Marimo·ì϶Åû¶½ö10Ó×ʱºóÔâºÚ¿ÍÀûÓÃ
°ä²¼¹¦·ò 2026-04-131. Marimo·ì϶Åû¶½ö10Ó×ʱºóÔâºÚ¿ÍÀûÓÃ
4ÔÂ12ÈÕ£¬MarimoÊÇÒ»¸ö±¸ÊÜӽӵĿªÔ´ÏìӦʽPython notebookƽ̨£¬ÆäÒ»¸öÑϳÁ·ì϶ÔÚ¹«¿ªÅû¶½ö10Ó×ʱºó¾Í±»ºÚ¿Í»ý¼«ÀûÓ᣸÷ì϶±àºÅΪCVE-2026-39987£¬GitHub¶ÔÆäÑϳÁˮƽÆÀ·ÖΪ9.3·Ö£¬ÔÊÐí¹¥»÷ÕßÔÚMarimo 0.20.4¼°¸üÔç°æ±¾ÖÐÎÞÐèÈκÎÉí·ÝÑéÖ¤¼´¿ÉÔ¶³ÌÖ´ÐдúÂë¡£Marimoͨ³£±»Êý¾Ý¿ÆÑ§¼Ò¡¢»úе½ø½¨´ÓÒµÕß¡¢×êÑÐÈËÔ±ºÍ¿ª·¢ÈËÔ±ÓÃÓÚ¹¹½¨Êý¾ÝÀûÓ÷¨Ê½»òÒDZí°å£¬ÔÚGitHubÉÏÕ¼ÓÐ20,000¸östarºÍ1,000¸öfork£¬Óû§»ù´¡¿í·º¡£¸Ã·ì϶µÄµ××ÓÔÒòÔÚÓÚWebSocket¶Ëµã¡°/terminal/ws¡±Â¶³öÁ˽»»¥Ê½ÖÕ¶Ë£¬µ«Î´½øÐÐÊʵ±µÄÉí·ÝÑéÖ¤²é³£¬Ê¹µÃÈκÎδ¾Éí·ÝÑéÖ¤µÄ¿Í»§¶Ë¶¼Äܹ»Ö±½ÓÏνӣ¬»ñµÃÓëMarimo¹ý³ÌÒ»ÑùȨÏÞµÄÆëÈ«½»»¥Ê½shell¡£MarimoÓÚ4ÔÂ8ÈÕÅû¶Á˸÷ì϶£¬²¢ÓÚ×òÈÕ°ä²¼ÁË0.23.0°æ±¾½øÐн¨¸´¡£¿ª·¢ÕßÖ¸³ö£¬¸Ã·ìÏ¶ÖØÒªÓ°Ï콫Marimo²¿ÊðΪ¿É±à×ë±Ê¼Ç±¾µÄÓû§£¬ÒÔ¼°ÔÚ±à×ëģʽÏÂʹÓÃ--host 0.0.0.0½«Marimo¶³öÓÚ¹²ÏíÍøÂçµÄÓû§¡£¾ÝÔÆ°²È«¹«Ë¾SysdigµÄ×êÑÐÈËÔ±³Æ£¬ÔÚ·ì϶ÏêÇéÅû¶ºóµÄǰ12Ó×ʱÄÚ£¬¾ÍÓÐ125¸öIPµØÖ·ÆðÍ·½øÐпúËŻ¡£Åû¶ºó²»µ½10Ó×ʱ£¬×êÑÐÈËÔ±¾Í¹Û²ìµ½Á˵ÚÒ»´ÎÀûÓó¢ÊÔ¡£
https://www.bleepingcomputer.com/news/security/critical-marimo-pre-auth-rce-flaw-now-under-active-exploitation/
2. ºÚ¿ÍÐû³Æ½ÚÔìÁËÍþÄá˹ʥÂí¿É¹ã³¡µÄ·Àºé±Ãϵͳ
