Salesforce AI¹¥»÷µ¼ÖÂCRMÊý¾Ý±»ÇÔÈ¡
Ðû²¼Ê±¼ä 2025-09-281. Salesforce AI¹¥»÷µ¼ÖÂCRMÊý¾Ý±»ÇÔÈ¡
9ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬Noma SecurityÑо¿Ö°Ô±¿ËÈÕÅû¶һÖÖÃûΪ"ForcedLeak"µÄÐÂÐ͹¥»÷ÒªÁ죬£¬£¬£¬£¬£¬¿ÉʹÓÃÌáÐÑ×¢ÈëºÍÓâÆÚÓòÃû¶ÔSalesforceµÄAgentforceƽ̨ʵÑéÊý¾ÝÇÔÈ¡¡£¡£¡£¡£¸Ã¹¥»÷ÓÉ·¢Ã÷¸ÃÎó²îµÄNoma Security¹«Ë¾ÑéÖ¤£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾½üÆÚ¸ÕÍê³É1ÒÚÃÀÔªÈÚ×ÊÒÔÇ¿»¯ÆäAIÊðÀíÇ徲ƽ̨¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÀÄÓÃAgentforceµÄWeb-to-Lead¹¦Ð§ÊµÑé¹¥»÷¡£¡£¡£¡£¸Ã¹¦Ð§ÔÊÐíÆóÒµ½¨ÉèÍøÒ³±íµ¥ÍøÂçÍⲿÓû§µÄDZÔÚ¿Í»§ÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢×Ô¶¯´æÈëCRMϵͳ¡£¡£¡£¡£¹¥»÷Õß¿ÉÏòÕâЩ±íµ¥Ìá½»°üÀ¨¶ñÒâÖ¸ÁîµÄÌØÖÆ¸ºÔØ£¬£¬£¬£¬£¬£¬µ±AgentforceÊðÀí´¦Öóͷ£´ËÀàÐÅϢʱ£¬£¬£¬£¬£¬£¬½«´¥·¢ÌáÐÑ×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬µ¼ÖÂÊðÀíÖ´Ðй¥»÷ÕßÖ¸¶¨µÄ²Ù×÷¡£¡£¡£¡£ÀýÈ磬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÑÝʾÁËͨ¹ý¸ºÔØÒªÇóAIÊðÀíÍøÂçCRMÖеĵç×ÓÓʼþµØµã£¬£¬£¬£¬£¬£¬²¢½«ÆäÌí¼Óµ½·¢ËÍÖÁÔ¶³ÌЧÀÍÆ÷µÄÇëÇó²ÎÊýÖУ¬£¬£¬£¬£¬£¬´Ó¶øÊµÏÖÊý¾Ýй¶¡£¡£¡£¡£¸üÒþ²ØµÄ¹¥»÷·¾¶Éæ¼°ÒÑÓâÆÚµÄSalesforceÓòÃû¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÕùÏÈ×¢²áÓâÆÚÓòÃû£¬£¬£¬£¬£¬£¬²¢½«ÆäÉèÖÃΪÎüÊÕÇÔÈ¡Êý¾ÝµÄЧÀÍÆ÷¡£¡£¡£¡£ÓÉÓÚ¸ÃÓòÃûÔøÊôÓÚSalesforceÐÅÈÎÓò£¬£¬£¬£¬£¬£¬¹¥»÷¿ÉÄܺã¾Ãδ±»²ì¾õ¡£¡£¡£¡£
