÷è÷ëÀÕË÷Èí¼þ¹¥»÷CornerstoneÈËÁ¦×ÊÔ´¹«Ë¾

Ðû²¼Ê±¼ä 2025-11-18

1. ÷è÷ëÀÕË÷Èí¼þ¹¥»÷CornerstoneÈËÁ¦×ÊÔ´¹«Ë¾


11ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹ú¿Æ¼¼ÕÐÆ¸¾ÞÍ·Cornerstone Staffing Solutions¿ËÈÕÔâ÷è÷ëÀÕË÷Èí¼þ×éÖ¯¹¥»÷£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯Ðû³ÆÇÔÈ¡ÁËÁè¼Ý12Íò·ÝÇóÖ°Õß¼òÀú¼°³¬100Íò·Ý¹«Ë¾Îļþ¡£¡£¡£¡£¡£¡£¡£÷è÷ëÍÅ»ïÔÚ°µÍøÐ¹Â¶²©¿Í¹ûÕæ300GBÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÒÔ¡°ÐÕÃû+Resume.pdf¡±ÃûÌô洢µÄ12Íò·Ý¼òÀú£¬£¬£¬£¬£¬£¬£¬²¢Éù³ÆÕâЩÎļþÊôÓÚÔ¼100Íò·Ý°üÀ¨2400ÍòÌõСÎÒ˽¼ÒÐÅÏ¢µÄÎĵµµÄÒ»²¿·Ö¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ýº­¸ÇÉç»á°ü¹ÜºÅÂë¡¢µØµã¡¢ÓÊÏä¡¢µç»°¡¢Ð½×ÊÐÅÏ¢¼°±£ÃÜЭÒéµÈ£¬£¬£¬£¬£¬£¬£¬Éæ¼°ÇóÖ°Õß¼°Ô±¹¤Éí·ÝÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£Cornerstone½¨ÉèÓÚ2003Ä꣬£¬£¬£¬£¬£¬£¬×ܲ¿Î»ÓھɽðɽÍåÇø£¬£¬£¬£¬£¬£¬£¬ÔÚÃÀ¹ú¶àÖÝÉèÓÐЧÀÍ´¦£¬£¬£¬£¬£¬£¬£¬×¨×¢ÊÖÒÕ¡¢¹¤³Ì¡¢ÎïÁ÷¡¢ÖÆÔìµÈÁìÓòÕÐÆ¸£¬£¬£¬£¬£¬£¬£¬Ã¿ÄêЭÖú³¬1ÍòÃûÇóÖ°Õß¾ÍÒµ¡£¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÉÐδ»ØÓ¦Ã½ÌåÎÊѯ¡£¡£¡£¡£¡£¡£¡£÷è÷ëÀÕË÷Èí¼þ×éÖ¯½¨ÉèÓÚ2021Ä꣬£¬£¬£¬£¬£¬£¬2022Äê½øÈ빫ÖÚÊÓÒ°£¬£¬£¬£¬£¬£¬£¬2025Äê³ÉΪȫÇò×î»îÔ¾ÀÕË÷Èí¼þ×éÖ¯£¬£¬£¬£¬£¬£¬£¬°ëÄêÄÚ·¢¶¯³¬500Æð¹¥»÷¡£¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/cornerstone-staffing-ransomware-attack-qilin-group-exposes-resumes/


