Gemini AIÖúÊÖÒý·¢Google APIÃÜԿ̻¶Σº¦
Ðû²¼Ê±¼ä 2026-02-281. Gemini AIÖúÊÖÒý·¢Google APIÃÜԿ̻¶Σº¦
2ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬£¬£¬TruffleSecurityÑо¿Ö°Ô±ÔÚɨÃèÈ«ÇòÍøÕ¾Ê±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬½ü3000¸öǶÈëÔÚ¹«¹²JavaScript´úÂëÖеÄGoogle APIÃÜÔ¿±£´æÑÏÖØÇ徲Σº¦¡£¡£¡£¡£¡£ÕâЩÃÜÔ¿Ô±¾ÓÃÓÚµØÍ¼¡¢YouTubeǶÈë¡¢FirebaseµÈЧÀÍ£¬£¬£¬£¬£¬£¬£¬ÔÚGoogleÍÆ³öGemini AIÖúÊֺ󣬣¬£¬£¬£¬£¬£¬ÆäȨÏÞ±»ÒâÍâÀ©Õ¹ÖÁGeminiÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬£¬µ¼Ö¹¥»÷Õ߿ɸ´ÖÆÃÜÔ¿»á¼û˽ÓÐÊý¾Ý²¢ÀÄÓÃAPIŲÓÃ׬Ǯ¡£¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬£¬£¬£¬ÕâЩ̻¶ÃÜÔ¿¶à°²ÅÅÓÚ½ðÈÚ»ú¹¹¡¢°²±£¹«Ë¾¡¢ÕÐÆ¸ÆóÒµµÈ×éÖ¯µÄÍøÕ¾Ô´´úÂëÖУ¬£¬£¬£¬£¬£¬£¬²¿·ÖÃÜÔ¿×Ô2023Äê2ÔÂÆð±ãÒ»Á¬Ì»Â¶¡£¡£¡£¡£¡£TruffleSecurityͨ¹ý²âÊÔGemini APIµÄ/models¶ËµãÑéÖ¤ÁËÃÜÔ¿µÄÓÐÓÃÐÔ£¬£¬£¬£¬£¬£¬£¬·¢Ã÷µ¥ÈÕ×î¸ß¿É±¬·¢ÊýǧÃÀÔªÓöȡ£¡£¡£¡£¡£ÎÊÌâȪԴÔÚÓÚ£¬£¬£¬£¬£¬£¬£¬¿ª·¢Õß´Ëǰ½«GoogleÔÆAPIÃÜÔ¿ÊÓΪ·ÇÃô¸ÐÊý¾Ý¹ûÕæ£¬£¬£¬£¬£¬£¬£¬¶øGeminiÍÆ³öºó£¬£¬£¬£¬£¬£¬£¬ÕâЩÃÜԿͻȻ»ñµÃ¸ü¸ßȨÏÞȴδ±»ÊµÊ±²ì¾õ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÓÚ2025Äê11ÔÂ21ÈÕÏò¹È¸è±¨¸æÎó²î£¬£¬£¬£¬£¬£¬£¬¹È¸èÀúʱÊýÔÂÓÚ2026Äê1ÔÂ13ÈÕ½«Æä¹éÀàΪ¡°µ¥Ð§ÀÍȨÏÞÌáÉý¡±¡£¡£¡£¡£¡£¹È¸èÒѽÓÄÉÆð¾¢²½·¥¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/previously-harmless-google-api-keys-now-expose-gemini-ai-data/
2. ManoManoÔâµÚÈý·½Ð§ÀÍÉ̺ڿÍÈëÇÖÖÂÊý¾Ýй¶
2ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬£¬·¨¹úDIYµçÉ̾ÞÍ·ManoMano¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬£¬ÆäÒ»¼ÒµÚÈý·½¿Í»§Ð§ÀÍÌṩÉÌÓÚ2026Äê1ÔÂÔâÓöºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÔ¼3800ÍòÓû§Êý¾Ýй¶¡£¡£¡£¡