½­É­×Ô¿Ø×îÏÈ֪ͨÊÜ2023ÄêÊý¾Ýй¶ÊÂÎñÓ°ÏìµÄÓû§

Ðû²¼Ê±¼ä 2025-07-03

1. ½­É­×Ô¿Ø×îÏÈ֪ͨÊÜ2023ÄêÊý¾Ýй¶ÊÂÎñÓ°ÏìµÄÓû§


7ÔÂ1ÈÕ£¬ £¬£¬£¬£¬È«ÇòÂ¥Óî×Ô¶¯»¯¾ÞÍ·½­É­×Ô¿Ø¿ËÈÕÅû¶£¬ £¬£¬£¬£¬Æä2023Äê9ÔÂÔâÊܵÄÀÕË÷Èí¼þ¹¥»÷µ¼ÖÂÁè¼Ý27TBÃô¸ÐÊý¾Ý±»µÁ£¬ £¬£¬£¬£¬¹¥»÷ÕßÒªÇóÖ§¸¶5100ÍòÃÀÔªÊê½ðÒÔ»»È¡Êý¾Ý½âÃܺÍɾ³ý¡£¡£¡£ ¡£¡£´Ë´ÎÊÂÎñʼÓÚ2023Äê2ÔÂÑÇÖÞЧÀÍ´¦ÍøÂç±»ÈëÇÖ£¬ £¬£¬£¬£¬¹¥»÷Õßͨ¹ýºáÏòÒÆ¶¯ÉøÍ¸ÖÁ½¹µãϵͳ£¬ £¬£¬£¬£¬×îÖÕÔÚ9Ô°²ÅŶ¨ÖÆ»¯ÀÕË÷Èí¼þ£¬ £¬£¬£¬£¬¼ÓÃÜVMware ESXiÐéÄâ»ú²¢Ì±»¾Òªº¦»ù´¡ÉèÊ©¡£¡£¡£ ¡£¡£×÷Ϊ¿ç¹ú¹¤Òµ¼¯ÍÅ£¬ £¬£¬£¬£¬½­É­×Ô¿ØÔÚ150¸ö¹ú¼ÒÓµÓÐ10ÍòÃûÔ±¹¤£¬ £¬£¬£¬£¬Æä°²·À¡¢Å¯Í¨¿Õµ÷¼°Ïû·ÀϵͳÆÕ±éÓ¦ÓÃÓÚÈ«ÇòµØ±êÐÞ½¨¡£¡£¡£ ¡£¡£´Ë´Î¹¥»÷µ¼ÖÂÆäÈ«ÇòITϵͳ´ó¹æÄ£å´»ú£¬ £¬£¬£¬£¬¿Í»§¶©µ¥´¦Öóͷ£¡¢×°±¸Î¬»¤µÈ½¹µãÓªÒµÖÐÖ¹ÊýÖÜ¡£¡£¡£ ¡£¡£¹«Ë¾ÏòÃÀ¹ú֤ȯÉúÒâίԱ»á£¨SEC£©Ìá½»µÄÎļþÏÔʾ£¬ £¬£¬£¬£¬ÊÂÎñÏìÓ¦ÓëÐÞ¸´±¾Ç®ÒÑ´ï2700ÍòÃÀÔª£¬ £¬£¬£¬£¬ÇÒÔ¤¼Æ½«Ò»Á¬ÅÊÉý¡£¡£¡£ ¡£¡£ÊӲ췢Ã÷£¬ £¬£¬£¬£¬¹¥»÷ÕßÇÔÈ¡µÄÊý¾Ýº­¸ÇÔ±¹¤ÐÅÏ¢¡¢¿Í»§ÌõÔ¼¡¢²úÆ·Ñз¢×ÊÁϼ°ÉÌÒµÉñÃØ£¬ £¬£¬£¬£¬²¿·ÖÎļþ±»ÉÏ´«ÖÁÃûΪ¡°Dunghill Leaks¡±µÄ°µÍøÐ¹ÃÜÆ½Ì¨¡£¡£¡£ ¡£¡£ÍøÂçÇ徲ר¼Ò½«´Ë´Î¹¥»÷¹éÒòÓÚDark AngelsÀÕË÷×éÖ¯¡£¡£¡£ ¡£¡£¹«Ë¾Ç¿µ÷£¬ £¬£¬£¬£¬Ö»¹ÜÖ§¸¶ÁË2700ÍòÃÀÔªÓ¦¼±ÓöÈ£¬ £¬£¬£¬£¬µ«¾Ü¾øÏòÀÕË÷ÕßÍ×Э£¬ £¬£¬£¬£¬ËùÓÐϵͳÒÑͨ¹ý±¸·Ý»Ö¸´ÔËÐС£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/johnson-controls-starts-notifying-people-affected-by-2023-breach/