2. AIPACÊý¾Ýй¶£ºµÚÈý·½ÈëÇÖÖÂ810ÈËÐÅϢй¶


11ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÒÔÉ«Áй«¹²ÊÂÎñίԱ»á£¨AIPAC£©Åû¶£¬£¬£¬£¬£¬£¬£¬ÒòµÚÈý·½¹«Ë¾ÏµÍ³ÔâÍⲿÈëÇÖ£¬£¬£¬£¬£¬£¬£¬Æä´æ´¢µÄ810ÈËСÎÒ˽¼ÒÐÅÏ¢ÓÚ2024Äê10ÔÂ20ÈÕÖÁ2025Äê2ÔÂ6ÈÕʱ´ú±»²»·¨»á¼û¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÉæ¼°Ò»ÃûÃåÒòÖÝסÃñ£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶Êý¾Ý¿ÉÄܰüÀ¨ÐÕÃû¡¢Éç»á°ü¹ÜºÅÂë¡¢»¤ÕÕºÅÂë¡¢¼Òͥסַ¡¢ÁªÏµ·½·¨¡¢Ö§¸¶¿¨ÐÅÏ¢¼°ÒøÐÐÕË»§µÈÃô¸ÐСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©¡£¡£¡£¡£¡£¡£¡£AIPACÓÚ11ÔÂ13ÈÕͨ¹ýµç×ÓÓʼþ֪ͨÊÜÓ°ÏìÕߣ¬£¬£¬£¬£¬£¬£¬²¢Ç¿µ÷δ·¢Ã÷Êý¾ÝÀÄÓü£Ï󣬣¬£¬£¬£¬£¬£¬ÏÖÔÚÎÞ×éÖ¯Ðû³Æ¶Ô´ËÈÏÕæ¡£¡£¡£¡£¡£¡£¡£ÎªÓ¦¶ÔΣº¦£¬£¬£¬£¬£¬£¬£¬AIPACΪÊÜÓ°ÏìÕßÌṩΪÆÚ12¸öÔµÄIDXÉí·Ý±£»£»£» £»£»£»¤Ð§ÀÍ£¬£¬£¬£¬£¬£¬£¬º­¸ÇÐÅÓÃ¼à¿Ø¡¢ÍøÂçɨÃè¡¢°ü¹ÜÅâ³¥¼°Éí·Ý»Ö¸´Ö§³Ö¡£¡£¡£¡£¡£¡£¡£ÊÂÎñºó£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯ÒÑʵÑé¶àÏîÇå¾²Éý¼¶²½·¥£¬£¬£¬£¬£¬£¬£¬°üÀ¨×ËÊÆ¿ØÖÆ¡¢·ÇÈËÀàÉí·ÝÑéÖ¤¡¢µç×ÓÓʼþÊý¾Ý·À×ß©¡¢Microsoft 365»á¼ûȨÏ޹ܿء¢ÌØÈ¨¾¯±¨¡¢µØÀíλÖÃÏÞÖÆ¡¢É󼯹¦Ð§ÒÔ¼°ÔöÇ¿¼à¿ØÁ¦¶È¡£¡£¡£¡£¡£¡£¡£