£¡£¸Ã¹«Ë¾Ö¤Êµ£¬£¬£¬£¬£¬£¬£¬ºÚ¿Íͨ¹ýδ¾ÊÚȨ»á¼û¸ÃÍ»Äá˹·Ö°üÉÌϵͳ£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡ÁËÓëÓû§ÕË»§¼°¿Í·þ»¥¶¯Ïà¹ØµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþ¡¢µç»°ºÅÂë¼°¿Í»§Ð§ÀÍÏàͬ¼Í¼£¬£¬£¬£¬£¬£¬£¬µ«Î´Éæ¼°ÕË»§ÃÜÂë»ò¹«Ë¾ÏµÍ³Êý¾ÝÐ޸ġ£¡£¡£¡£¡£×÷ΪŷÖÞÁìÏȵļҾÓ×°ÐÞ¡¢Ô°ÒÕ²úÆ·ÔÚÏßÊг¡£¬£¬£¬£¬£¬£¬£¬ManoManoÔÚ·¨¡¢±È¡¢Î÷¡¢Òâ¡¢µÂ¡¢Ó¢Áù¹úÔËÓª£¬£¬£¬£¬£¬£¬£¬Ô¾ù×ÔÁ¦·Ã¿Í´ï5000Íò¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÔ´ÓÚºÚ¿ÍÂÛ̳ÉϼÙÃû¡°Indra¡±µÄ¹¥»÷ÕßÐû³Æ¶ÔÈëÇÖÈÏÕæ£¬£¬£¬£¬£¬£¬£¬²¢Éù³Æ»ñÈ¡ÁË3780ÍòÓû§ÕË»§¼°Êýǧ·ÝÖ§³Ö¹¤µ¥Ó븽¼þ¡£¡£¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾HackmanacÖ¸³ö£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶ÈªÔ´»òÓëZendeskÊý¾Ýй¶Ïà¹Ø£¬£¬£¬£¬£¬£¬£¬µ«ManoManoδֱ½ÓÈ·ÈÏÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£ÊÂÎñÆØ¹âºó£¬£¬£¬£¬£¬£¬£¬ManoManoÁ¬Ã¦½ÓÄÉÓ¦¼±²½·¥£º½ûÓÃÏà¹Ø»á¼ûȨÏÞ¡¢×÷·Ï·Ö°üÉÌÊý¾Ý»á¼ûȨ¡¢Ç¿»¯»á¼û¿ØÖÆÓë¼à¿Ø£¬£¬£¬£¬£¬£¬£¬²¢Í¬²½×ª´ï·¨¹ú¹ú¼ÒÐÅÏ¢Óë×ÔÓÉίԱ»á£¨CNIL£©¼°¹ú¼Ò¿ÆÑ§Ó빤ҵÖÎÀí¾Ö£¨ANSSI£©¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/european-dyi-chain-manomano-data-breach-impacts-38-million-customers/
3. ÂíÈü×ãÇò¾ãÀÖ²¿ÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬40ÍòÓû§ÐÅÏ¢ÃæÁÙΣº¦
2ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬£¬·¨¹úÂíÈü°ÂÁÖÆ¥¿Ë×ãÇò¾ãÀÖ²¿£¨OM£©¿ËÈÕ֤ʵÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬³ÉΪ½üÆÚÕë¶Ô´óÐÍÌåÓý×éÖ¯ÍøÂçÇå¾²ÊÂÎñµÄ×îа¸Àý¡£¡£¡£¡£¡£¸Ã¾ãÀÖ²¿½¨ÉèÓÚ1899Ä꣬£¬£¬£¬£¬£¬£¬ÊÇ·¨¼×ÁªÈüÊ×´´³ÉÔ±Ö®Ò»£¬£¬£¬£¬£¬£¬£¬²¢ÓÚ1993Äê³ÉΪÊ×Ö§¶áµÃÅ·ÖÞ¹Ú¾üÁªÈü¹Ú¾üµÄ·¨¹úÇò¶Ó¡£¡£¡£¡£¡£¾ÝÍþвÐÐΪÕßÔÚºÚ¿ÍÂÛ̳Åû¶£¬£¬£¬£¬£¬£¬£¬ÆäÓÚ±¾Ô³õÈëÇÖ¾ãÀÖ²¿²¿·ÖЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡Á˰üÀ¨40ÍòÃûÔ±¹¤¡¢ÇòÃÔ¼°Ö§³ÖÕßÐÅÏ¢µÄÊý¾Ý¿â£¬£¬£¬£¬£¬£¬£¬ÏêϸÊý¾ÝÉæ¼°ÐÕÃû¡¢µØµã¡¢¶©µ¥¼Í¼¡¢µç×ÓÓʼþ¼°ÊÖ»úºÅÂë¡£¡£¡£¡£¡£¹¥»÷Õß»¹Éù³Æ»ñÈ¡ÁË2050¸öDrupal