https://www.securityweek.com/salesforce-ai-hack-enabled-crm-data-theft/
2. Rust Crates.ioÏÖ¶ñÒâ°üÇÔÈ¡¼ÓÃÜ˽Կ
9ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬Rust¹Ù·½°ü¿ÍÕ»Crates.io¿ËÈÕÆØ³öÁ½¸ö¶ñÒâÈí¼þ°üfastest_logºÍasync_println£¬£¬£¬£¬£¬£¬×ÜÏÂÔØÁ¿½ü8500´Î£¬£¬£¬£¬£¬£¬Æäͨ¹ýαװ³ÉÕýµ±°üʵÑé¼ÓÃÜÇ®±Ò˽ԿÇÔÈ¡¹¥»÷¡£¡£¡£¡£ÕâÁ½¸ö°üÓÚ5ÔÂ25ÈÕÐû²¼£¬£¬£¬£¬£¬£¬»®·Ö±»ÏÂÔØ7200´ÎºÍ1200´Î£¬£¬£¬£¬£¬£¬Ã°³äÈÈÃÅÈÕÖ¾¿âfast_log£¬£¬£¬£¬£¬£¬¸´ÖÆÆäREADMEÎļþ¡¢´æ´¢¿âÔªÊý¾Ý£¬£¬£¬£¬£¬£¬²¢±£´æÕæÊµÏîÄ¿µÄÈÕÖ¾¹¦Ð§ÒÔ½µµÍ¿ª·¢ÕßСÐÄ¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÈÕÖ¾´ò°ü¹¦Ð§É¨ÃèÊܺ¦ÏµÍ³£¬£¬£¬£¬£¬£¬ÖصãÇÔÈ¡ÈýÀàÃô¸ÐÐÅÏ¢£ºÒÔÌ«·»Ë½Ô¿µÄÊ®Áù½øÖÆ×Ö·û´®¡¢SolanaÃÜÔ¿/µØµãµÄBase58×Ö·û´®£¬£¬£¬£¬£¬£¬ÒÔ¼°¿ÉÄÜÒþ²ØÃÜÔ¿µÄÀ¨ºÅÄÚ×Ö½ÚÊý×é¡£¡£¡£¡£Æ¥Åäµ½ÕâЩģʽºó£¬£¬£¬£¬£¬£¬Êý¾Ý»á±»´ò°ü²¢·¢Ë͵½Ó²±àÂëµÄCloudflare Worker URL£¬£¬£¬£¬£¬£¬¸Ã¶Ëµã¾²âÊÔÈ·ÈÏ´¦Óڻ״̬Çҷǹٷ½Solana RPC½Úµã¡£¡£¡£¡£´úÂëÇå¾²¹«Ë¾SocketÂÊÏÈ·¢Ã÷´Ë¹¥»÷²¢ÏòCrates.io±¨¸æ£¬£¬£¬£¬£¬£¬Æ½Ì¨ÓÚ9ÔÂ24ÈÕɾ³ýÕâÁ½¸ö°ü²¢·â½ûÐû²¼ÕßÕË»§¡°rustguruman¡±ºÍ¡°dumbnbased¡±¡£¡£¡£¡£Crates.ioͨ¸æÖ¸³ö£¬£¬£¬£¬£¬£¬ÕâЩ¶ñÒâ°üÎÞÏÂÓÎÒÀÀµ£¬£¬£¬£¬£¬£¬·â½ûÕË»§Î´Ìá½»ÆäËûÏîÄ¿£¬£¬£¬£¬£¬£¬¹¥»÷ÒÑ»ù±¾É¨³ý¡£¡£¡£¡£µ«ÒÑÏÂÔØ°üµÄ¿ª·¢Ö°Ô±ÈÔÐèÖ´ÐÐϵͳÕûÀí£¬£¬£¬£¬£¬£¬²¢½«Êý×Ö×ʲú×ªÒÆÖÁÐÂÇ®°üÒÔ±ÜÃâ±»µÁ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/malicious-rust-packages-on-cratesio-steal-crypto-wallet-keys/