https://hackread.com/aipac-data-breach-hundreds-affected/


3. ¶íÂÞ˹¿Ú°¶ÔËÓªÉÌPort AllianceÔâÍøÂç¹¥»÷


11ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬¶íÂÞ˹¿Ú°¶ÔËÓªÉÌ¡°¿Ú°¶Í¬ÃË¡±£¨Port Alliance£©ÔâÓö¾³ÍâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÔËÓªÖÐÖ¹½øÈëµÚÈýÌ죬£¬£¬£¬£¬£¬£¬³ÉΪ¶íÎÚ³åÍ»Åä¾°ÏÂÒªº¦ÉèÊ©ÍøÂçÇå¾²ÊÂÎñµÄ×îа¸Àý¡£¡£¡£¡£¡£¡£¡£¾Ý¸Ã¹«Ë¾ÖÜËÄÉùÃ÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÌᳫÂþÑÜʽ¾Ü¾øÐ§ÀÍ£¨DDoS£©¹¥»÷²¢ÊÔͼÈëÇÖÆäÍøÂ磬£¬£¬£¬£¬£¬£¬Ä¿µÄֱָͨ¹ý²¨Â޵ĺ£¡¢ÑÇËÙ-ºÚº£¡¢Ô¶¶«¼°±±¼«µØÇøº£¸Û¿ªÕ¹µÄú̿ºÍ¿óÎï·ÊÁϳö¿ÚÓªÒµ£¬£¬£¬£¬£¬£¬£¬ÒâͼÈÅÂÒÔËÓªÖÈÐò¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü¹¥»÷¹æÄ£´ó¡¢Ç¿¶È¸ß£¬£¬£¬£¬£¬£¬£¬¿Ú°¶Í¬ÃËÇ¿µ÷ÆìÏÂ6¸öº£ÔËÂëÍ·¼°Òªº¦ÏµÍ³ÈÔÕý³£ÔËת£¬£¬£¬£¬£¬£¬£¬ÃºÌ¿ºÍ¿óÎï·ÊÁÏÄê»õÔËÁ¿³¬5000Íò¶ÖµÄӪҵδÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ÌØÕ÷ÏÔÖø£ººÚ¿Í¶¯ÓÃÁ˰üÀ¨1.5Íò¸öÈ«ÇòΨһIPµØµãµÄ½©Ê¬ÍøÂ磬£¬£¬£¬£¬£¬£¬²¿·ÖIPÔ´×Ô¶íÂÞ˹¾³ÄÚ£¬£¬£¬£¬£¬£¬£¬ÇÒÒ»Ö±±ä»»¹¥»÷Õ½ÂÔÒÔ¹æ±ÜÇå¾²·ÀÓù¡£¡£¡£¡£¡£¡£¡£¹«Ë¾Î´Ö¸Ã÷¹¥»÷ȪԴ£¬£¬£¬£¬£¬£¬£¬µ«Á¬ÏµÅä¾°¿ÉÖª£¬£¬£¬£¬£¬£¬£¬×Ô2022Äê¶íÎÚ³åÍ»Éý¼¶ÒÔÀ´£¬£¬£¬£¬£¬£¬£¬Õë¶Ô½»Í¨ÎïÁ÷ÍøÂçµÄÍøÂç¹¥»÷³ÊƵ·¢Ì¬ÊÆ£¬£¬£¬£¬£¬£¬£¬¶íÎÚË«·½ºÚ¿ÍƵÈÔʹÓÃDDoS¹¥»÷×ÌÈŶԷ½»ù´¡ÉèÊ©¡£¡£¡£¡£¡£¡£¡£


https://therecord.media/cyberattack-on-russian-port-operator


4. ÈýÐÇÒòµÚÈý·½Îó²î£¬£¬£¬£¬£¬£¬£¬Ãô¸ÐÊý¾Ý±»ºÚ¿Í¹ÒÅÆ³öÊÛ


11ÔÂ14ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨ÂÛ̳¾ªÏÖºÚ¿Í·¢Ìû³ÆÒÑÀÖ³ÉÈëÇÖÈýÐÇ£¬£¬£¬£¬£¬£¬£¬²¢¹ûÕæ³öÊ۾ݳÆÀ´×Ըù«Ë¾µÄÄÚ²¿Êý¾Ý¡£¡£¡£¡£¡£¡£¡£¾­²é£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÔ´ÓںڿͶÔÒ»¼ÒΪ¶à¼Ò´óÐÍÆóÒµÌṩЧÀ͵ĵÚÈý·½³Ð°üÉ̵ÄÈëÇÖ£¬£¬£¬£¬£¬£¬£¬Í¨¹ý¸Ã³Ð°üÉ̵Ļá¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÉøÍ¸ÖÁÈýÐDz¿·Ö»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬£¬°üÀ¨MSSQLÊý¾Ý¿â¼°AWS S3´æ´¢Í°£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡Á˰üÀ¨Ô´´úÂ롢˽Կ¡¢SMTPƾ֤¡¢ÉèÖÃÎļþ¡¢Ó²±àÂëÆ¾Ö¤¡¢Óû§Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢µÈÔÚÄÚµÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¡£CybernewsÑо¿ÍŶÓÑéÖ¤Á˺ڿÍÐû²¼µÄÊý¾ÝÑù±¾£¬£¬£¬£¬£¬£¬£¬È·ÈÏÆäÖаüÀ¨ÈýÐÇÂóµÏÑ·£¨ÈýÐǵç×ÓÆìÏÂÒ½ÁÆ×°±¸×Ó¹«Ë¾£©µÄÄÚ²¿JavaÏîÄ¿½á¹¹ÎļþÊ÷£¬£¬£¬£¬£¬£¬£¬ÌåÏÖÔ´´úÂë¼°Ó²±àÂëÆ¾Ö¤¿ÉÄÜй¶¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬±»ÇÔÊý¾Ý¿â½ØÍ¼ÏÔʾԱ¹¤ÁªÏµÐÅÏ¢£¨Èçµç×ÓÓʼþ¡¢Óû§Ãû£©£¬£¬£¬£¬£¬£¬£¬±íÃûÌáÐÑ¿ÉÄܱ£´æÖÎÀíԱƾ֤£¬£¬£¬£¬£¬£¬£¬Õ⽫ÔöÌíÔ±¹¤ÔâÊÜ´¹ÂÚ¹¥»÷»òƾ֤Ìî³ä¹¥»÷µÄΣº¦¡£¡£¡£¡£¡£¡£¡£ºÚ¿ÍÒÔ¡°Ò»´ÎÐÔÂò¶Ï¡±ÎªÓÕ¶ü£¬£¬£¬£¬£¬£¬£¬ÒªÇóʹÓÃÃÅÂÞ±ÒÖ§¸¶£¬£¬£¬£¬£¬£¬£¬µ«ÊÛ¼ÛÉÐδÐû²¼¡£¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/samsung-data-third-party-breach/


