¹ú¼Ê¡°¶ÏµçÐж¯¡±ÖØ´ìDDoS¹¥»÷£¬£¬£¬£¬³¬ÆßÍòÓû§ÔâÖÒÑÔ
Ðû²¼Ê±¼ä 2026-04-171. ¹ú¼Ê¡°¶ÏµçÐж¯¡±ÖØ´ìDDoS¹¥»÷£¬£¬£¬£¬³¬ÆßÍòÓû§ÔâÖÒÑÔ
4ÔÂ16ÈÕ£¬£¬£¬£¬ÔÚ¹ú¼ÊÖ´·¨Ðж¯¡°¶ÏµçÐж¯¡±µÄ×îн׶ÎÖУ¬£¬£¬£¬È«Çò21¸ö¹ú¼ÒÐͬ·¢Á¦£¬£¬£¬£¬¶ÔÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷¹¤ÒµÁ´¾ÙÐÐÁËÉî¶È¹¥»÷¡£¡£¡£¡£¡£´Ë´ÎÐж¯ÓÉÅ·ÖÞÐ̾¯×éÖ¯Ö§³Ö£¬£¬£¬£¬ÒÑÏòÁè¼Ý75,000ÃûʹÓÃÏà¹ØÆ½Ì¨Ìᳫ²»·¨¹¥»÷µÄСÎÒ˽¼Ò·¢ËÍÁËÖÒÑÔÓʼþ»òÐżþ¡£¡£¡£¡£¡£Ðж¯Ê±´ú£¬£¬£¬£¬Ö´·¨²¿·Ö¾Ð²¶ÁËËÄÃûÏÓÒÉÈË£¬£¬£¬£¬²é·âÁË53¸öÉæÊÂÓòÃû£¬£¬£¬£¬²¢Ö´ÐÐÁË25·ÝËѲéÁî¡£¡£¡£¡£¡£¼ÓÈë¹ú¼Òº¸Ç¶à¸öÅ·Ã˳ÉÔ±¹ú£¬£¬£¬£¬ÒÔ¼°°Ä´óÀûÑÇ¡¢Ì©¹ú¡¢ÃÀ¹ú¡¢Ó¢¹ú¡¢ÈÕ±¾ºÍ°ÍÎ÷£¬£¬£¬£¬Õ¹ÏÖÁËÈ«ÇòÁªºÏ¹¥»÷ÍøÂç·¸·¨µÄ¿ÌÒâ¡£¡£¡£¡£¡£¡°¶ÏµçÐж¯¡±´ËǰÒѲð³ýÁË´ó×ÚÒªº¦»ù´¡ÉèÊ©£¬£¬£¬£¬²¢²é»ñÁ˰üÀ¨Óâ300Íò¸ö·¸·¨ÕË»§µÄÊý¾Ý¿â¡£¡£¡£¡£¡£ÔÚ×îн׶Σ¬£¬£¬£¬Ðж¯ÖصãתÏòÔ¤·ÀÓëÕðÉå¡£¡£¡£¡£¡£¸÷¹úר¼ÒÔÚ¡°Ðж¯ÖÜ¡±Ç°¿ªÕ¹ÁËϵÁгå´ÌÐж¯£¬£¬£¬£¬¾Û½¹ÓÚDDoS¹¥»÷ƽ̨µÄ¸ß¼ÛֵĿµÄÓû§£¬£¬£¬£¬Í¬Ê±ÌáÉý¹«ÖÚ¶ÔÕâÀà»î¶¯²»·¨ÐÔµÄÈÏÖª¡£¡£¡£¡£¡£Ö´·¨»ú¹¹²»µ«µ·»ÙÁ˲»·¨¹¥»÷ЧÀ͵ÄÊÖÒÕÉèÊ©£¬£¬£¬£¬»¹¶Ô¡°BooterЧÀÍ¡±¾ÙÐÐÁËϵͳÐÔÕûÀí¡£¡£¡£¡£¡£Ö»¹Ü²¿·ÖÔËÓªÕßÒÔ¡°Õýµ±Ñ¹Á¦²âÊÔ¡±Îª»Ï×ÓÑÚÊÎÆäÕæÊµÄ¿µÄ£¬£¬£¬£¬µ«ÓÉÓÚÆ½Ì¨È±·¦¶Ô¹¥»÷Ä¿µÄËùÓÐȨµÄÑéÖ¤£¬£¬£¬£¬ÕâЩЧÀÍÏÖʵÉϺã¾Ã±»ÓÃÓÚ²»·¨¹¥»÷¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/operation-poweroff-identifies-75k-ddos-users-takes-down-53-domains/
