GPUBreach¹¥»÷ÀûÓÃGPUÄÚ´æ·ì϶ʵÏÖϵͳÊÕÊÜ
°ä²¼¹¦·ò 2026-04-071. GPUBreach¹¥»÷ÀûÓÃGPUÄÚ´æ·ì϶ʵÏÖϵͳÊÕÊÜ
4ÔÂ6ÈÕ£¬¶àÂ×¶à´óѧ×êÑÐÍŶӿª·¢³öÒ»ÖÖÃûΪGPUBreachµÄÐÂÐ͹¥»÷·½Ê½£¬¸Ã¹¥»÷¿ÉÄÜÓÕ·¢GPU GDDR6ÄÚ´æÉϵÄRowhammerλ·×ª£¬½ø¶øÊµÏÖȨÏÞÌáÉý²¢µ¼ÖÂϵͳÆëÈ«±»¹¥ÆÆ¡£ÕâÏî×êÑÐµÄÆëȫϸ½Ú½«ÓÚ4ÔÂ13ÈÕÔڰ¿ËÀ¼½øÐеÄIEEE°²È«ÓëÒþÖÔ×êÑлáÉÏÕýʽ°ä²¼¡£×êÑÐÈËÔ±Ö¤Ã÷£¬RowhammerÒýÆðµÄGDDR6λ·×ª»á·ÛËéGPUÒ³±í£¬ÔÊÐí·ÇÌØÈ¨CUDAÄÚ²é¶ÔËÁÒâGPUÄÚ´æ½øÐжÁд½Ó¼û¡£¹¥»÷ÕßËæºó¿ÉÀûÓÃNVIDIAÇý¶¯·¨Ê½ÖеÄÄڴ氲ȫ·ì϶£¬½«´Ë¹¥»÷ÓëCPU¶ËµÄȨÏÞÌáÉýÏàÏνӣ¬´Ó¶øÔÚÎÞÐè½ûÓÃÊäÈëÊä³öÄÚ´æÖÎÀíµ¥Ôª±£»¤µÄÇé¿öÏÂʵÏÖϵͳÆëÈ«±»¹¥ÆÆ¡£IOMMUÊÇÒ»ÖÖÓÃÓÚÔ¤·ÀÖ±½ÓÄÚ´æ¹¥»÷µÄÓ²¼þµ¥Ôª£¬Ëüͨ¹ýÖÎÀíÿ¸öÉ豸¿É½Ó¼ûµÄÄÚ´æÇøÓòÀ´½ÚÔìºÍÏÞ¶ÈÉ豸¶ÔÄÚ´æµÄ½Ó¼û·½Ê½¡£Ö»¹ÜIOMMUÊÇÕмܴóÎÞÊýÖ±½ÓÄÚ´æ½Ó¼û¹¥»÷µÄÓÐЧ´ëÊ©£¬µ«×êÑÐÈËÔ±Ã÷È·Ö¸³öËüÎÞ·¨×èÖ¹GPUBreach¹¥»÷¡£×êÑÐÈËÔ±°µÊ¾£¬GPUBreachÅú×¢GPU Rowhammer¹¥»÷²»½ö¿ÉÔì³ÉÊý¾Ý°Ü»µ£¬»¹ÄÜʵÏÖÕæÕýµÄȨÏÞÌáÉý£¬ÕâÊÇĿǰÆäËû¹¥»÷·½Ê½Ëù²»¾ß±¸µÄÄÜÁ¦£¬Ê¹µÃGPUBreach³ÉΪһÖÖ¸ü׳´óµÄÍþв¡£
https://www.bleepingcomputer.com/news/security/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer/
2. ¶íÂÞ˹´ó¹æÄ£ÒøÐÐϵͳ̱»¾£¬¹Ø±ÕVPNÒÉΪµ¼»ðË÷