CMSÕË»§ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨34Ãû¾ãÀÖ²¿Ô±¹¤ºÍ1770ÃûТ˳Õß¡¢°æÖ÷µÄÕË»§Æ¾Ö¤¡£¡£¡£¡£¡£ÎªÖ¤Êµ¹¥»÷ÕæÊµÐÔ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¹ûÕæÁ˲¿·ÖÊý¾ÝÑù±¾£¬£¬£¬£¬£¬£¬£¬²¢ÊÔͼÔÚÂÛ̳³öÊÛËùν¡°2026Äê2Ô½ÇÖðÊý¾Ý¡±¡£¡£¡£¡£¡£¾ãÀÖ²¿ÔÚÖܶþÐû²¼µÄÉùÃ÷ÖÐÈ·ÈÏÁ˹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬µ«Ç¿µ÷¡°µÃÒæÓÚÊÖÒÕÍŶÓÓëרҵЧÀÍÉ̵ĿìËÙÏìÓ¦£¬£¬£¬£¬£¬£¬£¬ÊÂ̬ÒÑ»ñµÃ¿ØÖÆ¡±¡£¡£¡£¡£¡£ÏÖÔÚ¾ãÀÖ²¿ËùÓÐÓªÒµ¾ùÔÚÇå¾²ÇéÐÎÏÂÕý³£ÔËÐУ¬£¬£¬£¬£¬£¬£¬ÇÒÎÞÒøÐÐÐÅÏ¢»òÃÜÂëй¶¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬¾ãÀÖ²¿ÌåÏÖÈÔÔÚÊÓ²ìÊÂÎñÏêϸ¹æÄ££¬£¬£¬£¬£¬£¬£¬²¢ÒÑÏò·¨¹úÊý¾Ý±£»£»£»¤»ú¹¹£¨CNIL£©Õýʽ±¨¸æ£¬£¬£¬£¬£¬£¬£¬Í¬Ê±ºôÓõÇòÃÔСÐÄ´¹ÂÚ¹¥»÷¼°¿ÉÒɻ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/olympique-marseille-football-club-confirms-cyberattack-after-data-leak/
4. UAT-10027ʹÓÃDohdoorºóÃŹ¥»÷ÃÀ¹ú½ÌÓýºÍÒ½ÁƱ£½¡ÏµÍ³
2ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬£¬Cisco Talos¿ËÈÕÅû¶±àºÅΪUAT-10027µÄÍþв¼¯Èº£¬£¬£¬£¬£¬£¬£¬¸Ã¼¯Èº×Ô2025Äê12ÔÂÆðÒÔÃÀ¹ú½ÌÓý¼°Ò½ÁƱ£½¡»ú¹¹ÎªÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬°²ÅÅÁËÐÂÐͺóÃųÌÐòDohdoor¡£¡£¡£¡£¡£¹¥»÷³õʼ½×¶Îͨ¹ý´¹ÂÚÓʼþ´¥·¢PowerShell¾ç±¾£¬£¬£¬£¬£¬£¬£¬ÏÂÔØ¶ñÒâ.batÎļþ²¢Ê¹ÓÃDLL²àÔØÊÖÒÕ¼ÓÔØDohdoor¶ñÒâDLL¡£¡£¡£¡£¡£¸ÃºóÃÅͨ¹ýDNS over