2. ÐÂÐͶñÒâÈí¼þZionSiphonÃé×¼ÒÔÉ«ÁÐË®ÉèÊ©
4ÔÂ16ÈÕ£¬£¬£¬£¬Ò»¿îÃûΪZionSiphonµÄÐÂÐͶñÒâÈí¼þרÃÅÕë¶ÔÔËÓªÊÖÒÕÁìÓò£¬£¬£¬£¬ÓÈÆäÒÔË®´¦Öóͷ£ºÍº£Ë®µ»¯ÇéÐÎΪ¹¥»÷Ä¿µÄ£¬£¬£¬£¬ÊÔͼͨ¹ýµ÷ÀíҺѹºÍ½«ÂȺ¬Á¿ÌáÉýÖÁΣÏÕˮƽÀ´ÆÆËðÒªº¦»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¸ÃÈí¼þÓÉÈ˹¤ÖÇÄÜÍøÂçÇå¾²¹«Ë¾Darktrace·¢Ã÷£¬£¬£¬£¬ÆäIP¶¨Î»¼°Ç¶Èë×Ö·û´®ÖеÄÕþÖÎÐÅÏ¢ÏÔʾ£¬£¬£¬£¬ËüËÆºõרעÓÚ¹¥»÷λÓÚÒÔÉ«ÁеÄÄ¿µÄ¡£¡£¡£¡£¡£°²Åź󣬣¬£¬£¬ZionSiphon»á¼ì²éÖ÷»úIPÊÇ·ñÔÚÒÔÉ«ÁйæÄ£ÄÚ£¬£¬£¬£¬²¢È·ÈÏϵͳÊÇ·ñ°üÀ¨ÓëË®»òÔËÓªÊÖÒÕÏà¹ØµÄÈí¼þ¼°Îļþ£¬£¬£¬£¬ÒÔÈ·±£ÆäÔËÐÐÓÚË®´¦Öóͷ£»òº£Ë®µ»¯ÏµÍ³ÖС£¡£¡£¡£¡£ÈôÌõ¼þÖª×㣬£¬£¬£¬Ëü»áͨ¹ýÃûΪ¡°IncreaseChlorineLevel()¡±µÄº¯Êý£¬£¬£¬£¬ÔÚÏÖÓÐÉèÖÃÎļþÖÐÌí¼ÓÎı¾¿é£¬£¬£¬£¬ÔÚ¹¤³§»úеϵͳÎïÀíÖ§³Ö¹æÄ£ÄÚ×î´óÏÞ¶ÈÌá¸ßÂȵļÁÁ¿ºÍÁ÷Á¿£¬£¬£¬£¬Í¬Ê±¿ªÆôÂȱᢷ§ÃŲ¢½«·´ÉøÍ¸Ñ¹Á¦µ÷ÖÁ80¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þ»¹»áɨÃèÍâµØ×ÓÍøÖеÄModbus¡¢DNP3ºÍS7commµÈ¹¤Òµ¿ØÖÆÍ¨Ñ¶ÐÒ飬£¬£¬£¬ÒâͼÓ빤ҵ¿ØÖÆÏµÍ³Ö±½Ó½»»¥¡£¡£¡£¡£¡£ZionSiphon»¹¾ß±¸USBÈö²¥»úÖÆ£¬£¬£¬£¬¿É½«×ÔÉí¸´ÖÆµ½¿ÉÒÆ¶¯Çý¶¯Æ÷²¢ÒÔÒþ²ØµÄ¡°svchost.exe¡±Àú³ÌÔËÐУ¬£¬£¬£¬Í¬Ê±½¨Éè¶ñÒâ¿ì½Ý·½·¨Îļþ¡£¡£¡£¡£¡£ÓÉÓÚÖÎÀíÒªº¦¹¦Ð§µÄÅÌËã»úͨ³£´¦ÓÚÎïÀí¸ôÀë״̬£¬£¬£¬£¬²»Ö±½ÓÅþÁ¬»¥ÁªÍø£¬£¬£¬£¬USB³ÉΪ´ËÀ๥»÷µÄÖ÷ÒªÈö²¥Í¾¾¶¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/zionsiphon-malware-designed-to-sabotage-water-treatment-systems/