5. Aisuru½©Ê¬ÍøÂçÏÆÆð³¬´ó¹æÄ£DDoS¹¥»÷·ç±©


11ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬Î¢ÈíÅû¶£¬£¬£¬£¬£¬£¬£¬Aisuru½©Ê¬ÍøÂç½üÆÚ¶ÔAzureÍøÂçÌᳫ·åÖµ´ï15.72TbpsµÄDDoS¹¥»÷£¬£¬£¬£¬£¬£¬£¬½ÓÄÉUDPºéË®¹¥»÷ģʽ£¬£¬£¬£¬£¬£¬£¬Ä¿µÄÖ±Ö¸°Ä´óÀûÑÇij¹«¹²IP£¬£¬£¬£¬£¬£¬£¬Êý¾Ý°üËÙÂʸߴï36.4ÒÚbps¡£¡£¡£¡£¡£¡£¡£¸ÃÍøÂçÓÉTurbo Mirai¼¶ÎïÁªÍø½©Ê¬ÍøÂçÇý¶¯£¬£¬£¬£¬£¬£¬£¬Ö÷ҪʹÓñ»ÈëÇֵļÒͥ·ÓÉÆ÷¡¢ÉãÏñÍ·µÈ×°±¸£¬£¬£¬£¬£¬£¬£¬ºã¾ÃÕë¶ÔÃÀ¹ú¼°ÆäËû¹ú¼ÒסլISPÌá³«ÆÆ¼Í¼¹¥»÷¡£¡£¡£¡£¡£¡£¡£AzureÇ徲ר¼ÒÖ¸³ö£¬£¬£¬£¬£¬£¬£¬¹¥»÷Á÷Á¿ÌØÕ÷ÏÔ×Å£¬£¬£¬£¬£¬£¬£¬ÎÞÔ´µØµãÓÕÆ­ÇÒʹÓÃËæ»úÔ´¶Ë¿Ú£¬£¬£¬£¬£¬£¬£¬±ãÓÚ×·×ÙÓëЧÀÍÌṩÉÌ×èµ²¡£¡£¡£¡£¡£¡£¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬£¬£¬£¬Cloudflare±¾Ô´ӹûÕæ¡°ÈÈÃÅÓòÃû¡±ÅÅÃûÖÐÒÆ³ý¶à¸öÓëAisuru½©Ê¬ÍøÂçÏà¹ØµÄÓòÃû£¬£¬£¬£¬£¬£¬£¬ÕâЩÓòÃûÔøÒòAisuruÏòDNSЧÀÍ1.1.1.1·¢ËͶñÒâÅÌÎÊÁ÷Á¿£¬£¬£¬£¬£¬£¬£¬µ¼Ö»á¼ûÁ¿Òì³£ì­Éý£¬£¬£¬£¬£¬£¬£¬ÉõÖÁÓâÔ½ÑÇÂíÑ·¡¢Î¢Èí¡¢¹È¸èµÈÕýµ±ÍøÕ¾¡£¡£¡£¡£¡£¡£¡£Cloudflare CEO֤ʵ£¬£¬£¬£¬£¬£¬£¬´Ë¾ÙÖ¼ÔÚά»¤ÅÅÃûϵͳ¿ÉÐŶÈ£¬£¬£¬£¬£¬£¬£¬Î´À´½«Ò»Á¬¶ÔÒÉËÆ¶ñÒâÓòÃû¾ÙÐб༭»òÒþ²Ø¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-aisuru-botnet-used-500-000-ips-in-15-tbps-azure-ddos-attack/