HTTPS£¨DoH£©ÓëCloudflare»ù´¡ÉèÊ©Òþ²ØC2ͨѶ£¬£¬£¬£¬£¬£¬£¬½«Á÷Á¿Î±×°³ÉÕýµ±HTTPSÅþÁ¬£¬£¬£¬£¬£¬£¬£¬ÊµÏÖÈÆ¹ý¹Å°åÇå¾²¼ì²âµÄÒ»Á¬»á¼û¡£¡£¡£¡£¡£DohdoorΪ2025Äê11Ô±àÒëµÄ64λDLL¼ÓÔØÆ÷£¬£¬£¬£¬£¬£¬£¬½ÓÄÉË«ÖØ½âÃÜ»úÖÆ£ºÅúÁ¿Êý¾ÝʹÓÃSIMDÖ¸ÁîµÄXOR-SUBËã·¨´¦Öóͷ££¬£¬£¬£¬£¬£¬£¬Ê£ÓàÊý¾Ýͨ¹ýλÖÃÏà¹Ø¹«Ê½½âÃÜ¡£¡£¡£¡£¡£ÆäC2ͨѶͨ¹ýÆÊÎöCloudflareµÄJSONÏìÓ¦»ñȡЧÀÍÆ÷IP£¬£¬£¬£¬£¬£¬£¬²¢Ä£ÄâcurlÁ÷Á¿·¢ËÍHTTPS GETÇëÇóÏÂÔØ¼ÓÃÜÔØºÉ¡£¡£¡£¡£¡£Îª¹æ±ÜEDR¼ì²â£¬£¬£¬£¬£¬£¬£¬Dohdoor»á¶¯Ì¬¶¨Î»ntdll.dllÖеÄNtProtectVirtualMemoryº¯Êý£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÐÞ²¹ÏµÍ³Å²Óôæ¸ù½¨ÉèÖ±½ÓϵͳŲÓÃÌø×ª£¬£¬£¬£¬£¬£¬£¬ÈƹýÓû§Ä£Ê½¹³×Ó¡£¡£¡£¡£¡£TalosÆÀ¹ÀÒÔΪ£¬£¬£¬£¬£¬£¬£¬Ö»¹ÜUAT-10027ÓëLazarus±£´æÊÖÒÕ¹ØÁª£¬£¬£¬£¬£¬£¬£¬µ«ÆäÄ¿µÄÁìÓòÌØÊâÐÔÈÔÐèÒýÆðÏà¹ØÐÐÒµ¸ß¶ÈСÐÄ¡£¡£¡£¡£¡£
https://securityaffairs.com/188558/apt/uat-10027-campaign-hits-u-s-education-and-healthcare-with-stealthy-dohdoor-backdoor.html
5. ³¯ÏÊAPT37×éÖ¯ÌᳫRuby Jumper¶ñÒâ»î¶¯
2ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬ÔÆÇå¾²¹«Ë¾Zscaler¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬£¬Óɳ¯Ïʹú¼ÒÖ§³ÖµÄºÚ¿Í×éÖ¯APT37ÌᳫµÄ"Ruby Jumper"¶ñÒâ»î¶¯£¬£¬£¬£¬£¬£¬£¬Õýͨ¹ý¿ÉÒÆ¶¯´æ´¢Çý¶¯Æ÷ÔÚÎïÀí¸ôÀëϵͳÓëÁªÍøÏµÍ³¼ä½¨ÉèÒþ²ØÊý¾Ý´«ÊäͨµÀ¡£¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚÊܺ¦Õß·¿ªÎ±×°³É³¯ÏÊýÌ幨ÓÚ°ÍÒÔ³åÍ»°¢À²®ÓïÒë±¾µÄ¶ñÒâLNKÎļþ£¬£¬£¬£¬£¬£¬£¬¸ÃÎļþ»á°²ÅÅPowerShell¾ç±¾ÌáÈ¡ÓÐÓÃÔØºÉ²¢Æô¶¯ÓÕ¶üÎĵµ¡£¡£¡£¡£¡£¾ç±¾Ê×ÏȼÓÔØRESTLEAFÖ²Èë³ÌÐò£¬£¬£¬£¬£¬£¬£¬Í¨¹ýZoho WorkDriveÓëC2ЧÀÍÆ÷ͨѶ£¬£¬£¬£¬£¬£¬£¬»ñÈ¡¼ÓÃÜshellcodeºóÏÂÔØ»ùÓÚRubyµÄSNAKEDROPPER¼ÓÔØÆ÷¡£¡£¡£¡£¡£¸Ã¼ÓÔØÆ÷»á×°ÖÃαװ³Éusbspeed.exeµÄRuby 