Marimo·ì϶Åû¶½ö10Ó×ʱºóÔâºÚ¿ÍÀûÓÃ

°ä²¼¹¦·ò 2026-04-13

1. Marimo·ì϶Åû¶½ö10Ó×ʱºóÔâºÚ¿ÍÀûÓÃ


4ÔÂ12ÈÕ £¬MarimoÊÇÒ»¸ö±¸ÊÜÓ­½ÓµÄ¿ªÔ´ÏìӦʽPython notebookƽ̨ £¬ÆäÒ»¸öÑϳÁ·ì϶ÔÚ¹«¿ªÅû¶½ö10Ó×ʱºó¾Í±»ºÚ¿Í»ý¼«ÀûÓà ¡£¸Ã·ì϶±àºÅΪCVE-2026-39987 £¬GitHub¶ÔÆäÑϳÁˮƽÆÀ·ÖΪ9.3·Ö £¬ÔÊÐí¹¥»÷ÕßÔÚMarimo 0.20.4¼°¸üÔç°æ±¾ÖÐÎÞÐèÈκÎÉí·ÝÑéÖ¤¼´¿ÉÔ¶³ÌÖ´ÐдúÂë ¡£Marimoͨ³£±»Êý¾Ý¿ÆÑ§¼Ò¡¢»úе½ø½¨´ÓÒµÕß¡¢×êÑÐÈËÔ±ºÍ¿ª·¢ÈËÔ±ÓÃÓÚ¹¹½¨Êý¾ÝÀûÓ÷¨Ê½»òÒDZí°å £¬ÔÚGitHubÉÏÕ¼ÓÐ20,000¸östarºÍ1,000¸öfork £¬Óû§»ù´¡¿í·º ¡£¸Ã·ì϶µÄµ××ÓÔ­ÒòÔÚÓÚWebSocket¶Ëµã¡°/terminal/ws¡±Â¶³öÁ˽»»¥Ê½ÖÕ¶Ë £¬µ«Î´½øÐÐÊʵ±µÄÉí·ÝÑéÖ¤²é³­ £¬Ê¹µÃÈκÎδ¾­Éí·ÝÑéÖ¤µÄ¿Í»§¶Ë¶¼Äܹ»Ö±½ÓÏνÓ £¬»ñµÃÓëMarimo¹ý³ÌÒ»ÑùȨÏÞµÄÆëÈ«½»»¥Ê½shell ¡£MarimoÓÚ4ÔÂ8ÈÕÅû¶Á˸÷ì϶ £¬²¢ÓÚ×òÈÕ°ä²¼ÁË0.23.0°æ±¾½øÐн¨¸´ ¡£¿ª·¢ÕßÖ¸³ö £¬¸Ã·ìÏ¶ÖØÒªÓ°Ï콫Marimo²¿ÊðΪ¿É±à×ë±Ê¼Ç±¾µÄÓû§ £¬ÒÔ¼°ÔÚ±à×ëģʽÏÂʹÓÃ--host 0.0.0.0½«Marimo¶³öÓÚ¹²ÏíÍøÂçµÄÓû§ ¡£¾ÝÔÆ°²È«¹«Ë¾SysdigµÄ×êÑÐÈËÔ±³Æ £¬ÔÚ·ì϶ÏêÇéÅû¶ºóµÄǰ12Ó×ʱÄÚ £¬¾ÍÓÐ125¸öIPµØÖ·ÆðÍ·½øÐпúËŻ ¡£Åû¶ºó²»µ½10Ó×ʱ £¬×êÑÐÈËÔ±¾Í¹Û²ìµ½Á˵ÚÒ»´ÎÀûÓó¢ÊÔ ¡£


https://www.bleepingcomputer.com/news/security/critical-marimo-pre-auth-rce-flaw-now-under-active-exploitation/