2. À¶ÑÀ¶ú»ú¸ßΣÎó²îÆØ¹â£¬ £¬£¬£¬£¬Ë÷ÄáµÈÆ·ÅÆ×°±¸ÃæÁÙ¼àÌýΣº¦


7ÔÂ1ÈÕ£¬ £¬£¬£¬£¬µÂ¹úÍøÂçÇå¾²¹«Ë¾ERNW¿ËÈÕÅû¶£¬ £¬£¬£¬£¬È«ÇòÊý°ÙÍǫ̀ʹÓÃAiroha SystemsоƬµÄÀ¶ÑÀ¶ú»ú±£´æÑÏÖØÇå¾²Îó²î£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚÎÞÐèÅä¶Ô»òÈÏÖ¤µÄÇéÐÎÏÂÍêÈ«¿ØÖÆ×°±¸£¬ £¬£¬£¬£¬Ö±½ÓÍþвÓû§Òþ˽Çå¾²¡£¡£¡£ ¡£¡£´Ë´ÎÎó²îÓ°Ïì¹æÄ£ÆÕ±é£¬ £¬£¬£¬£¬º­¸ÇË÷Äá¡¢Bose¡¢Marshall¡¢Jabra¡¢JBLµÈÊ®Óà¸öÖ÷Á÷Æ·ÅÆµÄÊýÊ®¿îÈÈÃÅÐͺÅ£¬ £¬£¬£¬£¬°üÀ¨Ë÷ÄáWH-1000XMϵÁнµÔë¶ú»ú¡¢Bose QuietComfort¶úÈû¡¢Marshall STANMORE IIIÒôÏäµÈÊг¡ÍÑÏú²úÆ·¡£¡£¡£ ¡£¡£Ñо¿ÏÔʾ£¬ £¬£¬£¬£¬Îó²î½¹µãÔ´ÓÚAirohaÀ¶ÑÀоƬµÄ×Ô½ç˵ЭÒéȱÏÝ£¨CVE-2025-20702£©¡£¡£¡£ ¡£¡£¹¥»÷Õß½öÐè´¦ÓÚÀ¶ÑÀÐźÅÁýÕÖ¹æÄ££¨Ô¼10Ã×ÄÚ£©£¬ £¬£¬£¬£¬¼´¿Éͨ¹ý¸ÃЭÒéÖ±½Ó¶Áдװ±¸ÄÚ´æ»ò¹Ì¼þ£¬ £¬£¬£¬£¬ÊµÏÖ¶ñÒâ´úÂë×¢Èë¡¢¹Ì¼þ¸Ä¶¯µÈ²Ù×÷¡£¡£¡£ ¡£¡£¸üÑÏËàµÄÊÇ£¬ £¬£¬£¬£¬ºÚ¿Í¿Éð³äÒÑÅä¶Ô×°±¸ÏòÓû§ÊÖ»ú·¢ËÍÖ¸Á £¬£¬£¬£¬ÀýÈçÇÔȡͨ»°¼Í¼¡¢ÁªÏµÈËÐÅÏ¢£¬ £¬£¬£¬£¬ÉõÖÁÔ¶³Ì²Ù¿ØÂó¿Ë·ç¾ÙÐÐʵʱ¼àÌý¡£¡£¡£ ¡£¡£Ö»¹ÜÏÖʵ¹¥»÷Ðè½Ï¸ßÊÖÒÕˮƽÇÒÒÀÀµÎïÀíÏà½üÐÔ£¬ £¬£¬£¬£¬µ«Õë¶ÔÕþÒª¡¢¼ÇÕß¡¢ÆóÒµ¸ß¹ÜµÈ¸ß¼ÛֵĿµÄµÄDZÔÚΣº¦ÈÔÒý·¢µ£ÐÄ¡£¡£¡£ ¡£¡£AirohaËäÒÑÓÚ2025Äê6ÔÂÏò³§ÉÌÌṩÐÞ¸´²¹¶¡£¬ £¬£¬£¬£¬µ«×°±¸ÖÆÔìÉ̵Ĺ̼þ¸üнø¶ÈÀǼ®²»Æë¡£¡£¡£ ¡£¡£


https://cybernews.com/security/millions-of-headphones-vulnerable-to-bluetooth-hacks/