3. н©Ê¬ÍøÂçPowMixÒԽݿËÀͶ¯Á¦ÎªÄ¿µÄ
4ÔÂ16ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬Ò»³¡Õë¶Ô½Ý¿Ë¹²ºÍ¹úÀͶ¯Á¦µÄ¶ñÒâ¹¥»÷»î¶¯ÕýÔÚÒ»Á¬¾ÙÐУ¬£¬£¬£¬ÆäʹÓÃÒ»¸öÃûΪPowMixµÄ´Ëǰδ±»¼Í¼µÄ½©Ê¬ÍøÂ磬£¬£¬£¬ÖÁÉÙ´Ó2025Äê12ÔÂ×îÏÈ»îÔ¾¡£¡£¡£¡£¡£¾ÝCisco TalosÑо¿Ô±Chetan Raghuprasad±¨¸æ£¬£¬£¬£¬PowMix½ÓÄÉËæ»úµÄÏÂÁîÓë¿ØÖÆ£¨C2£©Ðűê¾àÀ룬£¬£¬£¬¶ø·ÇÓëC2ЧÀÍÆ÷¼á³ÖÒ»Á¬ÅþÁ¬£¬£¬£¬£¬ÒԴ˹æ±ÜÍøÂçÊðÃû¼ì²â¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ½«¼ÓÃܵÄÐÄÌøÊý¾Ý¼°Êܺ¦Õß»úеµÄΨһ±êʶ·ûǶÈëC2 URL·¾¶ÖУ¬£¬£¬£¬Ä£ÄâÕýµ±µÄREST API URL£¬£¬£¬£¬²¢Äܹ»Ô¶³Ì¶¯Ì¬µØ½«ÐµÄC2ÓòÃû¸üе½½©Ê¬ÍøÂçÉèÖÃÎļþÖС£¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚÒ»¸ö¶ñÒâZIPÎļþ£¬£¬£¬£¬¸ÃÎļþ¼¤»î¶à½×¶ÎѬȾÁ´£¬£¬£¬£¬×îÖÕÊÍ·ÅPowMix¡£¡£¡£¡£¡£Ñ¬È¾Á´Éæ¼°Ò»¸öWindows¿ì½Ý·½·¨£¨LNK£©£¬£¬£¬£¬ÓÃÓÚÆô¶¯PowerShell¼ÓÔØÆ÷£¬£¬£¬£¬ºóÕßÌáȡǶÈëÔÚѹËõ°üÖеĶñÒâÈí¼þ£¬£¬£¬£¬½âÃܺóÔÚÄÚ´æÖÐÔËÐС£¡£¡£¡£¡£ÕâÖÖÐÂÐͽ©Ê¬ÍøÂçÖ¼ÔÚʵÏÖÔ¶³Ì»á¼û¡¢Õì̽ºÍÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬Í¨¹ý׼ʱʹÃü½¨É賤ÆÚÐÔ£¬£¬£¬£¬²¢ÑéÖ¤Àú³ÌÊ÷ÒÔ±ÜÃâͳһÖ÷»úÉÏÔËÐжà¸ö¶ñÒâÈí¼þʵÀý¡£¡£¡£¡£¡£Óë´Ëͬʱ£¬£¬£¬£¬¹¥»÷Õß»¹»á·¿ªÒԺϹæÎªÖ÷ÌâµÄÓÕ¶üÎļþ£¬£¬£¬£¬Ìá¼°EdekaµÈÕýµ±Æ·ÅƲ¢°üÀ¨Ð½³êÊý¾Ý¼°Ö´ÂÉÀýÔò²Î¿¼£¬£¬£¬£¬ÒÔÊèÉ¢×¢ÖØÁ¦²¢ÔöÇ¿ÓÕÆÐÔ¡£¡£¡£¡£¡£