2. ºÚ¿ÍÐû³Æ½ÚÔìÁËÍþÄá˹ʥÂí¿É¹ã³¡µÄ·Àºé±Ãϵͳ


4ÔÂ12ÈÕ £¬½üÈÕ £¬Òâ´óÀûÍþÄá˹ʥÂí¿É¹ã³¡µÄ·ÀºéҺѹ±ÃϵͳÔâµ½ÍøÂç¹¥»÷ £¬Ò»¸ö×Գơ°»ù´¡ÉèÊ©·ÛËéÓ××顱»ò¡°ÒõÓôÒýÇæ¡±µÄ×éÖ¯Ðû³ÆÒÑ»ñµÃϵͳÖÎÀíȨÏÞ £¬²¢ÑïÑÔÄܹ»¡°Ì±»¾·ÀÓùϵͳ²¢¸²Ã»Ñغ£µØÓò¡± £¬½«ÍøÂçÈëÇÖÑݱäΪDZÔÚµÄÎïÀí¿àÄÑ ¡£¸Ã×éÖ¯ÔÚÆäTelegramƵ·Éϰ䲼ÖÐÎÄÌû×Ó £¬Ðû³ÆÒÑÆëÈ«½ÚÔìÒâ´óÀû»ù´¡ÉèÊ©ºÍ½»Í¨ÊÖÏÂÊôµÄ·Àºéϵͳ £¬²¢¹«¿ªÒÔ600ÃÀÔªµÄ¼ÛÖµÏúÊÛϵͳµÄÆëÈ«rootȨÏÞ ¡£¹ÌÈ»µ±¾ÖÈ·Èϱ£»¤Ê¥Âí¿É´ó½ÌÌõĹؼüϵͳδÊÜÓ°Ïì £¬µ«¸ÃÊÂÎñ¶³öÁËÒ»¸öÁîÈËÓÇÓôµÄÏÖʵ£º¼´±ãÊÇÓµÓи߶ÈÏóÕ÷Òâ˼ºÍÕ½ÊõÒâ˼µÄ»ù´¡ÉèÊ© £¬Ò²¿ÉÄܱ»Ì½²â¡¢½Ó¼ûºÍ°Ñ³Ö ¡£Ó봫ͳITϵͳ·ÖÆç £¬OTϵͳֱ½ÓÓëÎïÀí¹ý³Ì½»»¥ ¡£Ò»µ©Ôâµ½·ÛËé £¬ºó¹û²»½öÊÇÊý¾ÝÃÔʧ £¬»¹»áµ¼Ö·þÎñÖжϡ¢¾­¼ÃËðʧ £¬ÉõÖÁÍþв¹«¹²°²È« ¡£Õâ´Î¹¥»÷ʼÓÚ3ÔÂÏÂÑ® £¬¹¥»÷ÕßÈëÇÖÁËϵͳ½ÚÔì½çÃæ £¬4Ô³õÆðÍ·°ä²¼½ÚÔìÃæ°å½ØÍ¼¡¢ÏµÍ³²¼¾ÖͼºÍ·§ÃÅ״̬ͼµÈÖ¤¾Ý ¡£


https://securityaffairs.com/190679/hacktivism/hackers-claim-control-over-venice-san-marco-anti-flood-pumps.html


3. ½ü4000̨ÃÀ¹ú¹¤ÒµÉ豸Ôâ·êÒÁÀÊÍøÂç¹¥»÷


4ÔÂ10ÈÕ £¬ÓëÒÁÀÊÓйØÁªµÄºÚ¿Í×éÖ¯Õý³ÖÐø¶ÔÃÀ¹ú¹Ø¼ü»ù´¡ÉèÊ©ÍøÂçÌáÒé¹¥»÷ £¬Ö¸±êÔ̺¬Êýǧ̨ÓÉÂÞ¿ËΤ¶û×Ô¶¯»¯¹«Ë¾Ôì×÷µÄ¡¢Â¶³öÔÚ»¥ÁªÍøÉϵĿɱà³ÌÂß¼­½ÚÔìÆ÷£¨PLC£© ¡£Æ¾¾ÝÃÀ¹ú¶à¸öÁª¹ú»ú¹¹Öܶþ°ä²¼µÄ½áºÏ²¼¸æ £¬×Ô2026Äê3ÔÂÒÔÀ´ £¬ÒÁÀʹú¶ÈÖ§³ÖµÄºÚ¿Í×éÖ¯Ò»ÏòÒÔRockwell Automation/Allen-Bradley PLCÉ豸Ϊָ±ê £¬ÒÑÔì³ÉÔËÓªÖжϺ;­¼ÃËðʧ ¡£»ã±¨»ú¹¹ÖÒ¸æ³Æ £¬ÕâЩ¹¥»÷»î¶¯×î½üÓÐËùÉý¼¶ £¬ºÜ¿ÉÄÜÊǶÔÒÁÀÊÓëÃÀ¹úºÍÒÔÉ«ÁÐÖ®¼äµÐ¶ÔÐж¯µÄ»ØÓ¦ ¡£Áª¹úµ÷²é¾ÖÈ϶¨ £¬¹¥»÷ÐÐΪÒѵ¼ÖÂÉ豸ÏîÄ¿Îļþ±»ÌáÈ¡ £¬ÒÔ¼°ÈË»ú½çÃæºÍ¼à¿ØÏµÍ³ÏÔʾÆÁÉϵÄÊý¾ÝÔâµ½´Û¸Ä ¡£ÍøÂ簲ȫ¹«Ë¾Censys´ÎÈջ㱨³Æ £¬ÔÚÈ«Çò·¢ÏÖµÄ5200¶à¸ö¶³öÔÚ»¥ÁªÍøÉϵĴËÀ๤ҵ½ÚÔìϵͳÖÐ £¬ËÄ·ÖÖ®ÈýÀ´×ÔÃÀ¹ú ¡£Êý¾ÝÏÔʾ £¬È«ÇòÓÐ5,219¸ö¶³öÓÚ»¥ÁªÍøµÄÖ÷»úÏìÓ¦EtherNet/IPºÍ̸²¢×Ô³ÆÎªÂÞ¿ËΤ¶û×Ô¶¯»¯É豸 £¬ÆäÖÐÃÀ¹úռȫÇò¶³öÁ¿µÄ74.6% £¬¹²3,891¸öÖ÷»ú ¡£ÖµÍ×ÌùÐĵÄÊÇ £¬·äÎÑÔËÓªÉÌASNµÄ·Ý¶î²»³É±ÈÀýµØ¸ß £¬Åú×¢ÏÖ³¡²¿ÊðµÄÉ豸λÓÚ·äÎѵ÷Ôì½âµ÷Æ÷ÉÏ £¬½øÒ»²½À©´óÁ˹¥»÷Ãæ ¡£