3. ¶íÂÞ˹¹ú·À¾ÞÍ·NPO MarsÔâºÚ¿Í¹¥»÷£¬ £¬£¬£¬£¬Ë®Ê¦ÉñÃØÊý¾Ýй¶


7ÔÂ1ÈÕ£¬ £¬£¬£¬£¬¶íÂÞ˹Áª°î¼¶¹ú·À³Ð°üÉÌNPO Mars¿ËÈÕÔâÓöÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬ £¬£¬£¬£¬¹¥»÷ÕßÐû³ÆÇÔÈ¡ÁË250GBÃô¸Ð¾üÊÂÎļþ£¬ £¬£¬£¬£¬Éæ¼°¶íÂÞ˹ˮʦ½¹µãÖ¸»Ó¿ØÖÆÏµÍ³¡£¡£¡£ ¡£¡£Æ¾Ö¤Ñо¿ÍŶӵÄÊӲ죬 £¬£¬£¬£¬Ð¹Â¶Êý¾Ý°üÀ¨´ó×Ú±êעΪ¡°¾øÃÜ¡±µÄPDFÎļþºÍÊÖÒÕÊֲᣬ £¬£¬£¬£¬²¿·ÖÎļþ¸üÐÂÖÁ2025Äê3Ô£¬ £¬£¬£¬£¬Ö¤Êµ¹¥»÷¾ßÓи߶ÈʱЧÐÔ¡£¡£¡£ ¡£¡£ÆäÖУ¬ £¬£¬£¬£¬ÃûΪ¡°SIGMA-20385¡±µÄ×÷Õ½ÐÅÏ¢Óë¿ØÖÆÏµÍ³ÊÖ²áÓÈΪҪº¦£¬ £¬£¬£¬£¬¸ÃϵͳÈÏÕæ¶íÂÞ˹ˮʦ½¢Í§µÄÎÞа¿ØÖÆ¡¢·´Ç±·ÀÓù¼°µ¼µ¯ÎäÆ÷Эͬ¡£¡£¡£ ¡£¡£¹¥»÷ÕßÐû²¼µÄÊÓÆµ¹ã¸æ¸üÉù³ÆÒÑÈëÇÖ¡°TRASSA¡±×ÛºÏÖ¸»Óϵͳ¼°¡°DIEZ¡±É¨À×ͧ×Ô¶¯¿ØÖÆÏµÍ³£¬ £¬£¬£¬£¬ÉõÖÁÑÝʾ¸Ä¶¯¶í¾ü½¢Í§×ø±êÊý¾ÝµÄ²Ù×÷½çÃæ£¬ £¬£¬£¬£¬ÌåÏÖÆä¾ß±¸ÊµÊ±×ÌÈÅÄÜÁ¦¡£¡£¡£ ¡£¡£NPO Mars×÷Ϊ¶íÂÞ˹¾üÊ¿Ƽ¼½¹µãÆóÒµ£¬ £¬£¬£¬£¬ÆäÓªÒµÁýÕÖ×Ô¶¯»¯Ö¸»Óϵͳ¡¢×°¼×³µÁ¾¿ØÖÆÆ½Ì¨¼°Ë®Ê¦½¢Í§µç×Ó×°±¸Ñз¢£¬ £¬£¬£¬£¬Ô±¹¤¹æÄ£³¬1100ÈË¡£¡£¡£ ¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜͨ¹ý´¹ÂÚ¹¥»÷»ñÈ¡³õʼ»á¼ûȨÏÞ£¬ £¬£¬£¬£¬¼Ì¶øÉøÍ¸ÖÁÄÚÍøÇÔÈ¡ÉñÃØÎĵµ¡£¡£¡£ ¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ £¬£¬£¬£¬Ð¹Â¶Êý¾ÝÑù±¾ÖмȰüÀ¨2017ÄêµÄÀúÊ·Îļþ£¬ £¬£¬£¬£¬Ò²º­¸Ç2024Äê¸üеÄÊÖÒÕÊֲᣬ £¬£¬£¬£¬Åú×¢¹¥»÷Õ߾߱¸ºã¾ÃDZÔÚÄÜÁ¦¡£¡£¡£ ¡£¡£


