Ìá½»ÐèÇó
*
*

*
*
*
Á¢¼´Ìá½»
µã»÷¡±Á¢¼´Ìá½»¡±£¬±íÃ÷ÎÒÀí½â²¢Í¬Òâ ¡¶»Æ½ð³Ç¿Æ¼¼Òþ˽Ìõ¿î¡·

logo

    ²úÆ·Óë·þÎñ
    ½â¾ö·½°¸
    ¼¼ÊõÖ§³Ö
    ºÏ×÷·¢Õ¹
    ¹ØÓڻƽð³Ç

    ÉêÇëÊÔÓÃ
      ÿÖܻƽð³Ç¹ÙÍøËÙµÝ??? | Anthropic×èÖ¹AIÇý¶¯ÀÕË÷¹¥»÷
      ·¢²¼Ê±¼ä£º2025-09-01 ÔĶÁ´ÎÊý£º 1903 ´Î

      ±¾ÖÜÈȵãʼþÍþвÇ鱨


      1¡¢Anthropic×èÖ¹AIÇý¶¯ÀÕË÷¹¥»÷


      AnthropicÅû¶£¬ÆäÓÚ2025Äê7Ô³ɹ¦×èÖ¹Ò»ÆðÀûÓÃAIÁÄÌì»úÆ÷ÈËClaude·¢¶¯µÄ¿çÐÐÒµÍøÂç¹¥»÷¡£¹¥»÷ÕßÕë¶ÔÒ½ÁÆ¡¢Ó¦¼±·þÎñ¡¢Õþ¸®¼°×ڽ̻ú¹¹µÈÖÁÉÙ17¸ö×é֯ʵʩÊý¾ÝÇÔÈ¡ÓëÀÕË÷£¬Êê½ðÒªÇó¸ß´ï50ÍòÃÀÔª¡£²»Í¬ÓÚ´«Í³ÀÕË÷Èí¼þ£¬´Ë´Î¹¥»÷Íþв¹«¿ªÃô¸ÐÊý¾ÝÒÔÆÈʹÊܺ¦·½¸¶¿î¡£¹¥»÷Õß½èÖúClaude CodeÔÚKali Linux»·¾³ÖÐ×Ô¶¯»¯Ö´ÐÐÕì²ì¡¢Æ¾¾ÝÇÔÈ¡ÓëÍøÂçÉøÍ¸£¬²¢¿ª·¢Î±×°³É΢Èí¹¤¾ßµÄ¶ñÒâ³ÌÐòÒÔ¹æ±Ü¼ì²â¡£¸ü¾ßÍþвÐÔµÄÊÇ£¬Claude±»ÓÃÓÚ·ÖÎö²ÆÎñÊý¾Ý£¬Öƶ¨²îÒ컯Êê½ð²ßÂÔ£¬ÉõÖÁ×Ô¶¯Éú³ÉÀÕË÷ÐÅ¡£Anthropic½«´Ë»î¶¯´úºÅ¡°GTG-2002¡±£¬²¢Ç¿µ÷AIÔÚ¹¥»÷ÖÐʵÏÖÁËÕ½ÊõÓëÕ½ÂÔ²ãÃæµÄ×ÔÖ÷¾ö²ß£¬ÏÔÖøÌá¸ßÁ˹¥»÷ЧÂÊÓëÒþ±ÎÐÔ¡£ÎªÓ¦¶Ô¸ÃÀàÍþв£¬AnthropicÒÑÑз¢¼ì²â·ÖÀàÆ÷²¢ÓëºÏ×÷»ï°é¹²Ïí¼¼ÊõÖ¸±ê¡£ __

      __

      ___

      ²Î¿¼Á´½Ó£º

      https://www.anthropic.com/news/detecting-countering-misuse-aug-2025


      2¡¢Ê×ÀýAIÇý¶¯ÀÕË÷Èí¼þPromptLockÏÖÉí

      ESETÅû¶Ê׸öÓÉÈ˹¤ÖÇÄÜÇý¶¯µÄÀÕË÷Èí¼þ¡°PromptLock¡±£¬¸Ã³ÌÐò»ùÓÚOpenAIз¢²¼µÄ¿ªÔ´Ä£ÐÍgpt-oss:20b£¬Í¨¹ýOllama APIÔÚ±¾µØÊµÊ±Éú³ÉLua½Å±¾£¬ÓÃÓÚÎļþö¾Ù¡¢Êý¾ÝÇÔÈ¡Óë¼ÓÃÜ¡£¸ÃÀÕË÷Èí¼þÓÉGolang±àд£¬¾ß±¸¿çƽ̨ÄÜÁ¦£¬¿ÉÔËÐÐÔÚWindows¡¢Linux¼°macOSϵͳÉÏ£¬²¢Ê¹ÓÃSPECK 128λ¼ÓÃÜËã·¨¡£Ó봫ͳÀÕË÷Èí¼þ²»Í¬£¬PromptLockÉú³ÉµÄLua½Å±¾ÔÚÿ´ÎÖ´ÐÐʱ¿ÉÄܲ»Í¬£¬¼«´óÔö¼ÓÁ˼ì²âÓë·ÀÓùÄѶÈ¡£Ä¿Ç°·ÖÎöÈÏΪÆäΪ¸ÅÄîÑéÖ¤£¨PoC£©£¬µ«ÒÑÄܱàдÕë¶ÔÊܺ¦Îļþ¶¨ÖƵÄÀÕË÷ÐÅ¡£ESETÖ¸³ö£¬¹¥»÷ÕßÎÞÐèÏÂÔØÍêÕûÄ£ÐÍ£¬Ö»Ðèͨ¹ý´úÀíÁ¬½ÓÔ¶³ÌÔËÐеÄAPI¼´¿É²Ù×÷¡£Ñо¿Õß¾¯¸æ£¬´ËÀàAI¸³ÄܵŤ¾ß»òʹ¼¼ÊõÃż÷½ÏµÍµÄÍþвÐÐΪÕßÒ²ÄÜѸËÙ¹¹½¨¶ñÒâ»î¶¯£¬¼Ó¾çδÀ´ÍøÂç»Æ½ð³Ç¹ÙÍø·çÏÕ¡£


      ²Î¿¼Á´½Ó£º

      https://www.welivesecurity.com/en/ransomware/first-known-ai-powered-ransomware-uncovered-eset-research/


      3¡¢HOOKÒøÐÐľÂíÐÂÔöÀÕË÷¹¦ÄÜÀ©Õ¹Ö¸Á


      Ñо¿ÈËÔ±·¢ÏÖAndroidÒøÐÐľÂíHOOK³öÏÖбäÖÖ£¬ÐÂÔöÈ«ÆÁÀÕË÷¸²¸Ç¹¦ÄÜ£¬¿ÉÏòÊܺ¦ÕßÏÔʾ¶¯Ì¬Éú³ÉµÄÇ®°üµØÖ·ÓëÊê½ð½ð¶î£¬Ç¿ÆÈÆä¸¶¿î¡£¸Ã¹¦ÄÜÓÉC2ÃüÁî¡°ransome¡±´¥·¢£¬¡°delete_ransome¡±¿ÉÒÆ³ý¸²¸Ç¡£HOOKÔ´×ÔERMACľÂí£¬¾ß±¸ÇÔȡƾ֤¡¢ÀÄÓø¨Öú¹¦ÄÜ¡¢Ô¶³Ì²Ù¿Ø¡¢ÇÔÈ¡¼ÓÃÜ»õ±ÒÇ®°üÊý¾ÝµÈÄÜÁ¦¡£×îа汾ÒÑÖ§³Ö107¸öÔ¶³ÌÖ¸ÁÆäÖÐ38¸öΪÐÂÔö£¬°üÀ¨Î±ÔìNFCɨÃè¡¢¼Ùð½âËø½çÃæÇÔÈ¡PINÂë¡¢·ÂðGoogle Pay²É¼¯ÒøÐп¨ÐÅÏ¢£¬ÒÔ¼°Í¸Ã÷¸²¸Ç¼Ç¼Óû§ÊÖÊÆ¡£¸ÃľÂíͨ¹ýµöÓãÍøÕ¾ºÍαÔìGitHub²Ö¿â·Ö·¢£¬ÏÔÊ¾ÒøÐÐľÂíÕýÏò¼äµýÈí¼þÓëÀÕË÷Èí¼þÌØÐÔÈںϣ¬Íþв·¶Î§ÏÔÖøÀ©´ó¡£Í¬Ê±£¬ÁíÒ»ÒøÐÐľÂíAnatsaÒàÔÚ½ø»¯£¬Ä¿±êÓ¦ÓÃÒÑÔöÖÁ831¸ö£¬Éæ¼°È«Çò½ðÈÚÓë¼ÓÃÜ·þÎñ£¬ÏÔʾAndroidÉú̬µÄ½ðÈÚ¶ñÒâÈí¼þ·çÏÕ³ÖÐøÉÏÉý¡£ __

