ÐǰͿËÅû¶Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Ó°ÏìÊý°ÙÃûÔ±¹¤

Ðû²¼Ê±¼ä 2026-03-16

1. ÐǰͿËÅû¶Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Ó°ÏìÊý°ÙÃûÔ±¹¤


3ÔÂ13ÈÕ£¬£¬£¬£¬È«Çò×î´ó¿§·ÈÁ¬ËøÆ·ÅÆÐǰͿ˿ËÈÕÅû¶һÆðÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬Éæ¼°Êý°ÙÃûÔ±¹¤ÕË»§±»µÁ¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÓµÓг¬38ÍòÃûÔ±¹¤¼°½ü4.1Íò¼ÒÃŵ꣬£¬£¬£¬±é²¼È«Çò88¸ö¹ú¼Ò¡£¡£¡£¡£¡£¡£¡£¾ÝÆäÏòÃåÒòÖÝ×ÜÉó²é³¤Ìá½»µÄ֪ͨÎļþÏÔʾ£¬£¬£¬£¬2026Äê2ÔÂ6ÈÕ£¬£¬£¬£¬ÐǰͿ˷¢Ã÷²¿·ÖÏàÖúͬ°éÖÐÐÄÕË»§Ôâδ¾­ÊÚȨ»á¼û£¬£¬£¬£¬¾­ÓëÍâ²¿ÍøÂçÇ徲ר¼ÒÁªºÏÊÓ²ìÈ·ÈÏ£¬£¬£¬£¬¹¥»÷Õßͨ¹ýαÔìµÇÂ¼Ò³Ãæ»ñȡƾ֤£¬£¬£¬£¬ÔÚ1ÔÂ19ÈÕÖÁ2ÔÂ11ÈÕʱ´úÈëÇÖÁË889¸öÔ±¹¤ÕË»§¡£¡£¡£¡£¡£¡£¡£ÕâЩÕË»§´æ´¢×ÅÔ±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢¡¢¸£Àû¼°ÈËÁ¦×ÊÔ´Êý¾Ý£¬£¬£¬£¬Ð¹Â¶ÄÚÈݰüÀ¨ÐÕÃû¡¢Éç»á°ü¹ÜºÅÂë¡¢³öÉúÈÕÆÚ¡¢½ðÈÚÕË»§¼°Â·ÓɺÅÂëµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÐǰͿËÔÚÊÂÎñ·¢Ã÷ºóÁ¬Ã¦Æô¶¯Ó¦¼±ÏìÓ¦£ºÍ¨ÖªÖ´·¨»ú¹¹¡¢½¨ÒéÔ±¹¤¼à¿ØÒøÐÐÕË»§Òì³£»£»£»£»£»£»£»î¶¯£¬£¬£¬£¬²¢Í¨¹ýExperian IdentityWorksΪÊÜÓ°ÏìÔ±¹¤ÌṩÁ½ÄêÃâ·ÑÉí·Ý͵ÇÔ±£»£»£»£»£»£»£»¤¼°ÐÅÓÃ¼à¿ØÐ§ÀÍ¡£¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬¹«Ë¾ÌåÏÖÒÑÔöÇ¿ÕË»§»á¼ûÏà¹ØµÄÇå¾²¿ØÖƲ½·¥£¬£¬£¬£¬µ«Î´Ú¹ÊÍΪºÎÔÚ·¢Ã÷¹¥»÷ºóÎåÌì²ÅÒÆ³ýÊÜÓ°ÏìÕË»§¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/starbucks-discloses-data-breach-affecting-hundreds-of-employees/