https://cybernews.com/security/russian-defense-contractor-mars-breach-navy/


4. CISA½«TeleMessage TM SGNL¸ßΣÎó²îÄÉÈëKEVĿ¼


7ÔÂ2ÈÕ£¬ £¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Õýʽ½«TeleMessage TM SGNLͨѶƽ̨ÖеÄÁ½ÏîÑÏÖØÎó²î£¨CVE-2025-48927¡¢CVE-2025-48928£©ÁÐÈë¡°ÒÑÖª±»Ê¹ÓÃÎó²îĿ¼¡±£¨KEV£©£¬ £¬£¬£¬£¬ÒªÇóÁª°î»ú¹¹ÓÚ2025Äê7ÔÂ22ÈÕǰÍê³ÉÐÞ¸´£¬ £¬£¬£¬£¬²¢ºôÓõ˽Ӫ²¿·Öͬ²½×Բ顣¡£¡£ ¡£¡£CVE-2025-48927£¨CVSSÆÀ·Ö5.3£©Ô´ÓÚTeleMessage TM SGNLµÄSpring Boot Actuator×é¼þÉèÖùýʧ£¬ £¬£¬£¬£¬µ¼ÖÂÃô¸ÐµÄ/heapdump¶Ñת´¢¶Ëµã̻¶¡£¡£¡£ ¡£¡£¹¥»÷Õß¿ÉʹÓøÃÎó²îÖ±½Ó»á¼ûÄÚ´æ¿ìÕÕ£¬ £¬£¬£¬£¬ÇÔȡδ¼ÓÃܵį¾Ö¤¡¢»á»°ÁîÅÆµÈÃô¸ÐÊý¾Ý¡£¡£¡£ ¡£¡£CVE-2025-48928£¨CVSSÆÀ·Ö4.0£©ÔòÉæ¼°½¹µãת´¢Îļþ̻¶ÎÊÌ⣬ £¬£¬£¬£¬TeleMessageЧÀ͵ÄJSPÓ¦ÓÃÔÚ´¦Öóͷ£HTTPÇëÇóʱ£¬ £¬£¬£¬£¬½«Óû§ÃÜÂëµÈÃ÷ÎÄÐÅÏ¢Ö±½ÓдÈë¶ÑÄÚ´æ¿ìÕÕ£¬ £¬£¬£¬£¬ÇÒÎļþȨÏÞ¿ØÖÆÈ±Ê§£¬ £¬£¬£¬£¬Ê¹µÃδ¾­ÊÚȨµÄ¹¥»÷Õß¾ù¿É»ñÈ¡ÕâЩÊý¾Ý¡£¡£¡£ ¡£¡£CISAÔÚͨ¸æÖÐÇ¿µ÷£¬ £¬£¬£¬£¬ÕâÁ½¸öÎó²îµÄ×éºÏʹÓÿÉÄÜÐγÉÍêÕû¹¥»÷Á´£º¹¥»÷ÕßÊ×ÏÈͨ¹ýCVE-2025-48927»ñȡϵͳÄÚ´æÊý¾Ý£¬ £¬£¬£¬£¬ÔÙʹÓÃCVE-2025-48928ÌáÈ¡´æ´¢µÄÃÜÂ룬 £¬£¬£¬£¬´Ó¶øºáÏòÉøÍ¸ÖÁÄÚ²¿ÍøÂç¡£¡£¡£ ¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬ £¬£¬£¬£¬TeleMessage TM SGNL×÷ΪÆóÒµ¼¶Í¨Ñ¶Æ½Ì¨£¬ £¬£¬£¬£¬±»¶à¼ÒÁª°î»ú¹¹ÓÃÓÚÃô¸ÐÐÅÏ¢´«Ê䣬 £¬£¬£¬£¬Îó²îʹÓÿÉÄܵ¼ÖÂÉñÃØÊý¾Ýй¶»ò¹©Ó¦Á´¹¥»÷¡£¡£¡£ ¡£¡£


https://securityaffairs.com/179542/hacking/u-s-cisa-adds-telemessage-tm-sgnl-flaws-to-its-known-exploited-vulnerabilities-catalog.html