3. ¶íº¥¶íÖÝÁªºÏÏØÔâÓö´ó¹æÄ£ÀÕË÷Èí¼þ¹¥»÷
9ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹ú¶íº¥¶íÖÝÁªºÏÏØ5ÔÂ18ÈÕ±¬·¢Ò»ÆðÑÏÖØµÄÀÕË÷Èí¼þ¹¥»÷ÊÂÎñ£¬£¬£¬£¬£¬£¬µ¼ÖÂÔ¼45,487ÃûסÃñ¼°ÊÂÇéÖ°Ô±µÄÉç»áÇå¾²ºÅÂë¡¢½ðÈÚÕË»§ÐÅÏ¢¡¢¼ÝÕÕºÅÂë¡¢Ö¸ÎÆÊý¾Ý¡¢Ò½ÁƼͼ¼°»¤ÕÕºÅÂëµÈÃô¸ÐÐÅÏ¢±»µÁ¡£¡£¡£¡£¾ÊÓ²ìÈ·ÈÏ£¬£¬£¬£¬£¬£¬ÍøÂç·¸·¨·Ö×Ó×Ô5ÔÂ6ÈÕÆð±ãÒÑÇÖÈë¸ÃÏØÍøÂçϵͳ£¬£¬£¬£¬£¬£¬Ö±ÖÁ18ÈÕÀÕË÷Èí¼þ±»¼ì²â·¢Ã÷£¬£¬£¬£¬£¬£¬Ê±´úÒ»Á¬ÇÔÈ¡Êý¾Ý¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬£¬ÁªºÏÏØÑ¸ËÙÆô¶¯Ó¦¼±ÏìÓ¦»úÖÆ£¬£¬£¬£¬£¬£¬ÁªºÏµÚÈý·½ÍøÂçÇ徲ר¼ÒÓëÁª°îÖ´·¨²¿·ÖÕö¿ªÖÜÈ«ÊӲ죬£¬£¬£¬£¬£¬²¢ÓÚ8ÔÂ25ÈÕÍê³ÉÊÂÎñÉó²éºóÕýʽÆô¶¯Êܺ¦Õß֪ͨ³ÌÐò¡£¡£¡£¡£ÁªºÏÏØÔÚÖÂÊÜÓ°ÏìÕßµÄÊý¾Ýй¶֪ͨÐÅÖÐÃ÷È·Ö¸³ö£¬£¬£¬£¬£¬£¬¹¥»÷±¬·¢ºóÒÑÁ¬Ã¦ÓëÌìÏÂ×ÅÃûÍøÂçÇå¾²ÕÕÁÏÏàÖú£¬£¬£¬£¬£¬£¬ÔÚ°ü¹ÜϵͳÇå¾²µÄͬʱ½ç¶¨Ãü¾Ýй¶¹æÄ££¬£¬£¬£¬£¬£¬²¢Í¬²½ÏòÁª°îÖ´·¨»ú¹¹¼°ÃåÒòÖÝ×ÜÉó²é³¤°ì¹«ÊÒ±¨±¸¡£¡£¡£¡£Æ¾Ö¤¹Ù·½Åû¶£¬£¬£¬£¬£¬£¬±»µÁÊý¾ÝÀàÐͺ¸ÇСÎÒ˽¼ÒÉí·Ý½¹µãÐÅÏ¢¼°½ðÈÚ¡¢Ò½ÁƵÈÃô¸ÐÁìÓò£¬£¬£¬£¬£¬£¬Ïêϸ°üÀ¨ÐÕÃû¡¢Éç»áÇå¾²ºÅÂë¡¢ÒøÐÐÕË»§ÏêÇé¡¢ÉúÎïʶ±ðÐÅÏ¢¼°¹ú¼ÊÂÃÐÐÖ¤¼þ±àºÅµÈ¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÉÐÎÞÈκÎÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£
https://securityaffairs.com/182689/uncategorized/ohios-union-county-suffers-ransomware-attack-impacting-45000-people.html
4. ºÚ¿ÍʹÓÃSEOÖж¾Óë¶ñÒâ¹ã¸æÖ²ÈëOysterºóÃÅ
9ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬ºÚ¿Íͨ¹ýSEOÖж¾ºÍËÑË÷ÒýÇæ¹ã¸æÍƹãÐéαMicrosoft Teams×°ÖóÌÐò£¬£¬£¬£¬£¬£¬Ê¹ÓÃOysterºóÃÅѬȾWindows×°±¸£¬£¬£¬£¬£¬£¬ÎªÆóÒµÍøÂç»ñÈ¡³õʼ»á¼ûȨÏÞ¡£¡£¡£¡£Oyster¶ñÒâÈí¼þ£¨ÓÖÃûBroomstick¡¢CleanUpLoader£©×Ô2023ÄêÖÐÊ״ηºÆðºó£¬£¬£¬£¬£¬£¬ÒѹØÁª¶àÆð¶ñÒâ»î¶¯¡£¡£¡£¡£¸ÃºóÃÅÔÊÐí¹¥»÷ÕßÔ¶³ÌÖ´ÐÐÏÂÁî¡¢°²ÅÅÌØÊâ¸ºÔØ¼°´«ÊäÎļþ£¬£¬£¬£¬£¬£¬³£Í¨¹ýð³äPutty¡¢WinSCPµÈÊ¢ÐÐIT¹¤¾ßµÄ¶ñÒâ¹ã¸æÈö²¥£¬£¬£¬£¬£¬£¬ÉõÖÁ±»RhysidaÀÕË÷Èí¼þ×éÖ¯ÓÃÓÚÈëÇÖÆóÒµÍøÂç¡£¡£¡£¡£Blackpoint SOC×îÐÂÅû¶µÄ¹¥»÷Á´ÏÔʾ£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÔÚÓû§ËÑË÷¡°TeamsÏÂÔØ¡±Ê±£¬£¬£¬£¬£¬£¬Í¨¹ý·Ç΢ÈíÓòÃûµÄ¹ã¸æºÍÓòÃûÖ¸µ¼ÖÁαÔìµÄTeamsÏÂÔØÒ³Ãæ¡£¡£¡£¡£Óû§µã»÷ÏÂÔØµÄ¡°MSTeamsSetup.exe¡±Îļþ£¬£¬£¬£¬£¬£¬ËäʹÓÃαÔìµÄ¡°4th State Oy¡±ºÍ¡°NRM NETWORK RISK MANAGEMENT INC¡±Ö¤ÊéÊðÃûÒÔÔöÇ¿¿ÉÐŶȣ¬£¬£¬£¬£¬£¬µ«Ö´Ðкó»á½«¶ñÒâDLLÖ²Èë%APPDATA%\RoamingÎļþ¼Ð£¬£¬£¬£¬£¬£¬²¢½¨ÉèÃûΪ¡°CaptureService¡±µÄÍýÏëʹÃü£¬£¬£¬£¬£¬£¬Ã¿11·ÖÖÓÖ´ÐÐÒ»´ÎDLL£¬£¬£¬£¬£¬£¬È·±£ºóÃÅÔÚÏµÍ³ÖØÆôºóÒ»Á¬»îÔ¾¡£¡£¡£¡£BlackpointÇ¿µ÷£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÕýʹÓÃÓû§¶ÔËÑË÷Ч¹û¼°×ÅÃûÆ·ÅÆµÄÐÅÈÎʵÑéÉøÍ¸£¬£¬£¬£¬£¬£¬ITÖÎÀíÔ±×÷Ϊ¸ßȨÏÞÄ¿µÄÐè¸ñÍâСÐÄ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fake-microsoft-teams-installers-push-oyster-malware-via-malvertising/
