Boyd GamingÔâÍøÂç¹¥»÷ÖÂÔ±¹¤Êý¾Ýй¶
Ðû²¼Ê±¼ä 2025-09-251. Boyd GamingÔâÍøÂç¹¥»÷ÖÂÔ±¹¤Êý¾Ýй¶
9ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÉÏÊв©²ÊÓéÀÖ¹«Ë¾Boyd Gaming Corporation¿ËÈÕÅû¶ÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÈëÇÖÆäϵͳ²¢ÇÔÈ¡Á˰üÀ¨Ô±¹¤ÐÅÏ¢¼°ÉÙÊýÆäËûСÎÒ˽¼ÒÊý¾ÝµÄÄÚÈÝ¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾×ܲ¿Î»ÓÚÄÚ»ª´ïÖÝ£¬£¬£¬£¬£¬£¬ÔÚÈ«ÃÀÊ®¸öÖÝÔËÓª28´¦²©²Ê×ʲú£¬£¬£¬£¬£¬£¬²¢ÖÎÀí¼ÓÖݱ±²¿Ò»¼Ò²¿Âä¶Ä³¡£¬£¬£¬£¬£¬£¬ÓµÓÐÁè¼Ý16,000ÃûÔ±¹¤£¬£¬£¬£¬£¬£¬2024ÄêÓªÊÕ´ï39ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£Æ¾Ö¤ÏòÃÀ¹ú֤ȯÉúÒâίԱ»áÌá½»µÄ8-KÎļþ£¬£¬£¬£¬£¬£¬Boyd GamingÔÚ¹¥»÷±¬·¢ºóÓëÍâ²¿ÍøÂçÇ徲ר¼ÒÏàÖúÓ¦¶Ô£¬£¬£¬£¬£¬£¬²¢Í¨ÖªÁËÖ´·¨²¿·Ö¡£¡£¡£¡£¡£¡£¹«Ë¾È·ÈÏ£¬£¬£¬£¬£¬£¬Î´¾ÊÚȨµÄµÚÈý·½´ÓÆäITϵͳÖÐɾ³ýÁËÌØ¶¨Ãü¾Ý£¬£¬£¬£¬£¬£¬Éæ¼°Ô±¹¤¼°ÉÙÊýÆäËûСÎÒ˽¼Ò¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¹«Ë¾ÕýÖðÒ»ÖÂÐÅÊÜÓ°ÏìСÎÒ˽¼Ò£¬£¬£¬£¬£¬£¬²¢½«Æ¾Ö¤ÒªÇóÏòÏà¹Øî¿Ïµ»ú¹¹¼°Õþ¸®²¿·Ö±¨¸æÊÂÎñϸ½Ú¡£¡£¡£¡£¡£¡£Ö»¹Ü±¬·¢Êý¾Ýй¶£¬£¬£¬£¬£¬£¬Boyd GamingÇ¿µ÷ÆäÔËӪδÊÜ×ÌÈÅ£¬£¬£¬£¬£¬£¬Ô¤¼ÆÊÂÎñ²»»á¶Ô²ÆÎñ״̬±¬·¢ÖØ´óµ¹ÔËÓ°Ïì¡£¡£¡£¡£¡£¡£¹«Ë¾ÒѹºÖÃÍøÂçÇå¾²°ü¹Ü£¬£¬£¬£¬£¬£¬Ïà¹ØÓöÈÔ¤¼Æ¿ÉÓɰü¹ÜÁýÕÖ¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯»òÆäËûÍþвÐÐΪÕßÐû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/boyd-gaming-discloses-data-breach-after-suffering-a-cyberattack/
2. CISA½«Google ChromiumÎó²îÌí¼Óµ½ÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ÖÐ
9ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Google ChromiumÎó²îCVE-2025-10585ÁÐÈëÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼¡£¡£¡£¡£¡£¡£¸ÃÎó²îÊÇV8 JavaScriptºÍWebAssemblyÒýÇæÖеÄÀàÐÍ»ìÏýÎÊÌ⣬£¬£¬£¬£¬£¬µ±Èí¼þÎó½«ÄÚ´æÊ¶±ðΪ¹ýʧÀàÐ͹¤¾ßʱ£¬£¬£¬£¬£¬£¬¹¥»÷Õ߿ɽè´ËÆÆËðÄÚ´æ¡¢µ¼Ö³ÌÐò±ÀÀ£»£»£»£»£»£»òÖ´ÐжñÒâ´úÂë¡£¡£¡£¡£¡£¡£´ËÀàÎó²îÔÚC/C++±àдµÄä¯ÀÀÆ÷Ó¦ÓÃÖÐÓÈΪ³£¼û£¬£¬£¬£¬£¬£¬ÒòÄÚ´æÇå¾²ÐÔ½ÏÈõÒ×±»Ê¹Óᣡ£¡£¡£¡£¡£¹È¸èÓÚ2025Äê9ÔÂÖÐÑ®Ðû²¼Çå¾²¸üÐÂÐÞ¸´Á˰üÀ¨CVE-2025-10585ÔÚÄÚµÄËĸöChromeÎó²î£¬£¬£¬£¬£¬£¬²¢È·ÈϸÃÎó²îÒÑÔÚÒ°ÍⱻʹÓᣡ£¡£¡£¡£¡£¹È¸èÍþвÆÊÎöС×飨TAG£©ÓÚ9ÔÂ16ÈÕ·¢Ã÷¸ÃÎó²î£¬£¬£¬£¬£¬£¬ÏÖÔÚÕýÊÓ²ìÃñ×å¹ú¼ÒÐÐΪÕߺÍÉÌÒµÌØ¹¤Èí¼þ¹©Ó¦É̵Ĺ¥»÷£¬£¬£¬£¬£¬£¬ÍƲâÆäÖÐÒ»ÍþвÐÐΪÕßÒÑʹÓôËÎó²îʵÑé¹¥»÷¡£¡£¡£¡£¡£¡£Æ¾Ö¤¾ßÓÐÔ¼ÊøÁ¦µÄÔËÓªÖ¸ÁBOD£©22-01£¬£¬£¬£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©»ú¹¹ÐèÔÚ2025Äê10ÔÂ14ÈÕǰÍê³ÉÎó²îÐÞ¸´£¬£¬£¬£¬£¬£¬ÒÔ½µµÍÖØ´óΣº¦¡£¡£¡£¡£¡£¡£CISAͬʱ½¨Òé˽ÈË×éÖ¯Éó²éKEVĿ¼²¢ÐÞ¸´×ÔÉí»ù´¡ÉèÊ©ÖеÄÏà¹ØÎó²î¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/182509/security/u-s-cisa-adds-google-chromium-flaw-to-its-known-exploited-vulnerabilities-catalog.html
3. Æû³µ°ü¹Üƽ̨ClaimPixй¶Áè¼Ý500Íò¸öÎļþ
9ÔÂ23ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ô±Jeremiah FowlerÏòWebsite Planet±¨¸æ·¢Ã÷Ò»¸öδ¼ÓÃÜÇÒÎÞÃÜÂë±£»£»£»£»£»£»¤µÄÊý¾Ý¿â£¬£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿â°üÀ¨510Íò¸öÎļþ¡¢×ÜÈÝÁ¿´ï10TB£¬£¬£¬£¬£¬£¬Éæ¼°ÊÚȨÊé¡¢³µÁ¾¹ÒºÅ¡¢Î¬ÐÞ·¢Æ±¼°´øÓÐÇåÎú³µÅƺÍVINÂëµÄÊÜËð³µÁ¾Í¼ÏñµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¾ÆÊÎö£¬£¬£¬£¬£¬£¬ÕâЩ¼Í¼ÊôÓÚÒÁÀûŵÒÁÖÝÆû³µ°ü¹ÜË÷ÅâÆ½Ì¨ClaimPix¡£¡£¡£¡£¡£¡£Êý¾Ý¿âÖаüÀ¨ÐÕÃû¡¢µØµã¡¢µç»°¡¢µç×ÓÓʼþµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©£¬£¬£¬£¬£¬£¬ÒÔ¼°½ü1.6Íò·Ýµç×ÓÊðÃûÊÚȨίÍÐÊ飬£¬£¬£¬£¬£¬ÆäÖаüÀ¨ÊðÃûÕßIPµØµã¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬»¹°üÀ¨Èí¼þÔÊÐíÐÒéµÈÄÚ²¿Îļþ£¬£¬£¬£¬£¬£¬Ì»Â¶Á˲»Ó¦¹ûÕæµÄÌõ¿îºÍÓöÈÐÅÏ¢¡£¡£¡£¡£¡£¡£Fowlerͨ¹ýÈÏÕæÈÎÅû¶֪ͨClaimPixºó£¬£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿â±»Ñ¸ËÙÏÞÖÆ»á¼û¡£¡£¡£¡£¡£¡£ClaimPix»ØÓ¦³ÆÒѸüÐÂÕþ²ßºÍ´úÂëÐÞ¸´Îó²î¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬Êý¾Ý¿â¹éÊô¼°Ì»Â¶Ê±³¤ÈÔ´æÒÉ£¬£¬£¬£¬£¬£¬ÐèÄÚ²¿Éó¼ÆÈ·ÈÏÊÇ·ñÓÐÆäËû»á¼û»ò¿ÉÒɻ¡£¡£¡£¡£¡£¡£½¨Òé°ü¹ÜÐÐÒµÆóÒµ¼ÓÃÜËùÓÐÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬ÊµÑé¶àÒòËØÈÏÖ¤ºÍ»ùÓÚ½ÇÉ«µÄ»á¼û¿ØÖÆ£¬£¬£¬£¬£¬£¬°´ÆÚÉóºËÔÆ´æ´¢ÏµÍ³²¢¾ÙÐÐÎó²î²âÊÔ¡£¡£¡£¡£¡£¡£Ð¡ÎÒ˽¼ÒÈôÏÓÒÉÐÅϢй¶£¬£¬£¬£¬£¬£¬Ó¦¼à¿ØÐÅÓñ¨¸æ¡¢Ê¹ÓÃÐÅÓö³½áЧÀÍ£¬£¬£¬£¬£¬£¬²¢Í¨¹ýFTCµÄIdentityTheft.gov¾Ù±¨¡£¡£¡£¡£¡£¡£
https://www.websiteplanet.com/news/claimpix-breach-report/
4. Motility Software SolutionsÊý¾Ýй¶£¬£¬£¬£¬£¬£¬Ó°Ïì76ÍòÏûºÄÕß
9ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬×¨ÓÃÆû³µ¾ÏúÉÌÖÎÀíÈí¼þ¹©Ó¦ÉÌMotility Software Solutions 8ÔÂ19ÈÕÔÚÆäÍøÂçÖз¢Ã÷¿ÉÒɻ£¬£¬£¬£¬£¬£¬Ñ¸ËÙÏÂÏßÊÜÓ°ÏìЧÀÍÆ÷ÒÔ¿ØÖÆÊÂÎñ£¬£¬£¬£¬£¬£¬²¢ÁªºÏÍøÂçÇ徲ר¼ÒÕö¿ªÊӲ졣¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñµ¼ÖÂÔ¼76ÍòÃûÃÀ¹úÏûºÄÕßµÄСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©±»Î´¾ÊÚȨ»á¼û£¬£¬£¬£¬£¬£¬Ð¹Â¶Êý¾Ý°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢¼ÝÕÕºÅÂë¼°Éç»áÇå¾²ºÅÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£MotilityÇ¿µ÷£¬£¬£¬£¬£¬£¬Êý¾Ýй¶½öÏÞÓÚÆä×ÔÉíÍøÂ磬£¬£¬£¬£¬£¬Î´²¨¼°Ä¸¹«Ë¾À×ŵ×È£¨Reynolds and