5. ³¯ÏʺڿͰ²ÅÅNimDoorÖØ´ó¶ñÒâÈí¼þ


7ÔÂ2ÈÕ£¬ £¬£¬£¬£¬³¯ÏÊÕþ¸®Åä¾°µÄºÚ¿Í×éÖ¯ÕýʹÓÃÒ»¿îÃûΪNimDoorµÄÐÂÐÍmacOS¶ñÒâÈí¼þ£¬ £¬£¬£¬£¬¶ÔÈ«Çòweb3¼°¼ÓÃÜÇ®±ÒÁìÓòÌᳫ¾«×¼¹¥»÷¡£¡£¡£ ¡£¡£ÍøÂçÇå¾²¹«Ë¾SentinelLabsÔÚ×îб¨¸æÖÐÅû¶£¬ £¬£¬£¬£¬¸Ã¹¥»÷Á´Í¨¹ýTelegramÉç½»¹¤³ÌÓÕÆ­Êܺ¦ÕßÔËÐÐαװ³ÉZoom SDK¸üеĶñÒâ³ÌÐò£¬ £¬£¬£¬£¬ÆäÊÖÒÕÖØÆ¯ºóÓëÒþ²ØÐԵִﳯÏʺڿ͹¤¾ß¿âµÄȫи߶ȡ£¡£¡£ ¡£¡£Ñо¿ÏÔʾ£¬ £¬£¬£¬£¬NimDoor½ÓÄÉC++ÓëNimÓïÑÔ»ìÏý±àÒëµÄ¶þ½øÖÆ×é¼þ£¬ £¬£¬£¬£¬ÐγÉÄ£¿£¿£¿£¿é»¯¹¥»÷¿ò¼Ü¡£¡£¡£ ¡£¡£³õʼѬȾ½×¶Î£¬ £¬£¬£¬£¬ÃûΪ"installer"µÄ¶þ½øÖÆÎļþÈÏÕæÏµÍ³ÇéÐΰ²ÅÅ£¬ £¬£¬£¬£¬Ö²Èë"GoogIe LLC"ºÍ"CoreKitAgent"Á½¸ö½¹µãÄ£¿£¿£¿£¿é¡£¡£¡£ ¡£¡£×÷Ϊ½¹µãÔØºÉµÄCoreKitAgentÕ¹ÏÖ³ö¶àÏîÍ»ÆÆÐÔÊÖÒÕ£ºÆäÒ»£¬ £¬£¬£¬£¬½ÓÄÉÊÂÎñÇý¶¯¼Ü¹¹£¬ £¬£¬£¬£¬Í¨¹ýmacOSµÄkqueue»úÖÆÊµÏÖÒ첽ʹÃüÖÎÀí£»£»£»£»Æä¶þ£¬ £¬£¬£¬£¬ÄÚÖÃ10Àý״̬»ú¿ØÖÆÁ÷£¬ £¬£¬£¬£¬¿Éƾ֤ÔËÐÐʱÌõ¼þ¶¯Ì¬µ÷½â¹¥»÷Âß¼­£»£»£»£»ÆäÈý£¬ £¬£¬£¬£¬¿ª´´ÐÔµØÊ¹ÓûùÓÚÐźŵij¤ÆÚ»¯»úÖÆ¡£¡£¡£ ¡£¡£ÔÚÊý¾ÝÇÔÈ¡²ãÃæ£¬ £¬£¬£¬£¬NimDoor¹¹½¨ÁË˫ͨµÀ¹¥»÷Á´¡£¡£¡£ ¡£¡£Ö÷Á´Í¨¹ý½âÂëÊ®Áù½øÖÆAppleScript£¬ £¬£¬£¬£¬Ã¿30ÃëÏòC2ЧÀÍÆ÷·¢ËÍϵͳÐű꣬ £¬£¬£¬£¬²¢Ö´ÐÐÔ¶³ÌosascriptÏÂÁîʵÏÖÇáÁ¿¼¶ºóÃÅ¿ØÖÆ¡£¡£¡£ ¡£¡£¸¨ÖúÁ´ÔòʹÓÃ"zoom_sdk_support.scpt"¼ÓÔØÆ÷Æô¶¯WebSocketͨѶ£¬ £¬£¬£¬£¬ÏÂÔØuplºÍtlgrmÁ½¸ö¾ç±¾£¬ £¬£¬£¬£¬ÐγɴÓϵͳÐÅÏ¢µ½¼ÓÃÜÇ®±ÒÇ®°üµÄÍêÕûÇÔÈ¡Á´Â·¡£¡£¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/nimdoor-crypto-theft-macos-malware-revives-itself-when-killed/