https://thehackernews.com/2026/04/newly-discovered-powmix-botnet-hits.html
4. Rhysida¹¥»÷ÖÂÃÀÒ½ÁÆÖÐÐÄ33.7ÍòÈËÊý¾Ýй¶
4ÔÂ16ÈÕ£¬£¬£¬£¬ÌïÄÉÎ÷ÖÝ¿â¿Ëά¶ûµØÇøÒ½ÁÆÖÐÐÄ£¨CRMC£©ÓÚ2025Äê7ÔÂÔâÊÜRhysidaÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬£¬£¬µ¼ÖÂÔ¼33.7ÍòÈ˵ÄСÎÒ˽¼Ò¼°Ò½ÁÆÐÅϢй¶¡£¡£¡£¡£¡£¸ÃÖÐÐÄÓÚ7ÔÂ14ÈÕ¼ì²âµ½¿ÉÒɻºó£¬£¬£¬£¬Ñ¸ËÙÁªºÏÖ´·¨²¿·Ö¼°·¨Ö¤¹«Ë¾Õö¿ªÊӲ죬£¬£¬£¬È·ÈÏÔÚ7ÔÂ11ÈÕÖÁ14ÈÕʱ´ú£¬£¬£¬£¬ÓÐδ¾ÊÚȨµÄµÚÈý·½»á¼ûÁËÒ½ÔºÍøÂ磬£¬£¬£¬¿ÉÄÜÉó²é»òÇÔÈ¡ÁË´ó×ÚÃô¸ÐÎļþ¡£¡£¡£¡£¡£¾ÖÜÈ«Éó²éÊÜÓ°ÏìÎļþºó£¬£¬£¬£¬CRMCÈ·ÈÏй¶ÐÅÏ¢ÒòСÎÒ˽¼ÒÇéÐζøÒ죬£¬£¬£¬¿ÉÄܰüÀ¨ÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢ÒøÐÐÕ˺š¢Ò½ÁÆÐÅÏ¢¡¢²¡ÀúºÅ¼°¿µ½¡°ü¹Üµ¥ÐÅÏ¢¡£¡£¡£¡£¡£Ò½ÔºÕýÔÚͨ¹ýÓʼþÏòÓµÓÐÓÐÓõصãµÄÊÜÓ°ÏìСÎÒ˽¼Ò¼ÄËÍ֪ͨÐÅ£¬£¬£¬£¬½¨ÒéÊÕÐÅÈË×ñÕÕÐÅÖÐÖ¸Òý±£»£»£»£»¤×ÔÉíÈ¨Òæ¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚÉÐδ֤ʵÒѱ¬·¢Êý¾ÝÀÄÓ㬣¬£¬£¬CRMCÈÔΪÊÜÓ°ÏìÕßÌṩÃâ·ÑµÄÉí·Ý͵ÇÔ±£»£»£»£»¤Ð§ÀÍ£¬£¬£¬£¬²¢±Þ²ß¹«ÖÚÇ×½ü¹Ø×¢ÕË»§ºÍÐÅÓñ¨¸æ£¬£¬£¬£¬ÊµÊ±¾Ù±¨¿ÉÒɻ£¬£¬£¬£¬ÐëҪʱÁªÏµÓйز¿·Ö¡£¡£¡£¡£¡£Ò½Ôº»¹ÒýÓÃÁËÁª°îÉÌҵίԱ»áµÄ×ÊÔ´£¬£¬£¬£¬Îª¹«ÖÚÌṩڲƾ¯±¨¼°ÐÅÓñ£»£»£»£»¤µÄÏà¹ØÌáÐÑ¡£¡£¡£¡£¡£2025Äê8Ô£¬£¬£¬£¬RhysidaÀÕË÷Èí¼þ×éÖ¯½«¸ÃÒ½ÁÆÖÐÐÄÌí¼ÓÖÁÆäTorÊý¾Ýй¶վµã£¬£¬£¬£¬Éù³ÆÇÔÈ¡ÁË538GBÊý¾Ý¡£¡£¡£¡£¡£ÓÉÓÚÎÞÈ˹ºÖÃÕâЩ±»µÁÊý¾Ý£¬£¬£¬£¬¸Ã×éÖ¯×îÖÕ½«ÆäÃâ·Ñ¹ûÕæÐ¹Â¶¡£¡£¡£¡£¡£
