µ÷£¬£¬£¬£¬£¬Ö»¹ÜÊý¾Ý»á¼ûȨÏÞ¡°ÓÐÏÞ¡±£¬£¬£¬£¬£¬µ«ÒÑÆô¶¯ÖÜÈ«ÊӲ첢Ó뾯·½¡¢î¿Ïµ²¿·ÖÏàÖú£¬£¬£¬£¬£¬ºóÐø½«ÊµÊ±ÏòÊÜÓ°Ïì¿Í»§×ª´ïÏ£Íû¡£¡£¡£¡£Alert Alarm×÷ΪVerisureÆìÏÂרעסլ¡¢¹«Ô¢¼°Ð¡ÐÍÆóÒµÇ徲ЧÀ͵IJ¿·Ö£¬£¬£¬£¬£¬ÔÚÈðµäÓµÓв»µ½6000Ãû¶©ÔÄÓû§£¬£¬£¬£¬£¬µ«´Ë´ÎÊÂÎñÏÖʵӰÏì¹æÄ£¸ü¹ã£¬£¬£¬£¬£¬Éæ¼°ÀúÊ·Óû§Êý¾Ý¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬VerisureÕýÓëÇå¾²ÕÕÁÏÏàÖúÅŲéÎó²î£¬£¬£¬£¬£¬²¢ºôÓõ¿Í»§Ð¡ÐÄ´¹ÂÚ¹¥»÷¼°Éí·Ýڲơ£¡£¡£¡£
https://cybernews.com/security/verisure-data-breach/
4. AWSÈ«Çò´ó¹æÄ£ÖÐÖ¹ÖÂ¶àÆ½Ì¨Ì±»¾£¬£¬£¬£¬£¬Ð§Àͻָ´Àú³ÌÒ»Á¬Íƽø
10ÔÂ20ÈÕ£¬£¬£¬£¬£¬ÑÇÂíÑ·AWSÔâÓöÈ«ÇòÐÔ´ó¹æÄ£ÖÐÖ¹ÊÂÎñ£¬£¬£¬£¬£¬µ¼ÖÂÊý°ÙÍòÍøÕ¾¼°Ð§ÀÍ̱»¾£¬£¬£¬£¬£¬Ó°Ïì¹æÄ£º¸ÇÃÀ¹ú¡¢Å·Ö޵ȶà¸öµØÇø¡£¡£¡£¡£´Ë´ÎÖÐֹʼÓÚÃÀ¹ú¶«²¿Ê±¼äÆÆÏþ4:30×óÓÒ£¬£¬£¬£¬£¬Ò»Á¬Ô¼45·ÖÖӺ󲿷ÖЧÀÍ×îÏȻָ´£¬£¬£¬£¬£¬µ«ºóÐøÓÖÒòÍøÂç¸ºÔØÆ½ºâÆ÷ÎÊÌâ·ºÆðÖØ¸´£¬£¬£¬£¬£¬×èÖ¹µ±ÈÕÏÂÖç12:06£¬£¬£¬£¬£¬AWSÐû²¼ÒÑͨ¹ýÌØÊ⻺½â²½·¥»Ö¸´ÅþÁ¬ÐÔ¼°API¹¦Ð§£¬£¬£¬£¬£¬µ«ÐÂEC2ʵÀýÆô¶¯ÈÔÊÜÏÞ£¬£¬£¬£¬£¬Ô¤¼ÆÌ«Æ½ÑóÏÄÁîʱÉÏÎç10:00ǰ¸üÐÂÏ£Íû¡£¡£¡£¡£¾ÝAWS¿µ½¡Ò³ÃæÅû¶£¬£¬£¬£¬£¬ÎÊÌâ½¹µãÔ´ÓÚUS-EAST-1ÇøÓòDynamoDB API¶ËµãµÄDNSÆÊÎö¹ÊÕÏ£¬£¬£¬£¬£¬Òý·¢¶à¸öЧÀ͹ýʧÂÊÓëÑÓ³Ù¼¤Ôö£¬£¬£¬£¬£¬°üÀ¨Amazon.com¡¢Prime Video¡¢Perplexity AI¡¢CanvaµÈ½¹µãƽ̨¾ùÊܲ¨¼°¡£¡£¡£¡£ÏêϸÊÜÓ°ÏìЧÀÍÇåµ¥ÏÔʾ£¬£¬£¬£¬£¬³ýÑÇÂíÑ·×ÔÓªÓªÒµÍ⣬£¬£¬£¬£¬Epic GamesÆìÏ¡¶±¤ÀÝÖ®Ò¹¡·£¨µÇ¼¹¦Ð§Ì±»¾£©¡¢Roblox¡¢Hulu¡¢Snapchat¡¢Grammarly¡¢Roblox¼°½ÌÓýƽ̨CanvasµÈ15¸öÖ÷ҪЧÀÍͨ¹ýDowndetectorÈ·ÈÏÖÐÖ¹£¬£¬£¬£¬£¬CanvaÔÚ×´Ì¬Ò³ÃæÃ÷È·Ö¸ÍÉ»¯ÎóÂÊÏÔÖøÉÏÉýÓ°ÏìͼÏñ±à¼µÈ¹¦Ð§£¬£¬£¬£¬£¬Fortnite¡¢PerplexityÒà֤ʵЧÀÍÏÂÏß¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/technology/aws-outage-crashes-amazon-prime-video-fortnite-perplexity-and-more/
5. CISAÈ·ÈÏOracle E-Business Suite SSRFÎó²îÔâʹÓÃ
