Bitwarden CLI npm°üÔ⹩ӦÁ´¹¥»÷
Ðû²¼Ê±¼ä 2026-04-271. ZimbraÓʼþϵͳXSSÎó²îÔâÒ»Á¬¹¥»÷
4ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬¾Ý·ÇÓªÀûÇå¾²×éÖ¯ShadowserverÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬Áè¼Ý10,000¸ö̻¶ÔÚÍøÂçÉϵÄZimbra Collaboration SuiteʵÀýÕýÃæÁÙÒ»Á¬µÄ¿çÕ¾¾ç±¾¹¥»÷¡£¡£¡£¡£¡£¡£ZimbraÊÇÒ»¿îÔÚÈ«ÇòÓµÓÐÊýÒÚÓû§µÄÊ¢Ðеç×ÓÓʼþºÍÐ×÷Èí¼þÌ×¼þ£¬£¬£¬£¬£¬£¬£¬ÆÕ±éЧÀÍÓÚÊý°Ù¸öÕþ¸®»ú¹¹ºÍÊýǧ¼ÒÆóÒµ¡£¡£¡£¡£¡£¡£±»Ê¹ÓõÄÎó²î±àºÅΪCVE-2025-48700£¬£¬£¬£¬£¬£¬£¬Ó°ÏìZCS 8.8.15¡¢9.0¡¢10.0ºÍ10.1°æ±¾£¬£¬£¬£¬£¬£¬£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔÚÓû§»á»°ÖÐÖ´ÐÐí§ÒâJavaScript´úÂ룬£¬£¬£¬£¬£¬£¬½ø¶øÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¹©Ó¦ÉÌSynacorÒÑÓÚ2025Äê6ÔÂÐû²¼Çå¾²²¹¶¡£¡£¡£¡£¡£¡£¬£¬£¬£¬£¬£¬£¬²¢ÖÒÑÔ¸ÃÎó²îʹÓÃÎÞÐèÓû§½»»¥£¬£¬£¬£¬£¬£¬£¬µ±Óû§ÔÚZimbra Classic UIÖÐÉó²é¶ñÒâ½á¹¹µÄµç×ÓÓʼþʱ¼´¿É´¥·¢¡£¡£¡£¡£¡£¡£CISA»ùÓÚÏÖʵʹÓõÄÖ¤¾Ý£¬£¬£¬£¬£¬£¬£¬½«¸ÃÎó²î±ê¼ÇΪÒѱ»Ê¹Óò¢ÁÐÈëÒÑ֪ʹÓÃÎó²îĿ¼£¬£¬£¬£¬£¬£¬£¬Í¬Ê±ÏÂÁîÁª°îÃñÊÂÐÐÕþ²¿·Ö»ú¹¹ÔÚ4ÔÂ23ÈÕǰÍê³ÉZimbraЧÀÍÆ÷µÄÇå¾²¼Ó¹Ì¡£¡£¡£¡£¡£¡£ÖÜÎ壬£¬£¬£¬£¬£¬£¬Shadowserver½øÒ»²½·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬ÈÔÓÐÁè¼Ý10,500̨̻¶ÔÚÍâµÄZimbraЧÀÍÆ÷δ´ò²¹¶¡£¡£¡£¡£¡£¡£¬£¬£¬£¬£¬£¬£¬ÆäÖд󲿷ÖλÓÚÑÇÖÞ£¨3,794̨£©ºÍÅ·ÖÞ£¨3,793̨£©¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/cisa-says-zimbra-flaw-now-exploited-over-10k-servers-vulnerable/
2. ¹«ÓÃÊÂÒµÊÖÒÕ¹«Ë¾ItronÔâÍøÂç¹¥»÷
4ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬£¬¹«ÓÃÊÂÒµÊÖÒÕ¹«Ë¾Itron, Inc.¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬£¬Ò»´ÎÍøÂç¹¥»÷µ¼ÖÂδ¾ÊÚȨµÄµÚÈý·½»á¼ûÁËÆä²¿·ÖÄÚ²¿ÏµÍ³¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚÌá½»¸øÃÀ¹ú֤ȯÉúÒâίԱ»áµÄ8-KÎļþÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÉϸöÔ¼ì²âµ½¸Ã»î¶¯ºó£¬£¬£¬£¬£¬£¬£¬Á¬Ã¦Æô¶¯ÁËÍøÂçÇå¾²ÏìÓ¦ÍýÏ룬£¬£¬£¬£¬£¬£¬Í¨ÖªÁËÖ´·¨²¿·Ö£¬£¬£¬£¬£¬£¬£¬²¢Ô¼ÇëÁËÍⲿÕÕÁÏÒÔÖ§³ÖÊÓ²ìºÍÊÂÎñ¿ØÖÆ¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬Î´¾ÊÚȨµÄ»î¶¯Òѱ»×èÖ¹£¬£¬£¬£¬£¬£¬£¬¹«Ë¾ÌåÏÖûÓз¢Ã÷ÈκκóÐø»î¶¯¡£¡£¡£¡£¡£¡£ItronÊÇÒ»¼Ò×ܲ¿Î»ÓÚ»ªÊ¢