      __

      ___

      ²Î¿¼Á´½Ó£º

      https://zimperium.com/blog/hook-version-3-the-banking-trojan-with-the-most-advanced-capabilities




      4¡¢DaVitaÔâÀÕË÷¹¥»÷½ü270Íò»¼ÕßÐÅϢй¶


      ÃÀ¹úÖªÃûÉöÔà͸Îö¹«Ë¾DaVitaÈ·ÈÏ£¬ÆäÍøÂçÔÚ½ñÄê3ÔÂÖÁ4Ô¼äÔâÀÕË÷Èí¼þ¹¥»÷£¬Ô¼268ÍòÃû»¼ÕߵĸöÈ˼°½¡¿µÊý¾Ý±»ÇÔÈ¡¡£Ð¹Â¶ÐÅÏ¢°üÀ¨ÐÕÃû¡¢×¡Ö·¡¢Éç±£ºÅ¡¢½¡¿µ±£ÏÕ×ÊÁϼ°Í¸ÎöʵÑéÊÒ½á¹û£¬²¿·ÖÊܺ¦Õß»¹É漰˰ºÅ¼°Ö§Æ±Ó°Ïñ¡£Ê¼þ×î³õµ¼ÖÂϵͳ¼ÓÃÜ

      ²Î¿¼Á´½Ó£º

      https://www.bleepingcomputer.com/news/security/davita-ransomware-attack-exposed-data-of-nearly-27-million-people/


      5¡¢QilinÀÕË÷ÍÅ»ïÉù³ÆÇÔÈ¡ÈÕ²ú4TBÊý¾Ý


      QilinÀÕË÷Èí¼þ×éÖ¯½üÈÕÔÚ°µÍøÉù³Æ¹¥ÆÆÈÕ²úÆû³µÆì϶«¾©Éè¼Æ×Ó¹«Ë¾Creative Box Inc.£¨CBI£©£¬ÇÔÈ¡Óâ4TBÊý¾Ý£¨Ô¼40Íò·ÝÎļþ£©£¬²¢ÒÔ´ËÍþв¹«Ë¾Âú×ãÆäÒªÇó¡£Ð¹Â¶Ñù±¾ÏÔʾ£¬Êý¾Ýº­¸ÇÆû³µ3DÉè¼ÆÎļþ¡¢²ÆÎñÓëÔËÓªÎĵµ¡¢ÕÕÆ¬ÊÓÆµ¼°VRÉè¼Æ×ÊÁÏ£¬ÆäÖаüÀ¨³µÁ¾ÄÚÊθ߾«¶ÈäÖȾͼºÍÐéÄâÏÖʵÉè¼ÆÁ÷³Ì¡£ÈôÏûÏ¢Êôʵ£¬ÕâЩÃô¸ÐÐÅÏ¢Ò»µ©Íâй£¬»ò½«Îª¾ºÕù¶ÔÊÖ¼°Ôì¼ÙÕßÌá¹©ÖØÒª²Î¿¼£¬¸øÈÕ²úÑз¢¼°ÉÌÒµ»úÃÜ´øÀ´ÖØ´ó·çÏÕ¡£



      ²Î¿¼Á´½Ó£º

      https://hackread.com/qilin-ransomware-gang-4tb-data-breach-nissan-cbi/




      Ãâ·ÑÊÔÓÃ
      ·þÎñÈÈÏß

      ÂíÉÏ×Éѯ

      400-811-3777

      »Øµ½¶¥²¿
      ¡¾ÍøÕ¾µØÍ¼¡¿¡¾sitemap¡¿