2. ¹È¸è½ôÆÈÐû²¼Chrome 146¸üÐÂÐÞ¸´¸ßΣÁãÈÕÎó²î


3ÔÂ13ÈÕ£¬£¬£¬£¬¹È¸èÐû²¼½ôÆÈÐû²¼Chrome 146°æ±¾¸üУ¬£¬£¬£¬ÖصãÐÞ¸´Á½¸öÒѱ»ÏÖʵʹÓõÄÁãÈÕÎó²î£¬£¬£¬£¬CVE-2026-3909ÓëCVE-2026-3910£¬£¬£¬£¬Á½ÕßCVSSÆÀ·Ö¾ù´ï8.8£¬£¬£¬£¬Êô¸ßΣ¼¶±ð¡£¡£¡£¡£¡£¡£¡£¾Ý¹È¸èͨ¸æ£¬£¬£¬£¬¹¥»÷ÕßÒÑͨ¹ýαÔìµÇÂ¼Ò³ÃæµÈÊÖ¶ÎÔÚÕæÕæÏàÐÎÖÐʹÓÃÕâЩÎó²î¡£¡£¡£¡£¡£¡£¡£CVE-2026-3909ΪSkiaͼÐοâÖеÄÔ½½çдÈëȱÏÝ£¬£¬£¬£¬¶ñÒâHTMLÒ³Ãæ¿É´¥·¢ÄÚ´æË𻵣¬£¬£¬£¬µ¼ÖÂí§Òâ´úÂëÖ´Ðлò³ÌÐòÍ߽⣻£»£»£»£»£»£»CVE-2026-3910ÔòÊÇV8 JavaScriptÒýÇæµÄ²»Êʵ±ÊµÏÖÎó²î£¬£¬£¬£¬¹¥»÷Õ߿ɽṹ¶ñÒâÒ³ÃæÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬ÇÒV8Îó²î³£±»ÓÃÓÚɳÏäÌÓÒݹ¥»÷¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´ÁýÕÖWindows¡¢macOS£¨°æ±¾146.0.7680.75/76£©¡¢Linux£¨146.0.7680.75£©¼°Android£¨146.0.76380.115£©Æ½Ì¨¡£¡£¡£¡£¡£¡£¡£³ýÁãÈÕÎó²îÍ⣬£¬£¬£¬Chrome 146Îȹ̰æÉý¼¶Á½Ììºó£¬£¬£¬£¬¹Ù·½»¹½ôÆÈÐÞ¸´ÁË29¸öÎó²î£¬£¬£¬£¬Éæ¼°WebML¡¢Web Speech¡¢Agents¡¢WebMCP¡¢Extensions¡¢TextEncoding¡¢MediaStream¡¢WebMIDI¡¢WindowDialogµÈ¶à¸öÄ £¿£¿£¿£¿ £¿£¿é£¬£¬£¬£¬°üÀ¨¸ßΣ¼°ÖеÍΣÎÊÌâ¡£¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/chrome-146-update-patches-two-exploited-zero-days/


3. »ùÓÚRustµÄVENON¶ñÒâÈí¼þ¹¥»÷33¼Ò°ÍÎ÷ÒøÐÐ


3ÔÂ12ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±Åû¶ÁËÒ»¿îÕë¶Ô°ÍÎ÷Óû§µÄRustÓïÑÔ±àÐ´ÒøÐжñÒâÈí¼þVENON£¬£¬£¬£¬ÆäÓÚ2026Äê2ÔÂÊ״α»·¢Ã÷£¬£¬£¬£¬ÓÉZenoX¹«Ë¾ÃüÃû¡£¡£¡£¡£¡£¡£¡£ÓëÀ­¶¡ÃÀÖ޹Űå»ùÓÚDelphiµÄÒøÐÐľÂí£¨ÈçGrandoreiro¡¢Mekotio£©²î±ð£¬£¬£¬£¬VENON½ÓÄÉRustÖØÐ´²¢À©Õ¹Á˳ÉÊìľÂí¹¦Ð§£¬£¬£¬£¬Ð迪·¢Õ߾߱¸ÉîÖ¿ÊÖÒÕÂÄÀú£¬£¬£¬£¬ÇÒ´úÂë½á¹¹ÏÔʾÆäʹÓÃÌìÉúʽAI¾ÙÐпª·¢¡£¡£¡£¡£¡£¡£¡£¸ÃľÂíͨ¹ýDLL²à¼ÓÔØÊÖÒÕÈö²¥£¬£¬£¬£¬Á¬ÏµClickFixÉç»á¹¤³ÌÕ½ÂÔÓÕÆ­Óû§Ö´ÐÐPowerShell¾ç±¾ÏÂÔØº¬ÔغɵÄZIP°ü¡£¡£¡£¡£¡£¡£¡£VENONµÄ¹¥»÷Á´°üÀ¨¾Å²ã¹æ±ÜÊÖÒÕ£º·´É³Ïä¼ì²é¡¢¼ä½ÓϵͳŲÓá¢ETW/AMSIÈÆ¹ýµÈ£¬£¬£¬£¬Ö´Ðкó»á»á¼ûGoogle Cloud Storage»ñÈ¡ÉèÖ㬣¬£¬£¬×°ÖÃÍýÏëʹÃü£¬£¬£¬£¬²¢Í¨¹ýWebSocket½¨ÉèC2ÅþÁ¬¡£¡£¡£¡£¡£¡£¡£Æä½¹µã¹¦Ð§°üÀ¨Õë¶Ô33¼Ò½ðÈÚ»ú¹¹µÄ´°¿ÚÎÊÌâºÍÓòÃû¼à¿Ø£¬£¬£¬£¬½öµ±Ä¿µÄÓ¦ÓÃÆô¶¯Ê±¼¤»î£¬£¬£¬£¬Í¨¹ýÐéαÁýÕÖ²ãÇÔȡƾ֤¡£¡£¡£¡£¡£¡£¡£VENONÔçÆÚÑù±¾Ì»Â¶ÁË¿ª·¢Õß·¾¶"C:\Users\byst4"£¬£¬£¬£¬µ«ÉÐδ¹ØÁªÒÑÖª×éÖ¯¡£¡£¡£¡£¡£¡£¡£