10ÔÂ21ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«Oracle E-Business SuiteµÄCVE-2025-61884Îó²îÄÉÈëÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬£¬£¬£¬£¬ÒªÇóÁª°î»ú¹¹ÓÚ2025Äê11ÔÂ10ÈÕǰÍê³ÉÐÞ²¹¡£¡£¡£¡£¸ÃÎó²îΪOracle ConfiguratorÔËÐÐʱ×é¼þÖеÄЧÀÍÆ÷¶ËÇëÇóαÔ죨SSRF£©Îó²î£¬£¬£¬£¬£¬OracleÓÚ10ÔÂ11ÈÕÅû¶ʱ½«ÆäÑÏÖØÐÔÆÀ¼¶Îª7.5£¬£¬£¬£¬£¬ÖÒÑÔÆäÒ×±»Ê¹ÓÃÒÔ¡°Î´¾ÊÚȨ»á¼ûÒªº¦Êý¾Ý»òÍêÈ«»á¼ûËùÓÐOracle Configurator¿É»á¼ûÊý¾Ý¡±¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬¸ÃÎó²îÓë7Ô¹¥»÷ÖÐй¶µÄÎó²îÖ±½ÓÏà¹Ø¡£¡£¡£¡£10Ô³õ£¬£¬£¬£¬£¬MandiantÅû¶ClopÀÕË÷Èí¼þÍÅ»ïÒÑÏòÆóÒµ·¢ËÍÀÕË÷Óʼþ£¬£¬£¬£¬£¬Éù³ÆÊ¹ÓÃÁãÈÕÎó²îÇÔÈ¡ÁËOracle EBSÊý¾Ý¡£¡£¡£¡£Oracle»ØÓ¦³Æ£¬£¬£¬£¬£¬ÍþвÐÐΪÕßʹÓÃÁË7ÔÂÒÑÐÞ²¹µÄÎó²î¡£¡£¡£¡£½øÒ»³ÌÐò²éÕ¹ÏÖ£¬£¬£¬£¬£¬Oracle EBS³ÉΪÁ½Æð×ÔÁ¦¹¥»÷µÄÄ¿µÄ£º7Ô¹¥»÷Õë¶Ô¡°/configurator/UiServlet¡±¶ËµãµÄSSRFÎó²î£¨¼´CVE-2025-61884£©£¬£¬£¬£¬£¬¶ø8Ô¹¥»÷ÔòʹÓá°/OA_HTML/SyncServlet¡±¶ËµãµÄÁíÒ»Îó²î£¨CVE-2025-61882£©£¬£¬£¬£¬£¬ºóÕß±»¹éÒòÓÚClopÍŻ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-confirms-hackers-exploited-oracle-e-business-suite-ssrf-flaw/
6. ¶í¹ØÁªÀÕË÷ÍÅ»ïINC RansomÍþв¹ûÕæ¸ß¶û·ò¾ÞÍ·Êý¾Ý
10ÔÂ21ÈÕ£¬£¬£¬£¬£¬Óë¶íÂÞ˹ÓйصÄÀÕË÷Èí¼þÍÅ»ïINC Ransom 10ÔÂ16ÈÕÔÚ°µÍøÐ¹ÃÜÍøÕ¾Ðû³Æ£¬£¬£¬£¬£¬ÒÑÇÔÈ¡¸ß¶û·ò´ò°ç¾ÞÍ·Summit Golf Brands47GBÊý¾Ý£¬£¬£¬£¬£¬²¢Æô¶¯Êý¾Ý¹ûÕæµ¹¼ÆÊ±£¬£¬£¬£¬£¬¾àËùν¡°Êý¾ÝÐû²¼¡±½öÊ£ÈýÌì¡£¡£¡£¡£¸ÃÍÅ»ïÉÐδÌṩÊý¾ÝÑù±¾×ôÖ¤£¬£¬£¬£¬£¬´Ë¾Ù±»ÊÓΪÆÈʹÆóÒµÖ§¸¶Êê½ðµÄÕ½ÂÔÊֶΡ£¡£¡£¡£Summit Golf BrandsÆìϰüÀ¨Zero Restriction¡¢B. DraddyµÈ×ÅÃûÆ·ÅÆ£¬£¬£¬£¬£¬ÄêÓªÊÕ2790ÍòÃÀÔª¡£¡£¡£¡£INC Ransom½¨ÉèÓÚ2023Äê7Ô£¬£¬£¬£¬£¬ÒÑÔì³É234ÃûÊܺ¦Õߣ¬£¬£¬£¬£¬ÒÔ¡°¶àÖØÀÕË÷¡±Öø³Æ£º²»µ«¼ÓÃÜÎļþ£¬£¬£¬£¬£¬»¹ÇÔÈ¡Êý¾Ý²¢Íþвй¶£¬£¬£¬£¬£¬ÉõÖÁÒÔ¡°¸¶·Ñ¼´ÌáÉýϵͳÇå¾²¡±µÄŤÇú˵´ÇÓÕÆÊê½ð¡£¡£¡£¡£´Ë´ÎÕë¶ÔSummit Golf BrandsµÄ¹¥»÷£¬£¬£¬£¬£¬Ì»Â¶ÁËÀÕË÷Èí¼þÍÅ»ï¶ÔÉÌҵʵÌåµÄÒ»Á¬Íþв¡£¡£¡£¡£Ëæ×ŵ¹¼ÆÊ±ÁÚ½ü£¬£¬£¬£¬£¬ÆóÒµÃæÁÙÁ½ÄÑ£ºÖ§¸¶Êê½ð¿ÉÄÜÖú³¤·¸·¨£¬£¬£¬£¬£¬¾Ü¾øÔò¿ÉÄÜÃæÁÙÊý¾Ýй¶Σº¦¼°ÉùÓþË𺦡£¡£¡£¡£
https://cybernews.com/security/hackers-threaten-to-drop-47gb-of-top-golf-brands-secrets/


¾©¹«Íø°²±¸11010802024551ºÅ