4ÔÂ6ÈÕ£¬ÉÏÖÜÎ壬¶íÂÞ˹²úÉúһ·³Á´óÍøÂç¹ÊÕÏ£¬µ¼ÖÂĪ˹¿ÆµÈ¶à¸öµØÓòµÄÒøÐÐÀûÓ÷¨Ê½ºÍÖ§¸¶ÏµÍ³Ì±»¾ÊýÓ×ʱ£¬Óû§ÎÞ·¨Ê¹ÓÃÒøÐп¨Ö§¸¶¡¢È¡¿î»ò½Ó¼ûÊÖ»úÒøÐзþÎñ¡£ÊÜÓ°ÏìµÄÔ̺¬¶íÂÞ˹Áª¹ú´¢ÐîÒøÐÓ×¢¶íÂÞ˹±íÃ³ÒøÐÓ×¢°¢¶û·¨ÒøÐÓ×¢TÒøÐкͶíÂÞ˹ÌìÈ»Æø¹¤ÒµÒøÐеȸùú×î´óÒøÐС£¹ÊÕÏ»¹²¨¼°×Ô¶¯È¡¿î»úºÍ¹«¹²½»Í¨ÏµÍ³£¬ÄªË¹¿ÆµØÌúºÍ³Ç½¼ÁгµÕ¢»úÖÕ³¡½ÓÊÜÒøÐп¨Ö§¸¶£¬¹¤×÷ÈËÔ±±»ÆÈÔÊÐí³Ë¿ÍÃâ·Ñͨ³©ÒÔÔ¤·ÀÓµ¼·¡£Õâ´ÎÖжϼòÖ±ÇÐÔÒòÉв»Ã÷È·¡£×î³õÓÐýÌå²Â²âÓëµÐÔÖÊÔͼ¹Ø±ÕÒøÐлù´¡ÉèʩʹÓõÄIPµØÖ·Óйأ¬µ«µ½ÖÜÒ»£¬Óйر¨Â·´ó¶à±»É¾³ý¡£¶íÂÞ˹¶ÀÁ¢Ã½Ì屨·³Æ£¬»¥ÁªÍø¼à¹Ü»ú¹¹RoskomnadzorÒªÇóýÌåɾ³ý½«ÒøÐÐÖжÏÓë¹Ø±ÕÐж¯ÁªÏµÆðÀ´µÄÄÚÈÝ¡£¿¨°Í˹»ù³¢ÊÔÊÒ½áºÏÊ×´´ÈËÄÈËþÀòÑÇ¡¤¿¨Ë¹çê˹¿¨æ«ÔÚTelegramÉϰµÊ¾£¬ÎÊÌâÔ´ÓÚRoskomnadzorÊÔͼ¹Ø±ÕVPN·þÎñ¡£
https://therecord.media/outage-hits-russian-banking-apps
3. ¶íÓïÀÕË÷ÍÅ»ï÷è÷ë¹¥»÷µÂ¹ú×óÒíµ³Ë÷ÒªÊê½ð
4ÔÂ6ÈÕ£¬ÉÏÖÜ£¬Ò»¸ö½²¶íÓïµÄÀÕË÷Èí¼þ×éÖ¯÷è÷ëÐû³Æ¶ÔµÂ¹úÃñÖ÷Éç»áÖ÷ÒåÕþµ³×óÒíµ³µÄÍøÂç¹¥»÷ÕÆ¹Ü£¬²¢½«¸Ãµ³ÁÐÈëÆä°µÍøÐ¹Â¶ÍøÕ¾µÄÊܺ¦ÕßÃûµ¥£¬ÍþвÈô²»Ö§¸¶Êê½ð½«°ä²¼±»µÁÊý¾Ý¡£÷è÷ë×Ô2022ÄêÒÔÀ´Ò»Ïò»îÔ¾£¬´ËÇ°ÔøÒÔÅ·ÖÞ¡¢ÑÇÖÞºÍÃÀ¹úµÄÒ½Ôº¡¢µ±¾Ö»ú¹¹ºÍ˽Ӫ¹«Ë¾Îª¹¥»÷Ö¸±ê¡£3ÔÂÏÂÑ®£¬×óÒíµ³Ö¤ÊµÆäIT»ù´¡ÉèÊ©Ôâ·êÁËÒ»´Î¡°ÑϳÁµÄÍøÂç¹¥»÷¡±£¬²¢°µÊ¾ÊÕµ½µÄÐÅÏ¢Åú×¢÷è÷ëºÚ¿Í×éÖ¯¿ÉÄÜÊÇÄ»ºóºÚÊÖ¡£¸Ãµ³