https://securityaffairs.com/190898/cyber-crime/cookeville-regional-medical-center-hospital-data-breach-impacts-337917-people.html
5. ATHRƽ̨4000ÃÀÔª³öÊÛ£¬£¬£¬£¬È«×Ô¶¯ÓïÒô´¹ÂÚÇÔȡƾ֤
4ÔÂ16ÈÕ£¬£¬£¬£¬Ò»ÖÖÃûΪATHRµÄÐÂÐÍÍøÂç·¸·¨Æ½Ì¨ÕýÒÔ4000ÃÀÔªµÄ¼ÛÇ®ÔÚµØÏÂÂÛ̳³öÊÛ£¬£¬£¬£¬²¢ÊÕÈ¡10%µÄÀûÈóÓ¶½ð¡£¡£¡£¡£¡£¸Ãƽ̨Äܹ»Í¨¹ýÈ«×Ô¶¯ÓïÒôÍøÂç´¹ÂÚ¹¥»÷ÇÔÈ¡°üÀ¨Google¡¢Microsoft¡¢CoinbaseÔÚÄڵĶàÏîЧÀ͵Ǽƾ֤£¬£¬£¬£¬ÆäÉç»á¹¤³Ì½×¶ÎͬʱʹÓÃÈËÀà²Ù×÷Ô±ºÍÈ˹¤ÖÇÄÜÊðÀí¡£¡£¡£¡£¡£¾ÝÔÆµç×ÓÓʼþÇå¾²¹«Ë¾AbnormalµÄÑо¿Ö°Ô±ÆÊÎö£¬£¬£¬£¬ATHRÊÇÒ»¸öÍêÕûµÄÍøÂç´¹ÂÚÓëÓïÒô´¹ÂÚ¹¥»÷ÌìÉúÆ÷£¬£¬£¬£¬Ìá¹©Æ·ÅÆÌØ¶¨µÄµç×ÓÓʼþÄ£°å¡¢Õë¶Ôÿ¸öÄ¿µÄµÄ¶¨Öƹ¦Ð§ÒÔ¼°ÓÕÆ»úÖÆ£¬£¬£¬£¬Ê¹Óʼþ¿´ËÆÀ´×Ô¿ÉÐÅ·¢¼þÈË¡£¡£¡£¡£¡£ÏÖÔÚ¸ÃÆ½Ì¨Ö§³Ö°ËÏîÔÚÏßЧÀÍ£ºGoogle¡¢Microsoft¡¢Coinbase¡¢Binance¡¢Gemini¡¢Crypto.com¡¢YahooºÍAOL¡£¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚÊܺ¦ÕßÊÕµ½Ò»·âÈ«ÐÄÉè¼ÆµÄµç×ÓÓʼþ£¬£¬£¬£¬ÄÚÈÝͨ³£ÎªÐéαµÄÇå¾²¾¯±¨»òÕÊ»§Í¨Öª£¬£¬£¬£¬½ôÆÈˮƽ×ãÒÔ´ÙʹÓû§²¦´òµç»°£¬£¬£¬£¬µ«ÓÖ×ã¹»ÁýͳÒԱܿª»ùÓÚÄÚÈݵĹýÂËÆ÷¡£¡£¡£¡£¡£²¦´òÓʼþÖеĵ绰ºÅÂëºó£¬£¬£¬£¬Êܺ¦Õß»áͨ¹ýAsteriskºÍWebRTCÅþÁ¬µ½AIÓïÒôÊðÀí£¬£¬£¬£¬ÕâЩÊðÀíÆ¾Ö¤¶à°ì·¨¾ç±¾Ä£ÄâÇå¾²ÊÂÎñ¡£¡£¡£¡£¡£Æ½Ì¨ÒDZíÅÌʹ²Ù×÷Ô±Äܹ»¿ØÖÆÕû¸öÁ÷³Ì£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþ·Ö·¢¡¢µç»°ÖÎÀíºÍʵʱ¼à¿Ø£¬£¬£¬£¬²¢ÎüÊÕ°üÀ¨±»µÁÊý¾ÝµÄÈÕÖ¾¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-athr-vishing-platform-uses-ai-voice-agents-for-automated-attacks/