4ÔÂ12ÈÕ£¬½üÈÕ£¬Òâ´óÀûÍþÄá˹ʥÂí¿É¹ã³¡µÄ·ÀºéҺѹ±ÃϵͳÔâµ½ÍøÂç¹¥»÷£¬Ò»¸ö×Գơ°»ù´¡ÉèÊ©·ÛËéÓ××顱»ò¡°ÒõÓôÒýÇæ¡±µÄ×éÖ¯Ðû³ÆÒÑ»ñµÃϵͳÖÎÀíȨÏÞ£¬²¢ÑïÑÔÄܹ»¡°Ì±»¾·ÀÓùϵͳ²¢¸²Ã»Ñغ£µØÓò¡±£¬½«ÍøÂçÈëÇÖÑݱäΪDZÔÚµÄÎïÀí¿àÄÑ¡£¸Ã×éÖ¯ÔÚÆäTelegramƵ·Éϰ䲼ÖÐÎÄÌû×Ó£¬Ðû³ÆÒÑÆëÈ«½ÚÔìÒâ´óÀû»ù´¡ÉèÊ©ºÍ½»Í¨ÊÖÏÂÊôµÄ·Àºéϵͳ£¬²¢¹«¿ªÒÔ600ÃÀÔªµÄ¼ÛÖµÏúÊÛϵͳµÄÆëÈ«rootȨÏÞ¡£¹ÌÈ»µ±¾ÖÈ·Èϱ£»¤Ê¥Âí¿É´ó½ÌÌõĹؼüϵͳδÊÜÓ°Ï죬µ«¸ÃÊÂÎñ¶³öÁËÒ»¸öÁîÈËÓÇÓôµÄÏÖʵ£º¼´±ãÊÇÓµÓи߶ÈÏóÕ÷Òâ˼ºÍÕ½ÊõÒâ˼µÄ»ù´¡ÉèÊ©£¬Ò²¿ÉÄܱ»Ì½²â¡¢½Ó¼ûºÍ°Ñ³Ö¡£Ó봫ͳITϵͳ·ÖÆç£¬OTϵͳֱ½ÓÓëÎïÀí¹ý³Ì½»»¥¡£Ò»µ©Ôâµ½·ÛË飬ºó¹û²»½öÊÇÊý¾ÝÃÔʧ£¬»¹»áµ¼Ö·þÎñÖжϡ¢¾¼ÃËðʧ£¬ÉõÖÁÍþв¹«¹²°²È«¡£Õâ´Î¹¥»÷ʼÓÚ3ÔÂÏÂÑ®£¬¹¥»÷ÕßÈëÇÖÁËϵͳ½ÚÔì½çÃæ£¬4Ô³õÆðÍ·°ä²¼½ÚÔìÃæ°å½ØÍ¼¡¢ÏµÍ³²¼¾ÖͼºÍ·§ÃÅ״̬ͼµÈÖ¤¾Ý¡£
https://securityaffairs.com/190679/hacktivism/hackers-claim-control-over-venice-san-marco-anti-flood-pumps.html
3. ½ü4000̨ÃÀ¹ú¹¤ÒµÉ豸Ôâ·êÒÁÀÊÍøÂç¹¥»÷
4ÔÂ10ÈÕ£¬ÓëÒÁÀÊÓйØÁªµÄºÚ¿Í×éÖ¯Õý³ÖÐø¶ÔÃÀ¹ú¹Ø¼ü»ù´¡ÉèÊ©ÍøÂçÌáÒé¹¥»÷£¬Ö¸±êÔ̺¬Êýǧ̨ÓÉÂÞ¿ËΤ¶û×Ô¶¯»¯¹«Ë¾Ôì×÷µÄ¡¢Â¶³öÔÚ»¥ÁªÍøÉϵĿɱà³ÌÂß¼½ÚÔìÆ÷£¨PLC£©¡£Æ¾¾ÝÃÀ¹ú¶à¸öÁª¹ú»ú¹¹Öܶþ°ä²¼µÄ½áºÏ²¼¸æ£¬×Ô2026Äê3ÔÂÒÔÀ´£¬ÒÁÀʹú¶ÈÖ§³ÖµÄºÚ¿Í×éÖ¯Ò»ÏòÒÔRockwell Automation/Allen-Bradley