ÔÚÒ»·ÝÉêÃ÷ÖÐÖ¸³ö£º¡°´ËÀàÊý×Ö¹¥»÷£¬³ö¸ñÊÇÀÕË÷Èí¼þµÄʹÓã¬Í¨³£ÊÇ»ìºÏÕ½ÕùµÄÒ»²¿ÃÅ£¬Ò²ÊǶԹؼü»ù´¡ÉèÊ©µÄ¹¥»÷¡£¡±ÊÂÎñ²úÉúºó£¬×óÒíµ³ÁÙʱ¹Ø¹ØÁ˲¿ÃÅITϵͳÒÔÏ÷¼õËðʧ£¬²¢ÏòµÂ¹úµ±¾ÖÌáÆðÐÌÊÂËßËÏ¡£¸Ãµ³ÖÒ¸æ³Æ£¬ºÚ¿Í¿ÉÄÜÊÔͼй¶Æä×ܲ¿ÄÚ²¿×éÖ¯Êý¾ÝºÍÔ±¹¤Ó×ÎÒÐÅÏ¢£¬µ«°µÊ¾ÎÞ·¨ÆÀ¹À´ËÊÂÊÇ·ñ»áÔÚ¶à´óˮƽÉϳɹ¦»òÒѾ²úÉú£¬Í¬Ê±²¹³äÆä³ÉÔ±Êý¾Ý¿âδÊÜÓ°Ïì¡£×óÒíµ³³ÆÕâ´ÎÏ®»÷ÊÇÖ¼ÔÚ·ÛËéÃñÖ÷Ôì¶ÈµÄ¸ü¿í·ºÐж¯µÄÒ»²¿ÃÅ£¬ÉêÃ÷°µÊ¾¡°´ËÀ๥»÷Ö¼ÔÚ¼õÈõÃñÖ÷ÌåÔì¼°Æä²Î¼ÓÕß¡£ÔÚÕâÖÖÇé¿öÏ£¬ÒÔÃñÖ÷µ³ÎªÖ¸±êËÆºõ²¢·ÇżºÏ¡£¡±¸Ãµ³Ã»ÓÐ×¢Ã÷ÊÇ·ñÔÚÓëÏ®»÷Õß½»É棬Ҳδ˼¿¼Ö§¸¶Êê½ð¡£
https://therecord.media/hackers-threaten-to-leak-german-political-party-data
4. ¾¯ÌèÐÂÐÍ·¨ÔºÚ¿Æ¶ÌÐÅ£¬¶þάÂëÇÔÈ¡Ó×ÎÒÐÅÏ¢
4ÔÂ5ÈÕ£¬Ú¿Æ·Ö×Ó½üÆÚ¼ÙÒâÃÀ¹ú¸÷µØÖÝ·¨Ôº£¬·¢ËÍÐéαµÄ¡°Î¥Ô¼Í¨Öª¡±½»Í¨Î¥Õ¶ÌÐÅ£¬Ð²ÆÈÊÕ¼þÈËɨÃè¶þάÂë½øÈë´¹µöÍøÕ¾£¬ÒªÇóÖ§¸¶6.99ÃÀÔª£¬Í¬Ê±ÇÔÈ¡Ó×ÎҺͲÆÕþÐÅÏ¢¡£ÕâÏîлʼÓÚ¼¸ÖÜǰ£¬ÓÐÈË·ÖÏíÁËÕë¶ÔŦԼ¾ÓÃñµÄ¶ÌÐÅ£¬ËæºóºÜ¶àÈËÔÚÍøÉϻ㱨ÁËÕë¶Ô¼ÓÀû¸£ÄáÑÇÖÝ¡¢±±¿¨ÂÞÀ´ÄÉÖÝ¡¢ÒÁÀûŵÒÁÖÝ¡¢¸¥¼ªÄáÑÇÖÝ¡¢µÃ¿ËÈøË¹ÖÝ¡¢¿µÄùµÒ¸ñÖݺÍÐÂÔóÎ÷ÖݵÈÖݵÄÀàËÆ¶ÌÐÅ¡£ÓëÒÔÍùÔ̺¬¶ÌÐźʹ¹µöÍøÕ¾Á´½ÓµÄÚ¿Æ·ÖÆç£¬Ð°汾Ô̺¬Ò»ÕžݳÆÊÇ·¨ÔºÍ¨ÖªµÄͼƬ£¬ÆäÖÐǶÈëÁ˶þάÂë¡£¶ÌÐÅÐû³ÆÀ´×Ô¡°Å¦Ô¼ÊÐÐÌÊ·¨Í¥¡±£¬ÄÚÈÝÉæ¼°Ç·½ÉÍ£³µ×Ê»òͨ³©·Ñ£¬ÒªÇóÁ¢¼´½ÉÄɲ»È»±ØÐë³öÍ¥£¬²¢¸½ÓÐɨÃè¶þάÂëÖ§¸¶Ç·¿îµÄ×¢Ã÷¡£É¨Ãè¶þάÂëºó£¬Óû§»á±»Êèµ¼ÖÁÒ»¸öÖÐÑëÍøÕ¾£¬¸ÃÍøÕ¾Ê×ÏÈÒªÇóʵÏÖÑéÖ¤ÂëÒÔÖ¤Ã÷ÊÇÕæÈË£¬Óû§±»³Á¶¨Ïòµ½ÁíÒ»¸ö´¹µöÍøÕ¾£¬¸ÃÍøÕ¾¼ÙÒâÖݳµÁ¾ÖÎÀí¾Ö»òÆäËû»ú¹¹£¬Ðû³ÆÓÐδ½ÉµÄͨ³©·Ñ»òÍ£³µ·£µ¥¡£µã»÷¡°³ÖÐø¡±°´Å¥ºó£¬Óû§½øÈëÒ»¸öÒ³Ãæ£¬±ØÒªÊäÈëÓ×ÎÒÐÅÏ¢ºÍÐÅÓþ¿¨ÐÅÏ¢ÒÔÖ§¸¶ËùνÓöȡ£
https://www.bleepingcomputer.com/news/security/traffic-violation-scams-switch-to-qr-codes-in-new-phishing-texts/
5. FortiClient EMSзì϶Òѱ»¹¥»÷ÕßÀûÓÃ
4ÔÂ5ÈÕ£¬FortinetÓÚÖÜÄ©°ä²¼´¹Î£°²È«¸üУ¬ÒÔ½¨¸´FortiClientÆóÒµÖÎÀí·þÎñÆ÷ÖÐÒ»¸öÔÚ±»¹¥»÷Õß»ý¼«ÀûÓõÄÑϳÁ·ì϶¡£¸Ã·ì϶±àºÅΪCVE-2026-35616£¬ÊôÓÚ½Ó¼û½ÚÔì²»µ±·ì϶£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ý¾«ÐÄ»ú¹ØµÄÒªÇóÖ´ÐдúÂë»òºÅÁî¡£FortinetÒÑÈ·Èϸ÷ì϶ÔÚÏÖʵÀûÓÃÖб»ÀûÓ㬲¢¶½´ÙÒ×Êܹ¥»÷µÄ¿Í»§×°ÖÃÈȽ¨¸´·¨Ê½¡£¸Ã·ì϶ӰÏìFortiClient EMS 7.4.5ºÍ7.4.6°æ±¾£¬¿Éͨ¹ý×°ÖöÔÓ¦µÄÈȽ¨¸´·¨Ê½½øÐлº½â£¬Í¬Ê±½«ÔÚ¼´½«°ä²¼µÄ7.4.7°æ±¾ÖÐÕýʽ½¨¸´£¬¶ø7.2°æ±¾²»ÊÜÓ°Ïì¡£¸Ã·ì϶ÓÉÍøÂ簲ȫ¹«Ë¾Defused·¢ÏÖ£¬¸Ã¹«Ë¾½«ÆäÃèÊöΪԤÉí·ÝÑéÖ¤API½Ó¼ûÈÆ¹ý·ì϶£¬ÔÊÐí¹¥»÷Õ߯ëÈ«ÈÆ¹ýÉí·ÝÑéÖ¤ºÍÊÚȨ½ÚÔì¡£DefusedÔÚXƽ̨ÉÏй©£¬ËûÃÇÓÚ±¾ÖÜÔçЩʱ³½·¢Ïָ÷ì϶±»ÓÃ×÷ÁãÈÕ·ì϶ÀûÓ㬲¢Æ¾¾ÝÕÆ¹ÜÈεÄÅû¶׼ÔòÏòFortinet½øÐÐÁ˻㱨¡£»¥ÁªÍø°²È«¼à¹Ü»ú¹¹ShadowserverÔÚÍøÉÏ·¢ÏÖÁ˳¬¹ý2000¸ö¶³öµÄFortiClient EMSÊ·ý£¬ÆäÖдó²¿ÃÅλÓÚÃÀ¹úºÍµÂ¹ú£¬ÕâÒâζ×Å´óÁ¿»ú¹¹¿ÉÄÜÃæ¶ÔDZÔÚÍþв¡£