6. ºÚ¿ÍʹÓÃMarimoÎó²î°²ÅÅNKAbuseбäÖÖ
4ÔÂ16ÈÕ£¬£¬£¬£¬ºÚ¿ÍÕýÔÚʹÓÃMarimoÏìӦʽPython notebookÖеÄÒ»¸öÑÏÖØÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2026-39987£©£¬£¬£¬£¬°²ÅÅÍйÜÔÚHugging Face Spacesƽ̨ÉϵÄNKAbuse¶ñÒâÈí¼þбäÖÖ¡£¡£¡£¡£¡£¾ÝÔÆÇå¾²¹«Ë¾SysdigÊý¾Ý£¬£¬£¬£¬Ïà¹Ø¹¥»÷ÔÚÉÏÖÜ×îÏÈ£¬£¬£¬£¬Ä¿µÄÊÇÇÔȡƾ֤£¬£¬£¬£¬¶ø´Ëʱ¾àÀëÊÖÒÕϸ½Ú¹ûÕæÅû¶Éв»µ½10Сʱ¡£¡£¡£¡£¡£SysdigÑо¿Ö°Ô±»¹·¢Ã÷ÁËÆäËû¹¥»÷»î¶¯£¬£¬£¬£¬°üÀ¨4ÔÂ12ÈÕ×îÏȵÄÒ»ÏîÐж¯£¬£¬£¬£¬¸ÃÐж¯ÀÄÓÃHugging Face Spacesƽ̨£¬£¬£¬£¬¸Ãƽ̨ÔÊÐíÓû§´ÓGit¿ÍÕ»°²Åź͹²Ïí½»»¥Ê½WebÓ¦ÓóÌÐò£¬£¬£¬£¬Í¨³£ÓÃÓÚAIÏà¹ØµÄÑÝʾÓëʵÑé¡£¡£¡£¡£¡£ÔÚSysdigÊӲ쵽µÄ¹¥»÷ÖУ¬£¬£¬£¬¹¥»÷Õß½¨ÉèÁËÒ»¸öÃûΪ¡°vsccode-modetx¡±µÄ¿Õ¼ä£¬£¬£¬£¬ÆäÖÐÍйÜÁËÒ»¸öͶ·Å¾ç±¾ºÍÒ»¸öÃûΪ¡°kagent¡±µÄ¶ñÒâÈí¼þ¶þ½øÖÆÎļþ£¬£¬£¬£¬ÊÔͼģÄâÕýµ±µÄKubernetes AIÊðÀí¹¤¾ß¡£¡£¡£¡£¡£Ê¹ÓÃMarimoÎó²îºó£¬£¬£¬£¬¹¥»÷ÕßÔËÐÐcurlÏÂÁî´ÓHugging FaceÏÂÔØ²¢Ö´Ðо籾¡£¡£¡£¡£¡£¸ÃͶ·Å¾ç±¾ÏÂÔØkagent¶þ½øÖÆÎļþ£¬£¬£¬£¬½«Æä×°Öõ½ÍâµØ£¬£¬£¬£¬²¢Í¨¹ýsystemd¡¢cron»òmacOS LaunchAgentÉèÖó¤ÆÚÐÔ¡£¡£¡£¡£¡£¸ÃÓÐÓÃÔØºÉÊÇ´Ëǰδ±»¼Í¼µÄDDoS¹¥»÷¶ñÒâÈí¼þNKAbuseµÄ±äÖÖ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-marimo-flaw-to-deploy-nkabuse-malware-from-hugging-face/


¾©¹«Íø°²±¸11010802024551ºÅ