PLCÉ豸Ϊָ±ê£¬ÒÑÔì³ÉÔËÓªÖжϺ;¼ÃËðʧ¡£»ã±¨»ú¹¹ÖÒ¸æ³Æ£¬ÕâЩ¹¥»÷»î¶¯×î½üÓÐËùÉý¼¶£¬ºÜ¿ÉÄÜÊǶÔÒÁÀÊÓëÃÀ¹úºÍÒÔÉ«ÁÐÖ®¼äµÐ¶ÔÐж¯µÄ»ØÓ¦¡£Áª¹úµ÷²é¾ÖÈ϶¨£¬¹¥»÷ÐÐΪÒѵ¼ÖÂÉ豸ÏîÄ¿Îļþ±»ÌáÈ¡£¬ÒÔ¼°ÈË»ú½çÃæºÍ¼à¿ØÏµÍ³ÏÔʾÆÁÉϵÄÊý¾ÝÔâµ½´Û¸Ä¡£ÍøÂ簲ȫ¹«Ë¾Censys´ÎÈջ㱨³Æ£¬ÔÚÈ«Çò·¢ÏÖµÄ5200¶à¸ö¶³öÔÚ»¥ÁªÍøÉϵĴËÀ๤ҵ½ÚÔìϵͳÖУ¬ËÄ·ÖÖ®ÈýÀ´×ÔÃÀ¹ú¡£Êý¾ÝÏÔʾ£¬È«ÇòÓÐ5,219¸ö¶³öÓÚ»¥ÁªÍøµÄÖ÷»úÏìÓ¦EtherNet/IPºÍ̸²¢×Ô³ÆÎªÂÞ¿ËΤ¶û×Ô¶¯»¯É豸£¬ÆäÖÐÃÀ¹úռȫÇò¶³öÁ¿µÄ74.6%£¬¹²3,891¸öÖ÷»ú¡£ÖµÍ×ÌùÐĵÄÊÇ£¬·äÎÑÔËÓªÉÌASNµÄ·Ý¶î²»³É±ÈÀýµØ¸ß£¬Åú×¢ÏÖ³¡²¿ÊðµÄÉ豸λÓÚ·äÎѵ÷Ôì½âµ÷Æ÷ÉÏ£¬½øÒ»²½À©´óÁ˹¥»÷Ãæ¡£
https://www.bleepingcomputer.com/news/security/nearly-4-000-us-industrial-devices-exposed-to-iranian-cyberattacks/
4. CPUIDÔâÈëÇÖ£¬CPU-Z/HWMonitorÏÂÔØÁ´½Ó±»´Û¸Ä
4ÔÂ10ÈÕ£¬ºÚ¿Í³É¹¦»ñµÃÁËCPUIDÏîÖ÷ÕÅAPI½Ó¼ûȨÏÞ£¬²¢´Û¸ÄÁ˹ٷ½ÍøÕ¾ÉϵÄÏÂÔØÁ´½Ó£¬½«Ê¢ÐеÄÓ²¼þ¼ì²â¹¤¾ßCPU-ZºÍHWMonitorµÄ×°Ö÷¨Ê½´úÌæÎª¶ñÒâ¿ÉÖ´ÐÐÎļþ¡£ÕâÁ½¸öʵÓ÷¨Ê½Óµº±¼û°ÙÍòÓû§£¬ËûÃÇÒÀ¸½ÕâЩ¹¤¾ßÀ´¸ú×ÙÍÆËã»úÄÚ²¿Ó²¼þµÄÎïÀí½¡È«Çé¿öºÍÏµÍ³È«Ãæ¹æ¸ñ¡£½üÆÚ£¬ÔÚReddit¸ßµÍÔØÕâÁ½¿î¹¤¾ßµÄÓû§»ã±¨³Æ£¬¹Ù·½ÏÂÔØÃÅ»§Ö¸ÏòCloudflare R2´æ´¢·þÎñ£¬»ñÈ¡µÄÈ´ÊÇÁíÒ»¿îÕï¶Ï¹¤¾ßHWiNFOµÄľÂí°æ±¾¡£CPUID½²»°ÈËÌṩÉêÃ÷³Æ£¬µ÷²éÈÔÔÚ½øÐÐÖУ¬µ«³õ²½ÅжÏ4ÔÂ9ÈÕÖÁ10ÈÕÆÚ¼ä£¬Ò»¸ö¸¨ÖúÖ°ÄÜ£¨±í²¿API£©Ôâµ½ÈëÇÖ£¬³ÖÐø¹¦·òÔ¼6Ó×ʱ£¬µ¼ÖÂÖ÷ÍøÕ¾Ëæ»úÏÔʾ¶ñÒâÁ´½Ó£¬µ«¹Ù·½ÊðÃûµÄÔʼÎļþδÊÜÓ°Ïì¡£ÈëÇÖ±»·¢ÏÖºóÒѽ¨¸´¡£¿¨°Í˹»ù×êÑÐÈËÔ±·ÖÎöÖ¸³ö£¬Õâ´ÎÈëÇÖ´Ó4ÔÂ9ÈÕ15:00 