Reynolds£©µÄϵͳ»òÍøÂç¡£¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬£¬MotilityÁ¬Ã¦½ÓÄɶàÏîµ÷½â²½·¥£º¸ôÀëÊÜÓ°ÏìЧÀÍÆ÷¡¢Ô¼ÇëÍâ²¿ÍøÂçÇ徲ר¼ÒÐÖúÊӲ죬£¬£¬£¬£¬£¬²¢Í¨ÖªÖ´·¨²¿·Ö½éÈë¡£¡£¡£¡£¡£¡£ÎªÔöÇ¿Çå¾²·À»¤£¬£¬£¬£¬£¬£¬¹«Ë¾ÊµÑéÁËÌØÊâÇå¾²²½·¥£¬£¬£¬£¬£¬£¬°üÀ¨ÒýÈëй¤¾ß¡¢½¨ÉèÈßÓàµÄµÚÈý·½¼à¿Ø»úÖÆ£¬£¬£¬£¬£¬£¬²¢ÖÜÈ«Éó²éÏÖÓÐÍøÂçÇ徲ʵ¼ù¡£¡£¡£¡£¡£¡£Õë¶ÔÊÜÓ°ÏìÏûºÄÕߣ¬£¬£¬£¬£¬£¬MotilityÕýÖðÒ»ÖÂÐŲ¢ÌṩÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬£¬½¨ÒéÓû§°´ÆÚºË²éÐÅÓñ¨¸æÒì³£»£»£»£»£»£»î¶¯£¬£¬£¬£¬£¬£¬Ð¡ÐÄʹÓÃй¶ÐÅϢʵÑéµÄÍøÂç´¹ÂÚ»òÚ²ÆÐÐΪ¡£¡£¡£¡£¡£¡£Èô·¢Ã÷ÐÅÏ¢±»µÁÓ㬣¬£¬£¬£¬£¬ÏûºÄÕß¿ÉÏòÖ÷ÒªÐÅÓûú¹¹ÉêÇëڲƾ¯±¨»òÐÅÓö³½áÒÔÏÞÖÆËðʧ¡£¡£¡£¡£¡£¡£
https://www.claimdepot.com/data-breach/motility-2025
5. Libraesvaµç×ÓÓʼþÇå¾²Íø¹ØÎó²îÔâ¹ú¼ÒºÚ¿ÍʹÓÃ
9ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²³§ÉÌLibraesvaÒÑÐÞ¸´Æäµç×ÓÓʼþÇ徲ƽ̨ÖÐÒ»¸ö±»Ò°ÍâʹÓõĸßΣÎó²îCVE-2025-59689¡£¡£¡£¡£¡£¡£¸ÃÎó²îCVSSÆÀ·ÖΪ6.1£¬£¬£¬£¬£¬£¬ÊôÓÚÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓðüÀ¨¶ñÒâѹËõ¸½¼þµÄµç×ÓÓʼþ´¥·¢Îó²î£¬£¬£¬£¬£¬£¬ÔÚ·ÇÌØÈ¨Óû§È¨ÏÞÏÂÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£Îó²îȪԴÔÚÓÚÆ½Ì¨´¦Öóͷ£Ìض¨Ñ¹ËõÎļþÃûÌÃʱ±£´æÊäÈëÕûÀíȱÏÝ£¬£¬£¬£¬£¬£¬µ¼ÖÂÓÐÓÃÔØºÉÈÆ¹ýÇå¾²»úÖÆÖ´ÐÐshellÏÂÁî¡£¡£¡£¡£¡£¡£´Ë´ÎÎó²îÓ°ÏìLibraesva ESG 4.5ÖÁ5.5°æ±¾£¬£¬£¬£¬£¬£¬µ«¼øÓÚ4.x°æ±¾ÒÑÍ£²ú£¬£¬£¬£¬£¬£¬³§É̽öÕë¶Ô5.x°æ±¾Ðû²¼²¹¶¡¡£¡£¡£¡£¡£¡£¹«Ë¾ÒÑÏòÔÆ¶ËºÍÍâµØ°²ÅÅÇéÐÎÍÆËÍÐÞ¸´³ÌÐò£¬£¬£¬£¬£¬£¬ÏÖÔÚËùÓÐ×°±¸¾ùÔËÐÐÐÞ¸´ºóµÄÈí¼þ¡£¡£¡£¡£¡£¡£¹ØÓÚÈÔÔËÐÐÍâµØESG 4.x°æ±¾µÄ¿Í»§£¬£¬£¬£¬£¬£¬LibraesvaÇ¿ÁÒ½¨ÒéÊÖ¶¯Éý¼¶ÖÁÒÑÐÞ²¹µÄ5.x°æ±¾£¬£¬£¬£¬£¬£¬ÒÔ¹æ±ÜDZÔÚΣº¦¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬¸ÃÎó²îÒѱ»ÏÖʵʹÓᣡ£¡£¡£¡£¡£LibraesvaÈ·Èϱ¬·¢Ò»ÆðÀÄÓÃÊÂÎñ£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕß±»ËÝÔ´ÖÁÍâ¹ú³ðÊÓ¹ú¼ÒʵÌå¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÔٴξ¯Ê¾