5. Archer HealthÉèÖùýʧ´æ´¢Í°ÖÂ14.5Íò·ÝÃô¸ÐÎļþ̻¶
9ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬Çå¾²Ñо¿Ô±Jeremiah Fowler·¢Ã÷Ò»¸öδ¼ÓÃÜÇÒÎÞÃÜÂë±£»£»£»£»£»¤µÄÉèÖùýʧ´æ´¢Í°£¬£¬£¬£¬£¬£¬ÄÚº¬Ô¼14.5Íò¸öÎļþ£¨×ܼÆ23GB£©£¬£¬£¬£¬£¬£¬Éæ¼°´ó×ÚÒ½ÁÆÃô¸ÐÊý¾Ý¡£¡£¡£¡£¾³éÑùºË²é£¬£¬£¬£¬£¬£¬¸ÃÊý¾Ý¿â°üÀ¨»¼ÕßÐÕÃû¡¢IDºÅ¡¢Éç»áÇå¾²ºÅÂ루SSN£©¡¢×¡Ö·¡¢µç»°ºÅÂëµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©£¬£¬£¬£¬£¬£¬ÒÔ¼°Õï¶Ï¼Í¼¡¢ÖÎÁƼƻ®¡¢Õչ˻¤Ê¿ÍýÏë¡¢³öÔº±í¸ñµÈÊܱ£»£»£»£»£»¤¿µ½¡ÐÅÏ¢£¨PHI£©¡£¡£¡£¡£ÎļþȪԴÒÉËÆÖ¸ÏòÒ½ÁÆÖÎÀíÈí¼þ£¬£¬£¬£¬£¬£¬²¿·ÖÎļþ¼ÐÖ±½ÓÒÔ»¼ÕßÐÕÃûÃüÃû£¬£¬£¬£¬£¬£¬ÉÐÓС°´«Õæ¶©µ¥¡±¡°ºÏ²¢PDFÎļþ¡±ÖзÖÀ࣬£¬£¬£¬£¬£¬Ì»Â¶ÁË»¼ÕßÓëÒ½ÁÆÐ§ÀÍÌṩÕßµÄÏêϸ»î¶¯ÈÕÖ¾¡¢Èճ̰²ÅŵÈÒþ˽ÄÚÈÝ¡£¡£¡£¡£FowlerÓÚ8ÔÂβÊ״η¢Ã÷Êý¾Ýй¶£¬£¬£¬£¬£¬£¬9ÔÂ1ÈÕ-2ÈÕÍê³ÉÉó²éºó£¬£¬£¬£¬£¬£¬ÓÚ9ÔÂ4ÈÕÏòArcher Home Health·¢³öÈÏÕæÈÎÅû¶¾¯±¨£¬£¬£¬£¬£¬£¬¶Ô·½ÔÚ24СʱÄÚ»ØÓ¦¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬9ÔÂ7ÈÕ£¬£¬£¬£¬£¬£¬°µÍø×éÖ¯KillSec3Òѽ«Archer HealthÁÐÈëÆäйÃÜÍøÕ¾£¬£¬£¬£¬£¬£¬²¢ÓÚÔ½ÈÕ¹ûÕæÐ¹Â¶8GBÊý¾Ý¡£¡£¡£¡£¸Ã×éÖ¯´Ëǰ±»ÆØºã¾ÃʹÓÃGrayhatwarfareµÈƽ̨Õ÷²É¹ûÕæÌ»Â¶µÄÊý¾Ý£¬£¬£¬£¬£¬£¬Í¨¹ýÏÂÔØ²¢ÍþвʵÌå¾ÙÐÐÀÕË÷¡£¡£¡£¡£
https://databreaches.net/2025/09/26/archer-health-was-leaking-protected-health-information-criminals-appear-to-have-found-it/
6. ApolloMDÔâ°µÍø×éÖ¯÷è÷ëÍþвÊý¾Ýй¶
9ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬°µÍø×éÖ¯¡°÷è÷롱6ÔÂ12ÈÕ½«Ò½ÁÆÏàÖúͬ°éApolloMDÁÐÈëÆä×ßÂ©ÍøÕ¾£¬£¬£¬£¬£¬£¬Éù³ÆÓµÓÐ238GBÎļþ²¢±ê×¢ÈÕÆÚΪ6ÔÂ6ÈÕ¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬÷è÷ëδ¶ÒÏÖ6ÔÂ16ÈÕ¹ûÕæÊý¾ÝµÄÍþв£¬£¬£¬£¬£¬£¬ÏÂÔØÁ´½ÓÖÐδ·¢Ã÷ÏÖʵÊý¾Ý¡£¡£¡£¡£ApolloMD×ܲ¿Î»ÓÚ×ôÖÎÑÇÖÝ£¬£¬£¬£¬£¬£¬×Ô1983ÄêÆð×÷ΪҽÉúÏòµ¼µÄ˽È˼¯ÍÅ£¬£¬£¬£¬£¬£¬ÎªÒ½ÔºÌṩÁÙ´²ÔËÓª¡¢»¼ÕßÕչ˻¤Ê¿¼°²ÆÎñÓÅ»¯Ð§ÀÍ¡£¡£¡£¡£÷è÷ëÐû²¼µÄÇåµ¥°üÀ¨²ÆÎñÐÅÏ¢½ØÍ¼£¬£¬£¬£¬£¬£¬µ«Î´É漰СÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©»òÊܱ£»£»£»£»£»¤¿µ½¡ÐÅÏ¢£¨PHI£©¡£¡£¡£¡£ApolloMDÓÚ9ÔÂ15ÈÕÔÚ¹ÙÍøÐû²¼Ì滻֪ͨ£¬£¬£¬£¬£¬£¬Åû¶5ÔÂ22ÈÕÖÁ23ÈÕ±¬·¢Î´¾ÊÚȨ»á¼û£¬£¬£¬£¬£¬£¬µ«Î´Ìá¼°ÍþвÕßÃû³Æ¡¢Îļþ¼ÓÃÜÇéÐλòÊê½ðÒªÇ󡣡£¡£¡£DataBreachesÏòÆäѯÎÊÏà¹ØÏ¸½Ú£¬£¬£¬£¬£¬£¬×èÖ¹ÏÖÔÚδ»ñ»Ø¸´¡£¡£¡£¡£ApolloMD֪ͨÁË11¼Ò¹ØÁªÒ½ÁÆ»ú¹¹£¬£¬£¬£¬£¬£¬°üÀ¨ÅÁÈû¿ËҽԺЧÀÍÓÐÏÞ¹«Ë¾¡¢ÅíÈø¿ÆÀסԺҽʦÓÐÏÞÔðÈι«Ë¾µÈ£¬£¬£¬£¬£¬£¬Ê±¼ä¹æÄ£´Ó2015Äê7ÔÂÖÁ2025Äê9Ô¡£¡£¡£¡£9ÔÂ17ÈÕ£¬£¬£¬£¬£¬£¬ApolloMDÏòÊÜÓ°Ï컼Õß·¢ËÍ֪ͨÐÅ£¬£¬£¬£¬£¬£¬Ã÷ȷй¶Êý¾ÝÉæ¼°»¼ÕßÐÕÃû¡¢³öÉúÈÕÆÚ¡¢µØµã¡¢Õï¶ÏÐÅÏ¢¡¢Ò½ÁÆÐ§ÀÍÌṩÕßÐÕÃû¡¢Ð§ÀÍÈÕÆÚ¡¢ÖÎÁÆÐÅÏ¢¼°¿µ½¡°ü¹ÜÐÅÏ¢£¬£¬£¬£¬£¬£¬²¿·Ö»¼Õß¿ÉÄÜ̻¶Éç»áÇå¾²ºÅÂ루SSN£©¡£¡£¡£¡£CyberScoutΪ»¼ÕßÌṩÃâ·ÑÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£
https://databreaches.net/2025/09/26/apollomd-notifies-patients-of-11-physician-practices-affected-by-a-june-cyberattack/


¾©¹«Íø°²±¸11010802024551ºÅ