https://www.bleepingcomputer.com/news/security/nearly-4-000-us-industrial-devices-exposed-to-iranian-cyberattacks/


4. CPUIDÔâÈëÇÖ £¬CPU-Z/HWMonitorÏÂÔØÁ´½Ó±»´Û¸Ä


4ÔÂ10ÈÕ £¬ºÚ¿Í³É¹¦»ñµÃÁËCPUIDÏîÖ÷ÕÅAPI½Ó¼ûȨÏÞ £¬²¢´Û¸ÄÁ˹ٷ½ÍøÕ¾ÉϵÄÏÂÔØÁ´½Ó £¬½«Ê¢ÐеÄÓ²¼þ¼ì²â¹¤¾ßCPU-ZºÍHWMonitorµÄ×°Ö÷¨Ê½´úÌæÎª¶ñÒâ¿ÉÖ´ÐÐÎļþ ¡£ÕâÁ½¸öʵÓ÷¨Ê½Óµº±¼û°ÙÍòÓû§ £¬ËûÃÇÒÀ¸½ÕâЩ¹¤¾ßÀ´¸ú×ÙÍÆËã»úÄÚ²¿Ó²¼þµÄÎïÀí½¡È«Çé¿öºÍÏµÍ³È«Ãæ¹æ¸ñ ¡£½üÆÚ £¬ÔÚReddit¸ßµÍÔØÕâÁ½¿î¹¤¾ßµÄÓû§»ã±¨³Æ £¬¹Ù·½ÏÂÔØÃÅ»§Ö¸ÏòCloudflare R2´æ´¢·þÎñ £¬»ñÈ¡µÄÈ´ÊÇÁíÒ»¿îÕï¶Ï¹¤¾ßHWiNFOµÄľÂí°æ±¾ ¡£CPUID½²»°ÈËÌṩÉêÃ÷³Æ £¬µ÷²éÈÔÔÚ½øÐÐÖÐ £¬µ«³õ²½ÅжÏ4ÔÂ9ÈÕÖÁ10ÈÕÆÚ¼ä £¬Ò»¸ö¸¨ÖúÖ°ÄÜ£¨±í²¿API£©Ôâµ½ÈëÇÖ £¬³ÖÐø¹¦·òÔ¼6Ó×ʱ £¬µ¼ÖÂÖ÷ÍøÕ¾Ëæ»úÏÔʾ¶ñÒâÁ´½Ó £¬µ«¹Ù·½ÊðÃûµÄԭʼÎļþδÊÜÓ°Ïì ¡£ÈëÇÖ±»·¢ÏÖºóÒѽ¨¸´ ¡£¿¨°Í˹»ù×êÑÐÈËÔ±·ÖÎöÖ¸³ö £¬Õâ´ÎÈëÇÖ´Ó4ÔÂ9ÈÕ15:00 UTC³ÖÐøµ½4ÔÂ10ÈÕ10:00 UTC×óÓÒ £¬¹¥»÷ÕßÉ¢²¼ÁËCPU-Z 2.19¡¢HWMonitor Pro 1.57¡¢HWMonitor 1.63ºÍPerfMonitor 2.04µÄ¶ñÒâ°æ±¾ ¡£Æ¾¾Ý¿¨°Í˹»ù¼à²â £¬³¬¹ý150ÃûÓû§ÏÂÔØÁ˶ñÒâ±äÖÖ £¬³ýÓ×ÎÒÓû§±í £¬ÖØÒªÎ»ÓÚ°ÍÎ÷¡¢¶íÂÞ˹ºÍÖйúµÄÁãÊÛ¡¢Ôì×÷¡¢Õ÷ѯ¡¢µçÐźÍũҵµÈÐÐÒµµÄÆóÒµÒ²Êܵ½Ó°Ïì ¡£