ÆóÒµÐèÖØÊÓ¹©Ó¦Á´Çå¾²£¬£¬£¬£¬£¬£¬ÊµÊ±¸üÐÂϵͳ²¹¶¡£¬£¬£¬£¬£¬£¬²¢½¨Éè¶àÌõÀí·ÀÓù»úÖÆÒÔÓ¦¶Ô¹ú¼ÒÖ§³ÖµÄ¸ß¼¶ÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/libraesva-email-security-gateway-vulnerability-exploited-by-nation-state-hackers/
6. µÂ¹úFAIº½¿Õ¼¯ÍÅÔâJ GroupÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬3TBÃô¸ÐÊý¾Ýй¶
9ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬µÂ¹ú°ü»úÔËÓªÉÌFAIº½¿Õ¼¯ÍÅ¿ËÈÕÔâJ GroupÀÕË÷Èí¼þÍÅ»ïÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÐû³ÆÒÑÇÔÈ¡½ü3TBÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬º¸Ç¹«Ë¾ÏêϸÐÅÏ¢¡¢Ò½ÁÆÊý¾Ý¼°Ô±¹¤Òþ˽Îļþ¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïͨ¹ý°µÍø²©¿Í¹ûÕæÊܺ¦ÕßÐÅÏ¢²¢Íþвй¶Êý¾Ý£¬£¬£¬£¬£¬£¬ÏÖÔÚFAIÉÐδ»ØÓ¦¡£¡£¡£¡£¡£¡£¾ÝÑо¿ÍŶӯÊÎö£¬£¬£¬£¬£¬£¬Ð¹Â¶Êý¾Ý°üÀ¨»¼ÕßÁÙ´²ÐÅÏ¢¡¢Ô±¹¤ÅàѵÎļþ¡¢Éó¼ÆÎĵµ¡¢·É»ú¹æ¸ñÎļþ¡¢¼òÀú¼°»¤ÕÕ¸´Ó¡¼þµÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£¡£Ò½ÁÆÊý¾ÝÒò²»¿É»Ö¸´ÌØÕ÷£¬£¬£¬£¬£¬£¬Ò»µ©Ð¹Â¶½«µ¼Ö»¼Õß²¡Ê·ÓÀÊÀ̻¶£¬£¬£¬£¬£¬£¬ÔöÌíÉí·Ý͵ÇÔ¡¢Ú²Æ¼°Éç»á¹¤³Ì¹¥»÷Σº¦¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉÄÜʹÓÃй¶ÐÅϢð³äFAI»ò¹ØÁªÐ§ÀÍ£¬£¬£¬£¬£¬£¬Õë¶Ô¸ß¾»Öµ¿Í»§ÊµÑ龫׼թƣ¬£¬£¬£¬£¬£¬Í¬Ê±ÄÚ²¿Éó¼ÆÎļþ¿É̻¶¹«Ë¾ÔËÓªÈõµã£¬£¬£¬£¬£¬£¬ÎªºóÐø¹¥»÷ÌṩĿµÄ¡£¡£¡£¡£¡£¡£J Group×÷Ϊ2025ÄêÍ·ÐÂÐËÍøÂç·¸·¨¼¯ÍÅ£¬£¬£¬£¬£¬£¬ÒÔÊý¾Ý¾¼ÍģʽIJÀû£¬£¬£¬£¬£¬£¬ÈôÊê½ð̸ÅÐʧ°Ü£¬£¬£¬£¬£¬£¬½«¹ûÕæ³öÊÛÊý¾Ý¶ø·Ç´¿´âй¶¡£¡£¡£¡£¡£¡£¸Ã×é֯ĿµÄ¹æÄ£ÆÕ±é£¬£¬£¬£¬£¬£¬´ÓÓÎÀÖÔ°µ½º½¿ÕÒµ¾ùÓÐÉæÁÔ£¬£¬£¬£¬£¬£¬Òѹ¥»÷ÖÁÉÙ32¸ö×éÖ¯£¬£¬£¬£¬£¬£¬³ÉΪÀÕË÷Èí¼þÁìÓò»îÔ¾ÐÂÊÆÁ¦¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/fai-aviation-group-data-breach-claims/


¾©¹«Íø°²±¸11010802024551ºÅ