6. Ò½ÁÆÆ÷е¹«Ë¾Surmodics±¨¸æÔâÊÜÍøÂç¹¥»÷


7ÔÂ3ÈÕ£¬ £¬£¬£¬£¬ÃÀ¹úÒ½ÁÆ×°±¸ÖÆÔìÉÌSurmodics¿ËÈÕÅû¶£¬ £¬£¬£¬£¬ÆäÓÚ6ÔÂ5ÈÕÔâÊÜÍøÂç¹¥»÷µ¼Ö²¿·ÖITϵͳ̱»¾£¬ £¬£¬£¬£¬³ÉΪ½ñÄêµÚÈý¼ÒÏòÃÀ¹ú֤ȯÉúÒâίԱ»á£¨SEC£©±¨¸æ´ËÀàÊÂÎñµÄÉÏÊÐÒ½ÁÆÆ÷е¹«Ë¾¡£¡£¡£ ¡£¡£Õâ¼Ò×ܲ¿Î»¾ÓÃ÷ÄáËÕ´ïÖÝµÄÆóÒµ×÷ΪȫÇò×î´óÍâ°üÇ×ˮͿ²ã¹©Ó¦ÉÌ£¬ £¬£¬£¬£¬Æä²úÆ·ÆÕ±éÓ¦ÓÃÓÚѪ¹ÜÄÚÒ½ÁÆÆ÷еÒÔ½µµÍĦ²ÁϵÊý¡£¡£¡£ ¡£¡£¹¥»÷±¬·¢ºó£¬ £¬£¬£¬£¬¹«Ë¾ITÍŶÓѸËÙ¼ì²âµ½Òì³£»á¼û²¢×Ô¶¯ÇжÏϵͳ£¬ £¬£¬£¬£¬×ª¶øÍ¨¹ýÊÖ¹¤Á÷³Ìά³Ö¿Í»§¶©µ¥´¦Öóͷ£Óë·¢»õ£¬ £¬£¬£¬£¬µ«´Ë´ÎÊÂÎñÈÔ̻¶³öÒ½Áƹ©Ó¦Á´Êý×Ö»¯×ªÐÍÖеÄÉî²ãÇå¾²Òþ»¼¡£¡£¡£ ¡£¡£Æ¾Ö¤SEC±¸°¸Îļþ£¬ £¬£¬£¬£¬SurmodicsÔÚÍøÂçÇ徲ר¼ÒЭÖúÏÂÒѲ¿·Ö»Ö¸´Òªº¦ÏµÍ³£¬ £¬£¬£¬£¬µ«ºÚ¿ÍÇÔÈ¡Êý¾ÝµÄÏêϸ¹æÄ£ÈÔÔÚÆÀ¹ÀÖС£¡£¡£ ¡£¡£¹«Ë¾Ê×ϯ²ÆÎñ¹ÙµÙĪÎ÷¡¤°¢Â×˹£¨Timothy Arens£©¾¯Ê¾£¬ £¬£¬£¬£¬´Ë´ÎÊÂÎñ´øÀ´µÄΣº¦Ô¶Î´Ïû³ý£º³ýÒ»Á¬¾ÙÐеÄϵͳÐÞ¸´Í⣬ £¬£¬£¬£¬ÖÎÀí²ãÐè·ÖÉñÓ¦¶ÔDZÔÚËßËÏ¡¢¿Í»§ÐÅÈÎΣ»£»£»£»ú¼°î¿ÏµÉó²é¡£¡£¡£ ¡£¡£Ö»¹Ü¹«Ë¾¼á³ÆÎ´·¢Ã÷¿Í»§»òµÚÈý·½Êý¾Ýй¶£¬ £¬£¬£¬£¬µ«Ò½ÁÆÐÐÒµ½üÆÚÕûÌåËßËÏÆµ·¢£¬ £¬£¬£¬£¬Ê¹µÃSurmodics¶ÔÖ´·¨Î£º¦¼á³Ö¸ß¶ÈСÐÄ¡£¡£¡£ ¡£¡£


https://therecord.media/surmodics-medical-device-company-reports-cybersecurity-incident