6. ÆÕÁÖ˹¶Ù´óѧÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬Ó°Ïì¾èÔùÕߺÍУÓÑ


11ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬£¬ÆÕÁÖ˹¶Ù´óѧ11ÔÂ10ÈÕÔâÓöÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂУÓÑ¡¢¾èÔùÕß¡¢½ÌÖ°Ô±¹¤¼°Ñ§ÉúСÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£¡£¡£¾ÝУ·½Ðû²¼µÄ³£¼ûÎÊÌâ½â´ðÏÔʾ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý´¹ÂÚÓʼþÈëÇÖÒ»ÃûÔ±¹¤ÕË»§£¬£¬£¬£¬£¬£¬£¬½ø¶ø»á¼ûÁË´æ´¢³ï¿îÓëУÓѼÓÈë»î¶¯Êý¾ÝµÄÊý¾Ý¿â£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶ÐÅÏ¢°üÀ¨ÐÕÃû¡¢µç×ÓÓÊÏä¡¢µç»°ºÅÂë¼°¼ÒÍ¥/°ì¹«µØµã¡£¡£¡£¡£¡£¡£¡£¸ÃУǿµ÷£¬£¬£¬£¬£¬£¬£¬±»Ð¹Â¶Êý¾Ý¿âδ´æ´¢²ÆÎñÐÅÏ¢¡¢ÕË»§Æ¾Ö¤»òÊÜÁª°îÒþ˽·¨±£»£»£» £»£»£»¤µÄѧÉú/½ÌÖ°¹¤Ïêϸ¼Í¼£¬£¬£¬£¬£¬£¬£¬½öÉæ¼°Ð£ÓÑ¡¢¾èÔùÕß¼°¹ØÁªÈºÌ壨ÈçУÓÑÅäż¡¢Ñ§Éú¼Ò³¤µÈ£©µÄ»ù´¡ÁªÏµÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£±öϦ·¨ÄáÑÇ´óѧÔÚ10ÔÂÒ౬·¢ÀàËÆÊÂÎñ¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÇÔÈ¡µÄÔ±¹¤PennKeyµ¥µãµÇ¼ÕË»§£¬£¬£¬£¬£¬£¬£¬ÈëÇÖ¸ÃУSalesforce¾èÔùÕßÊý¾Ý¿â¡¢SAPÉÌÒµÖÇÄÜϵͳ¼°SharePointÎļþƽ̨£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡ÁË1.71GBÄÚ²¿Îĵµ£¬£¬£¬£¬£¬£¬£¬Éæ¼°120ÍòÌõ¼Í¼¡£¡£¡£¡£¡£¡£¡£Á½ÆðÊÂÎñ¾ùÖ¸ÏòУÓѹØÏµÖÎÀíϵͳÎó²î£¬£¬£¬£¬£¬£¬£¬ÆÕÁÖ˹¶ÙµÄй¶ԴÓÚÔ±¹¤ÕË»§±»ÈëÇÖ£¬£¬£¬£¬£¬£¬£¬±ö´óÔòÒòÔ±¹¤ÕË»§È¨ÏÞ¹ý´óµ¼ÖÂϵͳ±»ºáÏòÉøÍ¸¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÁ½ÆðÊÂÎñÊÖ·¨ÏàËÆ£¬£¬£¬£¬£¬£¬£¬ÆÕÁÖ˹¶Ù´óѧÉùÃ÷ÔÝÎÞÖ¤¾ÝÅú×¢¶þÕß±£´æ¹ØÁª¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/princeton-university-discloses-data-breach-affecting-donors-alumni/