https://www.bleepingcomputer.com/news/security/supply-chain-attack-at-cpuid-pushes-malware-with-cpu-z-hwmonitor/


5. Storm-2755·¢Æð¹¤×ʽٳֹ¥»÷ÇÔÈ¡¼ÓÄôóÔ±¹¤¹¤×Ê


4ÔÂ10ÈÕ £¬Ò»¸öÃûΪStorm-2755µÄ¡¢ÒÔ¾­¼ÃÀûÒæÎªÖ÷ÕŵÄÍþвÐÐΪÕß £¬Õýͨ¹ý½Ù³Ö¼ÓÄôóÔ±¹¤µÄÕË»§ £¬·¢Æð¹¤×ʳÁ¶¨Ïò£¨Óֳƹ¤×ʽٳ֣©¹¥»÷ £¬ÇÔȡԱ¹¤µÄ¹¤×Ê ¡£¹¥»÷ÕßÀûÓöñÒâMicrosoft 365µÇÂ¼Ò³Ãæ £¬Í¨¹ý¶ñÒâ¸æ°×»òSEOͶ¶¾½«ÕâÐ©Ò³ÃæÍÆÖÁËÑË÷ÒýÇæÁ˾ֶ¥²¿ £¬ÓÕÆ­Êܺ¦ÕßÊäÈëÆ¾Ö¤ ¡£ÕâЩ¼Ù×°³ÉMicrosoft 365µÇ¼±íµ¥µÄ¶ñÒâÍøÒ³ £¬¿ÉÄܲ¶»ñÊܺ¦ÕßµÄÉí·ÝÑéÖ¤ÁîÅÆºÍ»á»°cookie ¡£Storm-2755ͨ¹ý³Á·Å±»µÁµÄ»á»°ÁîÅÆ¶ø·Ç³ÁнøÐÐÉí·ÝÑéÖ¤ £¬³É¹¦ÈƹýÁËÖÐÑëÈ˹¥»÷ÖеĶà³É·ÖÉí·ÝÑéÖ¤±£»¤ ¡£»ñȡԱ¹¤ÕË»§½Ó¼ûȨÏÞºó £¬¹¥»÷Õ߯ð³õ´´½¨ÊÕ¼þÏ乿¶¨ £¬×Ô¶¯½«ÈËÁ¦×ÊÔ´²¿ÃÅ·¢Ë͵ÄÔ̺¬¡°Ö±½Ó´æ¿î¡±»ò¡°ÒøÐÓ×±×ÖÑùµÄÓʼþÒÆ¶¯µ½°µ²ØÎļþ¼Ð £¬×èÖ¹Êܺ¦Õ߲鿴ÕâЩÓʼþ ¡£Ëæºó £¬ËûÃÇËÑË÷¡°¹¤×Ê¡±¡¢¡°ÈËÁ¦×ÊÔ´¡±¡¢¡°Ö±½Ó´æ¿î¡±ºÍ¡°²ÆÕþ¡±µÈ¹Ø¼ü´Ê £¬ÏòÈËÁ¦×ÊÔ´²¿ÃÅÔ±¹¤·¢ËÍÖ÷ÌâΪ¡°¹ØÓÚÖ±½Ó´æ¿îµÄÎÊÌ⡱µÄ´¹µöÓʼþ £¬ÓÕÆ­Ô±¹¤¸üÐÂÒøÐÐÐÅÏ¢ ¡£µ±Éç½»¹¤³Ì¹¥»÷ʧ°Üºó £¬¹¥»÷ÕßÖ±½ÓµÇ¼WorkdayµÈÈËÁ¦×ÊÔ´Èí¼þƽ̨ £¬ÀûÓÃÇÔÈ¡µÄ»á»°ÊÖ¶¯¸üÐÂÖ±½Ó´æ¿îÏêÇé £¬½«¹¤×ÊתÈë×Ô¼º½ÚÔìµÄÕË»§ ¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-canadian-employees-targeted-in-payroll-pirate-attacks/