https://thehackernews.com/2026/03/rust-based-venon-malware-targets-33.html


4. PayloadÀÕË÷Èí¼þÍŻ﹥»÷°ÍÁֻʼÒÒ½Ôº


3ÔÂ15ÈÕ£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬PayloadÀÕË÷Èí¼þÍÅ»ïÐû³ÆÒÑÈëÇÖ°ÍÁֻʼÒÒ½Ôº£¨RBH£©£¬£¬£¬£¬ÇÔÈ¡110GBÃô¸ÐÊý¾Ý£¬£¬£¬£¬²¢½«¸ÃÒ½ÁÆ»ú¹¹ÁÐÈëÆäTorÊý¾ÝÐ¹Â¶ÍøÕ¾£¬£¬£¬£¬Í¬²½Ðû²¼±»ÈëÇÖϵͳ¾µÏñ×÷Ϊ¹¥»÷Ö¤¾Ý¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÍþв³Æ£¬£¬£¬£¬ÈôÊܺ¦ÕßδÔÚ3ÔÂ23ÈÕǰ֧¸¶Êê½ð£¬£¬£¬£¬½«¹ûÕæÐ¹Â¶ËùÓб»µÁÊý¾Ý£¬£¬£¬£¬Òý·¢¹ú¼ÊÍøÂçÇå¾²ÁìÓò¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£¡£¡£°ÍÁֻʼÒÒ½Ôº½¨ÉèÓÚ2011Ä꣬£¬£¬£¬×÷ΪӵÓÐ70ÕÅ´²Î»µÄ×ÛºÏÒ½ÁÆ»ú¹¹£¬£¬£¬£¬ÆäЧÀ͹æÄ£º­¸ÇסԺ¡¢ÃÅÕï¡¢Íâ¿ÆÊÖÊõ¡¢²ú¿ÆÕչ˻¤Ê¿¼°Õï¶ÏµÈ½¹µãÒ½ÁÆÓªÒµ£¬£¬£¬£¬Ð§À͹¤¾ß²»µ«°üÀ¨°ÍÁÖ±¾ÍÁ»¼Õߣ¬£¬£¬£¬»¹·øÉä°¢Âü¡¢¿¨Ëþ¶û¡¢É³Ìذ¢À­²®¡¢°¢ÁªÇõµÈÁÚ¹ú£¬£¬£¬£¬¾ßÓÐÇøÓòÐÔÒ½ÁÆÊàŦµÄÖ÷Ҫְλ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊý¾Ýй¶¿ÉÄÜÉæ¼°»¼ÕßÒþ˽¡¢Ò½ÁƼͼµÈ¸ß¶ÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬¶ÔÒ½ÔºÔËÓª¼°»¼ÕßÈ¨Òæ×é³ÉÑÏÖØÍþв¡£¡£¡£¡£¡£¡£¡£PayloadÀÕË÷Èí¼þ×÷ΪÐÂÐËÍøÂç·¸·¨¹¤¾ß£¬£¬£¬£¬½ÓÄÉ"Ë«ÖØÀÕË÷"ģʽ£¬£¬£¬£¬Í¨¹ýÊý¾ÝÇÔÈ¡ÓëÎļþ¼ÓÃÜË«ÖØÊÖ¶ÎÏòÊܺ¦Õßʩѹ¡£¡£¡£¡£¡£¡£¡£¸ÃÍÅ»ïÖ÷ÒªÃé×¼ÐÂÐËÊг¡ÖдóÐÍÆóÒµ£¬£¬£¬£¬¹¥»÷Ä¿µÄÉæ¼°·¿µØ²ú¡¢ÎïÁ÷µÈ¶à¸öÐÐÒµ£¬£¬£¬£¬Õ¹ÏÖ³ö¿çÐÐÒµÉøÍ¸ÄÜÁ¦¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/189467/cyber-crime/payload-ransomware-claims-the-hack-of-royal-bahrain-hospital.html