UTC³ÖÐøµ½4ÔÂ10ÈÕ10:00 UTC×óÓÒ£¬¹¥»÷ÕßÉ¢²¼ÁËCPU-Z 2.19¡¢HWMonitor Pro 1.57¡¢HWMonitor 1.63ºÍPerfMonitor 2.04µÄ¶ñÒâ°æ±¾¡£Æ¾¾Ý¿¨°Í˹»ù¼à²â£¬³¬¹ý150ÃûÓû§ÏÂÔØÁ˶ñÒâ±äÖÖ£¬³ýÓ×ÎÒÓû§±í£¬ÖØÒªÎ»ÓÚ°ÍÎ÷¡¢¶íÂÞ˹ºÍÖйúµÄÁãÊÛ¡¢Ôì×÷¡¢Õ÷ѯ¡¢µçÐźÍũҵµÈÐÐÒµµÄÆóÒµÒ²Êܵ½Ó°Ïì¡£
https://www.bleepingcomputer.com/news/security/supply-chain-attack-at-cpuid-pushes-malware-with-cpu-z-hwmonitor/
5. Storm-2755·¢Æð¹¤×ʽٳֹ¥»÷ÇÔÈ¡¼ÓÄôóÔ±¹¤¹¤×Ê
4ÔÂ10ÈÕ£¬Ò»¸öÃûΪStorm-2755µÄ¡¢ÒÔ¾¼ÃÀûÒæÎªÖ÷ÕŵÄÍþвÐÐΪÕߣ¬Õýͨ¹ý½Ù³Ö¼ÓÄôóÔ±¹¤µÄÕË»§£¬·¢Æð¹¤×ʳÁ¶¨Ïò£¨Óֳƹ¤×ʽٳ֣©¹¥»÷£¬ÇÔȡԱ¹¤µÄ¹¤×Ê¡£¹¥»÷ÕßÀûÓöñÒâMicrosoft 365µÇÂ¼Ò³Ãæ£¬Í¨¹ý¶ñÒâ¸æ°×»òSEOͶ¶¾½«ÕâÐ©Ò³ÃæÍÆÖÁËÑË÷ÒýÇæÁ˾ֶ¥²¿£¬ÓÕÆÊܺ¦ÕßÊäÈëÆ¾Ö¤¡£ÕâЩ¼Ù×°³ÉMicrosoft 365µÇ¼±íµ¥µÄ¶ñÒâÍøÒ³£¬¿ÉÄܲ¶»ñÊܺ¦ÕßµÄÉí·ÝÑéÖ¤ÁîÅÆºÍ»á»°cookie¡£Storm-2755ͨ¹ý³Á·Å±»µÁµÄ»á»°ÁîÅÆ¶ø·Ç³ÁнøÐÐÉí·ÝÑéÖ¤£¬³É¹¦ÈƹýÁËÖÐÑëÈ˹¥»÷ÖеĶà³É·ÖÉí·ÝÑéÖ¤±£»¤¡£»ñȡԱ¹¤ÕË»§½Ó¼ûȨÏ޺󣬹¥»÷Õ߯ð³õ´´½¨ÊÕ¼þÏ乿¶¨£¬×Ô¶¯½«ÈËÁ¦×ÊÔ´²¿ÃÅ·¢Ë͵ÄÔ̺¬¡°Ö±½Ó´æ¿î¡±»ò¡°ÒøÐÓ×±×ÖÑùµÄÓʼþÒÆ¶¯µ½°µ²ØÎļþ¼Ð£¬×èÖ¹Êܺ¦Õ߲鿴ÕâЩÓʼþ¡£Ëæºó£¬ËûÃÇËÑË÷¡°¹¤×Ê¡±¡¢¡°ÈËÁ¦×ÊÔ´¡±¡¢¡°Ö±½Ó´æ¿î¡±ºÍ¡°²ÆÕþ¡±µÈ¹Ø¼ü´Ê£¬ÏòÈËÁ¦×ÊÔ´²¿ÃÅÔ±¹¤·¢ËÍÖ÷ÌâΪ¡°¹ØÓÚÖ±½Ó´æ¿îµÄÎÊÌ⡱µÄ´¹µöÓʼþ£¬ÓÕÆÔ±¹¤¸üÐÂÒøÐÐÐÅÏ¢¡£µ±Éç½»¹¤³Ì¹¥»÷ʧ°Üºó£¬¹¥»÷ÕßÖ±½ÓµÇ¼WorkdayµÈÈËÁ¦×ÊÔ´Èí¼þƽ̨£¬ÀûÓÃÇÔÈ¡µÄ»á»°ÊÖ¶¯¸üÐÂÖ±½Ó´æ¿îÏêÇ飬½«¹¤×ÊתÈë×Ô¼º½ÚÔìµÄÕË»§¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-canadian-employees-targeted-in-payroll-pirate-attacks/
6. ¹ú¼Ê·¨ÂÉÐж¯È·Èϳ¬2ÍòÃû¼ÓÃÜÇ®±ÒÚ¿ÆÊܺ¦Õß
4ÔÂ11ÈÕ£¬ÓÉÓ¢¹ú¹ú¶È·¸×ïµ÷²é¾ÖǣͷµÄ¹ú¼Ê·¨ÂÉÐж¯¡°´óÎ÷ÑóÐж¯¡±ÒÑÈ·ÈÏ£¬ÔÚ¼ÓÄôó¡¢Ó¢¹úºÍÃÀ¹ú¾³ÄÚÓг¬¹ý20,000Ãû¼ÓÃÜÇ®±ÒÚ¿ÆÊܺ¦Õß¡£ÕâÏî½áºÏÐж¯ÓÚÉϸöÔ·¢Õ¹£¬²Î¼Ó·½Ô̺¬Ó¢¹ú¹ú¶È·¸×ïµ÷²é¾Ö¡¢ÃÀ¹úÌØÇÚ¾Ö¡¢°²´ÖÂÔÊ¡¾¯Ô±¾Ö¡¢°²´ÖÂÔʡ֤ȯίԱ»áÒÔ¼°¶à¼Ò˽ӪÆóÒµºÏ×÷ͬ°é¡£Ó¢¹ú¹ú¶È·¸×ïµ÷²é¾Ö°µÊ¾£¬ÔÚΪÆÚÒ»ÖܵÄÐж¯ÖУ¬¶à¸ö·¨ÂÉ»ú¹¹ÔÚÆäÂ×¶Ø×ܲ¿Í¨¹ýʵʱµý±¨¹²Ïí¡¢¼¼ÊõÄÜÁ¦ºÍÊܺ¦ÕßÔöÔ®£¬ÔÚÈ«ÇòÁìÓòÄÚµ·»ÙÁ˶à¸öÚ¿ÆÍøÂ磬Â׶ؽðÈڳǾ¯Ô±¾Ö¡¢½ðÈÚÐÐΪ¼à¹Ü¾ÖºÍÆäËû¹ú¼Ê·¨ÂÉ»ú¹¹Ò²²Î¼ÓÁËÕâ´ÎÐж¯¡£µ÷²éÈËÔ±¶³½áÁ˳¬¹ý1200ÍòÃÀÔªµÄÉæÏÓ·¸×ïËùµÃ£¬ÕâЩ¿î×ÓÊÇͨ¹ý¡°ÊÚȨ´¹µö¡±¹¥»÷»ñµÃµÄ¡£ÔÚÕâÖÖ¹¥»÷ÖУ¬Ú¿Æ·Ö×Óͨ³£Í¨¹ýͶ×ÊȦÌ×ÓÕÆÊܺ¦ÕßÊÚÓèÆä½Ó¼û¼ÓÃÜÇ®±ÒÇ®°üµÄȨÏÞ¡£´Ë±í£¬·¨ÂÉÈËÔ±»¹²éÁËÈ»ÓëÈ«ÇòڿƻÓйصij¬¹ý4500ÍòÃÀÔªµÄ±»µÁ¼ÓÃÜÇ®±Ò¡£¹ÙÔ±ÃǰµÊ¾£¬¡°´óÎ÷ÑóÐж¯¡±ÖÐʹÓõĹ«Ë½ºÏ×÷ģʽ½«³ÉΪӢ¹úµ±¾Ö×î½ü°ä·¢µÄ·´Ú²ÆÕ½ÊõµÄÖ÷ÌâÉí·Ö£¬¸ÃÕ½Êõ½«ÐÐÒµÊý¾ÝºÍ·¨ÂÉרҵ֪ʶÁªÏµÆðÀ´£¬ÒÔʵÏÔìÛÕ©Ô¤·À¡£
https://www.bleepingcomputer.com/news/security/police-identifies-20-000-victims-in-international-crypto-fraud-crackdown/


¾©¹«Íø°²±¸11010802024551ºÅ