6. ¹ú¼Ê·¨ÂÉÐж¯È·Èϳ¬2ÍòÃû¼ÓÃÜÇ®±ÒÚ¿Æ­Êܺ¦Õß


4ÔÂ11ÈÕ £¬ÓÉÓ¢¹ú¹ú¶È·¸×ïµ÷²é¾ÖǣͷµÄ¹ú¼Ê·¨ÂÉÐж¯¡°´óÎ÷ÑóÐж¯¡±ÒÑÈ·ÈÏ £¬ÔÚ¼ÓÄôó¡¢Ó¢¹úºÍÃÀ¹ú¾³ÄÚÓг¬¹ý20,000Ãû¼ÓÃÜÇ®±ÒÚ¿Æ­Êܺ¦Õß ¡£ÕâÏî½áºÏÐж¯ÓÚÉϸöÔ·¢Õ¹ £¬²Î¼Ó·½Ô̺¬Ó¢¹ú¹ú¶È·¸×ïµ÷²é¾Ö¡¢ÃÀ¹úÌØÇÚ¾Ö¡¢°²´ÖÂÔÊ¡¾¯Ô±¾Ö¡¢°²´ÖÂÔʡ֤ȯίԱ»áÒÔ¼°¶à¼Ò˽ӪÆóÒµºÏ×÷ͬ°é ¡£Ó¢¹ú¹ú¶È·¸×ïµ÷²é¾Ö°µÊ¾ £¬ÔÚΪÆÚÒ»ÖܵÄÐж¯ÖÐ £¬¶à¸ö·¨ÂÉ»ú¹¹ÔÚÆäÂ×¶Ø×ܲ¿Í¨¹ýʵʱµý±¨¹²Ïí¡¢¼¼ÊõÄÜÁ¦ºÍÊܺ¦ÕßÔöÔ® £¬ÔÚÈ«ÇòÁìÓòÄÚµ·»ÙÁ˶à¸öÚ¿Æ­ÍøÂç £¬Â׶ؽðÈڳǾ¯Ô±¾Ö¡¢½ðÈÚÐÐΪ¼à¹Ü¾ÖºÍÆäËû¹ú¼Ê·¨ÂÉ»ú¹¹Ò²²Î¼ÓÁËÕâ´ÎÐж¯ ¡£µ÷²éÈËÔ±¶³½áÁ˳¬¹ý1200ÍòÃÀÔªµÄÉæÏÓ·¸×ïËùµÃ £¬ÕâЩ¿î×ÓÊÇͨ¹ý¡°ÊÚȨ´¹µö¡±¹¥»÷»ñµÃµÄ ¡£ÔÚÕâÖÖ¹¥»÷ÖÐ £¬Ú¿Æ­·Ö×Óͨ³£Í¨¹ýͶ×ÊȦÌ×ÓÕÆ­Êܺ¦ÕßÊÚÓèÆä½Ó¼û¼ÓÃÜÇ®±ÒÇ®°üµÄȨÏÞ ¡£´Ë±í £¬·¨ÂÉÈËÔ±»¹²éÁËÈ»ÓëÈ«ÇòÚ¿Æ­»î¶¯Óйصij¬¹ý4500ÍòÃÀÔªµÄ±»µÁ¼ÓÃÜÇ®±Ò ¡£¹ÙÔ±ÃǰµÊ¾ £¬¡°´óÎ÷ÑóÐж¯¡±ÖÐʹÓõĹ«Ë½ºÏ×÷ģʽ½«³ÉΪӢ¹úµ±¾Ö×î½ü°ä·¢µÄ·´Ú²Æ­Õ½ÊõµÄÖ÷ÌâÉí·Ö £¬¸ÃÕ½Êõ½«ÐÐÒµÊý¾ÝºÍ·¨ÂÉרҵ֪ʶÁªÏµÆðÀ´ £¬ÒÔʵÏÔìÛÕ©Ô¤·À ¡£


https://www.bleepingcomputer.com/news/security/police-identifies-20-000-victims-in-international-crypto-fraud-crackdown/