https://www.bleepingcomputer.com/news/security/new-fortinet-forticlient-ems-flaw-cve-2026-35616-exploited-in-attacks/
6. LinkedIn°ÂÃØÉ¨ÃèÓû§ä¯ÀÀÆ÷À©´ó
4ÔÂ3ÈÕ£¬Ò»·ÝÃûΪ¡°ä¯ÀÀÆ÷ÃÅ¡±µÄл㱨ÖÒ¸æ³Æ£¬Î¢ÈíÆìϵÄÁìÓ¢ÔÚÆäÍøÕ¾ÉÏʹÓðµ²ØµÄJavaScript¾ç±¾É¨Ãè½Ó¼ûÕßµÄä¯ÀÀÆ÷£¬²éÕÒÒÑ×°ÖõÄÀ©´ó·¨Ê½²¢ÍøÂçÉ豸Êý¾Ý¡£¾Ý×Ô³ÆLinkedInóÒ×Óû§Ð»áµÄFairlinked eV»ã±¨ÏÔʾ£¬¸Ãƽ̨½«JavaScript×¢ÈëÓû§»á»°£¬²é³Êýǧ¸öä¯ÀÀÆ÷À©´ó·¨Ê½£¬²¢½«Á˾ÖÓë¿Éʶ´ËÍâÓû§Ó×ÎÒ×ÊÁϹØÁªÆðÀ´¡£»ã±¨×÷ÕßÐû³Æ£¬ÕâÖÖÐÐΪ±»ÓÃÀ´ÍøÂçÃô¸ÐµÄÓ×ÎҺ͹«Ë¾ÐÅÏ¢£¬ÓÉÓÚLinkedInÕÊ»§ÓëÕæÊµÉí·Ý¡¢¹ÍÖ÷ºÍְλçÇÃܰ󶨡£»ã±¨Ö¸³ö£¬LinkedIn»áɨÃ賬¹ý200ÖÖÓëÆäÏúÊÛ¹¤¾ßÖ±½Ó¾ºÕùµÄ²úÆ·£¬Ô̺¬Apollo¡¢LushaºÍZoomInfo¡£ÓÉÓÚLinkedIn֪·ÿ¸öÓû§µÄ¹ÍÖ÷£¬ËüÄܹ»×·×ÙÄÄЩ¹«Ë¾Ê¹ÓÃÄÄЩ¾ºÕùµÐÊֵIJúÆ·£¬ÔÚÓû§²»ÖªÇéµÄÇé¿öÏÂÌáÈ¡Êýǧ¼ÒÈí¼þ¹«Ë¾µÄ¿Í»§Ãûµ¥£¬²¢ÀûÓ÷¢ÏÖµÄÐÅÏ¢ÏòµÚÈý·½¹¤¾ßÓû§·¢³öÇ¿ÔìÖ´ÐÐÍþв¡£
https://www.bleepingcomputer.com/news/security/linkedin-secretly-scans-for-6-000-plus-chrome-extensions-collects-data/


¾©¹«Íø°²±¸11010802024551ºÅ