3.3.0ÔËÐÐʱÇéÐΣ¬£¬£¬£¬£¬£¬£¬²¢Í¨¹ýÿÎå·ÖÖÓÖ´ÐеÄÍýÏëʹÃüÌæ»»RubyGemsĬÈÏÎļþ£¬£¬£¬£¬£¬£¬£¬ÊµÏÖ×Ô¶¯¼ÓÔØ¡£¡£¡£¡£¡£THUMBSBDºóÃÅÒÔascii.rbÎļþÐÎʽÏÂÔØ£¬£¬£¬£¬£¬£¬£¬ÈÏÕæÍøÂçϵͳÐÅÏ¢¡¢ÔÝ´æÏÂÁîÎļþ£¬£¬£¬£¬£¬£¬£¬²¢ÔÚUSBÇý¶¯Æ÷½¨ÉèÒþ²ØÄ¿Â¼¾ÙÐÐÊý¾ÝË«Ïò´«Ê䣬£¬£¬£¬£¬£¬£¬½«¿ÉÒÆ¶¯½éÖÊת»¯Îª"Òþ²ØC2ÖмÌ"¡£¡£¡£¡£¡£VIRUSTASKÔòͨ¹ýÌæ»»Õýµ±ÎļþΪ¶ñÒâ¿ì½Ý·½·¨£¬£¬£¬£¬£¬£¬£¬ÔÚÇý¶¯Æ÷ÓÐ2GBÒÔÉϿռäʱ´¥·¢Ñ¬È¾£¬£¬£¬£¬£¬£¬£¬ÏòÐÂÎïÀí¸ôÀë×°±¸Èö²¥¡£¡£¡£¡£¡£FOOTWINEÌØ¹¤Èí¼þαװ³ÉAPKÎļþ£¬£¬£¬£¬£¬£¬£¬Ö§³Ö¼üÅ̼ͼ¡¢ÆÁÄ»½ØÍ¼¡¢ÒôÊÓÆµÂ¼ÖƵÈÔ¶³Ì²Ù×÷¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/
6. RESURGE¶ñÒâÈí¼þʵÏÖIvanti×°±¸Òþ²Ø³¤ÆÚÈëÇÖ
2ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕÐû²¼Á˹ØÓÚRESURGE¶ñÒâÖ²Èë³ÌÐòµÄ×îÐÂÊÖÒÕϸ½Ú¡£¡£¡£¡£¡£¸Ã³ÌÐò±»ÓÃÓÚʹÓÃCVE-2025-0282ÁãÈÕÎó²îÈëÇÖIvanti Connect Secure×°±¸£¬£¬£¬£¬£¬£¬£¬¾ßÓÐÑÓ³ÙÆô¶¯¡¢ÖØ´óÍøÂç¼¶¹æ±ÜºÍÈÏÖ¤ÊÖÒÕµÈÌØÕ÷£¬£¬£¬£¬£¬£¬£¬¿ÉʵÏÖÒþ²ØÍ¨Ñ¶Ó볤ÆÚÐÔפÁô¡£¡£¡£¡£¡£¾ÝCISAÆÊÎö£¬£¬£¬£¬£¬£¬£¬RESURGEÊÇÒ»¸öÃûΪlibdsupgrade.soµÄ32λLinux¹²Ïí¹¤¾ßÎļþ£¬£¬£¬£¬£¬£¬£¬¾ß±¸rootkit¡¢bootkit¡¢ºóÃÅ¡¢Í¶·ÅÆ÷¡¢ÊðÀíºÍËíµÀµÈ¶àÖØ¹¦Ð§¡£¡£¡£¡£¡£ÆäÆæÒìÖ®´¦ÔÚÓÚ²»×Ô¶¯ÏòC2ЧÀÍÆ÷·¢ËÍÐű꣬£¬£¬£¬£¬£¬£¬¶øÊÇÎÞÏÞÆÚÆÚ´ýÌØ¶¨ÈëÕ¾TLSÅþÁ¬£¬£¬£¬£¬£¬£¬£¬Í¨¹ýCRC32 TLSÖ¸ÎÆ¹þÏ£¼Æ»®Ê¶±ð¹¥»÷ÕßµÄÅþÁ¬ÊµÑé¡£¡£¡£¡£¡£µ±ÔÚ"web"Àú³ÌϼÓÔØÊ±£¬£¬£¬£¬£¬£¬£¬Ëü»á¹Ò¹³"accept()"º¯Êý£¬£¬£¬£¬£¬£¬£¬ÔÚÁ÷Á¿µÖ´ïЧÀÍÆ÷ǰ¼ì²éTLSÊý¾Ý°ü£¬£¬£¬£¬£¬£¬£¬ÈôÖ¸ÎÆÆ¥ÅäÔò½¨ÉèË«ÏòTLS»á»°£¬£¬£¬£¬£¬£¬£¬²»È»½«Á÷Á¿µ¼ÏòÕýµ±IvantiЧÀÍÆ÷¡£¡£¡£¡£¡£¹¥»÷Õß»¹Ê¹ÓÃαÔìµÄIvantiÖ¤Êé¾ÙÐÐÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬£¬¸ÃÖ¤Êé½öÓÃÓÚÈÏÖ¤¶ø·Ç¼ÓÃÜ£¬£¬£¬£¬£¬£¬£¬ÇÒͨ¹ý»¥ÁªÍøÃ÷ÎÄ´«Ê䣬£¬£¬£¬£¬£¬£¬·ÀÓùÕ߿ɽ«Æä×÷ÎªÍøÂçÊðÃû¼ì²âÈëÇÖ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-warns-that-resurge-malware-can-be-dormant-on-ivanti-devices/


¾©¹«Íø°²±¸11010802024551ºÅ