5. FBIÊÓ²ìSteamƽ̨¶ñÒâÓÎÏ·ÊÂÎñ


3ÔÂ13ÈÕ£¬£¬£¬£¬ÃÀ¹úÁª°îÊÓ²ì¾ÖÎ÷ÑÅͼ·Ö¾ÖÕý¶ÔSteamƽ̨ÉÏ´«µÄ°Ë¿î¶ñÒâÓÎÏ·Õö¿ªÊӲ죬£¬£¬£¬ÕâЩÓÎÏ·ÔÚ2024Äê5ÔÂÖÁ2026Äê1ÔÂʱ´úͨ¹ýǶÈë¶ñÒâÈí¼þÇÔÈ¡Íæ¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£FBIºôÓõÊÜÓ°ÏìÓû§Ìîд¹Ù·½±í¸ñ£¬£¬£¬£¬ÖصãÊÓ²ì¼ÓÃÜÇ®±Ò͵ÇÔ¡¢ÕË»§Ð®ÖƼ°Í¨Ñ¶¼Í¼£¬£¬£¬£¬ÒÔ×·×Ù·¸·¨Á´Ìõ²¢±£»£»£»£»£»£»£»¤Êܺ¦ÕßÈ¨Òæ¡£¡£¡£¡£¡£¡£¡£ÉæÊÂÓÎÏ·°üÀ¨BlockBlasters¡¢Chemia¡¢Dashverse/DashFPS¡¢Lampy¡¢Lunara¡¢PirateFiºÍTokenova¡£¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬BlockBlasters×÷ΪÃâ·Ñ2Dºá°æÓÎÏ·£¬£¬£¬£¬×î³õÉÏ´«Ê±Îª¡°Çå½à³ÌÐò¡±£¬£¬£¬£¬µ«ºóÐø±»Ö²Èëcryptodrainer¶ñÒâÈí¼þ£¬£¬£¬£¬µ¼ÖÂÓÎÏ·Ö÷²¥Raivo PlavnieksÔÚÖ±²¥³ï¿îʱ´úËðʧ³¬3.2ÍòÃÀÔª¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¡£¡£Çø¿éÁ´ÊÓ²ìÔ±ZachXBTÔ¤¼Æ£¬£¬£¬£¬¹¥»÷Õß´Ó261¸öSteamÕË»§ÇÔȡԼ15ÍòÃÀÔª£¬£¬£¬£¬¶øÍøÂçÇå¾²Ñо¿Ô±VX-UndergroundÔòÖ¸³öÊܺ¦ÕßÈËÊý¸ß´ï478ÈË¡£¡£¡£¡£¡£¡£¡£ÔÚ¶ñÒâÉúÑÄÖÆ×÷ÓÎÏ·¡¶Chemia¡·ÖУ¬£¬£¬£¬Íþв×éÖ¯EncryptHubÖ²ÈëÁËHijackLoader¶ñÒâÈí¼þ£¬£¬£¬£¬¸ÃÈí¼þ»áÏÂÔØVidarÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬£¬²¢×°Öö¨ÖưæFickle Stealer£¬£¬£¬£¬ÓÃÓÚÇÔȡƾ֤¡¢ä¯ÀÀÆ÷Êý¾Ý¡¢CookieºÍ¼ÓÃÜÇ®±ÒÇ®°ü¡£¡£¡£¡£¡£¡£¡£PirateFiÓÎÏ·ÔòÓÚ2025Äê2ÔÂÔÚSteamÉϼÜÔ¼Ò»ÖÜ£¬£¬£¬£¬Èö²¥VidarÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬£¬¿ÉÄÜÓ°Ïì¶à´ï1500ÃûÓû§¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fbi-seeks-victims-of-steam-games-used-to-spread-malware/


6. ²¨À¼ºËÑо¿ÖÐÐÄÔâÍøÂç¹¥»÷


3ÔÂ13ÈÕ£¬£¬£¬£¬²¨À¼¹ú¼ÒºËÑо¿ÖÐÐÄ£¨NCBJ£©¿ËÈÕÐû²¼ÆäIT»ù´¡ÉèÊ©ÔâÓöÍøÂç¹¥»÷δË죬£¬£¬£¬µ«µÃÒæÓÚÇ徲ϵͳ¿ìËÙÏìÓ¦¼°ÍŶӸßЧЭ×÷£¬£¬£¬£¬Àֳɱ£»£»£»£»£»£»£»¤Ä¿µÄϵͳÍêÕûÐÔ£¬£¬£¬£¬Î´¶ÔÔËÓªÔì³ÉÈκÎÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¸ÃÖÐÐÄ×÷Ϊ²¨À¼ºË¿ÆÑ§Ñо¿½¹µã»ú¹¹£¬£¬£¬£¬ÔËÐÐ×ÅÅ·ÖÞ×îǿʢµÄÑо¿·´Ó¦¶ÑÖ®Ò»ÂêÀöÑÇ·´Ó¦¶Ñ£¬£¬£¬£¬¼ç¸º×źËÄÜÑо¿¡¢Í¬Î»ËØÉú²ú¼°¹ú¼Ê¿ÆÑÐÏàÖúµÈÒªº¦Ê¹Ãü¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±¬·¢ÔÚ¡°×î½ü¼¸Ì족£¬£¬£¬£¬¹¥»÷¹æÄ£ÓÐÏÞµ«ÒâÍ¼Í»ÆÆ°²±£ÏµÍ³£¬£¬£¬£¬×îÖÕ±»Çå¾²ÍŶÓÓÐÓÃ×èµ²¡£¡£¡£¡£¡£¡£¡£¾ÝÖÐÐÄÖ÷ÈÎÑſⲼ¡¤¿âÅå´Ä»ù֤ʵ£¬£¬£¬£¬Éú²ú¡¢Ñо¿¼°·´Ó¦¶ÑÔËÐоùδÖÐÖ¹£¬£¬£¬£¬ÂêÀöÑÇ·´Ó¦¶ÑÒ»Á¬ÒÔÂú¹¦ÂÊÇå¾²ÔËÐС£¡£¡£¡£¡£¡£¡£²¨À¼Õþ¸®ÕýÓë¹ú¼ÒÇå¾²¾Ö-¹«¹²ÀûÒæÑо¿Ëù£¨NASK-PIB£©¡¢Êý×ÖÊÂÎñ²¿¡¢¸±×ÜÀí°ì¹«ÊÒ¼°ÄÜÔ´²¿µÈ¶à²¿·ÖЭͬӦ¶Ô£¬£¬£¬£¬È·±£Òªº¦»ù´¡ÉèÊ©»ñµÃ×î¸ß¼¶±ð·À»¤¡£¡£¡£¡£¡£¡£¡£Êý×ÖÊÂÎñ²¿³¤¿ËÈÕʲÍзò¡¤¼Ó·ò¿Æ·ò˹»ù͸¶£¬£¬£¬£¬³õ³ÌÐò²éÏÔʾ¹¥»÷ȪԴÓëÒÁÀʱ£´æ¹ØÁª£¬£¬£¬£¬µ«Ç¿µ÷Ðè´ý×îÖÕÐÅÏ¢ºËʵºó·½¿ÉÈ·ÈÏ£¬£¬£¬£¬Í¬Ê±¾¯Ê¾Ïà¹Ø¼£Ïó¿ÉÄܱ£´æÎóµ¼ÐÔ¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/189399/security/hackers-targeted-polands-national-centre-for-nuclear-research.html