¶ÙµÄÉÏÊй«Ë¾£¬£¬£¬£¬£¬£¬£¬ÎªÄÜÔ´ºÍË®×ÊÔ´ÖÎÀíÌṩ¹«ÓÃÊÂÒµÊÖÒÕ²úÆ·ºÍЧÀÍ¡£¡£¡£¡£¡£¡£Ö»¹Ü´Ë´ÎÊÂÎñÉæ¼°ÄÚ²¿ÏµÍ³±»²»·¨»á¼û£¬£¬£¬£¬£¬£¬£¬µ«ItronÇ¿µ÷£¬£¬£¬£¬£¬£¬£¬ÕⲢδ¶ÔÓªÒµÔËÓªÔì³ÉʵÖÊÐÔ×ÌÈÅ£¬£¬£¬£¬£¬£¬£¬ÏÖÔÚÔ¤¼ÆÒ²²»»á±¬·¢ÈκκóÐøÓ°Ïì¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ô¤¼Æ´ó²¿·ÖÓëÊÂÎñÏà¹ØµÄ±¾Ç®½«Óɰü¹Ü¼ç¸º¡£¡£¡£¡£¡£¡£Itron»¹Ö¸³ö£¬£¬£¬£¬£¬£¬£¬´Ë´Îδ¾ÊÚȨµÄ»î¶¯²¢Î´²¨¼°¿Í»§¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬ÐèÒª×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬¶Ô¸ÃÊÂÎñµÄ¹æÄ£ºÍÓ°ÏìµÄÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯Éù³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/american-utility-firm-itron-discloses-breach-of-internal-it-network/
3. ADTÔâÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬ShinyHuntersÀÕË÷ÍòÍòÌõ¼Í¼
4ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬¼ÒÍ¥Çå¾²¾ÞÍ·ADT¿ËÈÕ֤ʵ±¬·¢ÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬´ËǰÀÕË÷×éÖ¯ShinyHuntersÍþв³Æ£¬£¬£¬£¬£¬£¬£¬³ý·ÇÖ§¸¶Êê½ð£¬£¬£¬£¬£¬£¬£¬²»È»½«¹ûÕæ±»µÁÊý¾Ý¡£¡£¡£¡£¡£¡£ADTÓÚ4ÔÂ20ÈÕ¼ì²âµ½Î´¾ÊÚȨ»á¼û¿Í»§ºÍDZÔÚ¿Í»§Êý¾ÝµÄÐÐΪ£¬£¬£¬£¬£¬£¬£¬ËæºóÁ¬Ã¦ÖÕÖ¹ÁËÈëÇÖ²¢Õö¿ªÊӲ졣¡£¡£¡£¡£¡£ÊÓ²ìЧ¹ûÏÔʾ£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÖÐСÎÒ˽¼ÒÐÅÏ¢±»µÁ£¬£¬£¬£¬£¬£¬£¬µ«¹æÄ£ÓÐÏÞ¡£¡£¡£¡£¡£¡£ADTÌåÏÖ£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄÐÅÏ¢½öÏÞÓÚÐÕÃû¡¢µç»°ºÅÂëºÍµØµã£¬£¬£¬£¬£¬£¬£¬ÔÚÉÙÉÙÊýÇéÐÎÏ»¹°üÀ¨³öÉúÈÕÆÚºÍÉç±£ºÅÂë»ò˰ºÅµÄºóËÄλ¡£¡£¡£¡£¡£¡£ÖÁ¹ØÖ÷ÒªµÄÒ»µãÊÇ£¬£¬£¬£¬£¬£¬£¬Ã»ÓÐÈκÎÖ§¸¶ÐÅÏ¢£¨°üÀ¨ÒøÐÐÕË»§»òÐÅÓÿ¨ÐÅÏ¢£©±»»ñÈ¡£¡£¡£¡£¡£¡£¬£¬£¬£¬£¬£¬£¬¿Í»§µÄÇ徲ϵͳҲδÊܵ½ÈκÎÓ°Ïì»òË𺦡£¡£¡£¡£¡£¡£ADTÇ¿µ÷ÒÑÁªÏµËùÓÐÊÜÓ°ÏìÖ°Ô±¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬£¬ShinyHuntersÒÑÔÚÆäÊý¾ÝÐ¹Â¶ÍøÕ¾ÉÏÐû²¼ADT£¬£¬£¬£¬£¬£¬£¬Éù³ÆÇÔÈ¡Á˰üÀ¨1000ÍòÌõ¿Í»§Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢¼°ÆäËûÄÚ²¿¹«Ë¾Êý¾ÝµÄ¼Í¼£¬£¬£¬£¬£¬£¬£¬²¢Ðû²¼ÁË×îºóͨ뺣¬£¬£¬£¬£¬£¬£¬ÒªÇóADTÔÚ2026Äê4ÔÂ27ÈÕǰÓëÆäÁªÏµ²¢Ö§¸¶Êê½ð£¬£¬£¬£¬£¬£¬£¬²»È»½«¹ûÕæÊý¾Ý¡£¡£¡£¡£¡£¡£ADT²¢Î´Ö¤Êµ¹¥»÷ÕßÉù³ÆµÄÊý¾ÝÇÔÈ¡Á¿¡£¡£¡£¡£¡£¡£ShinyHunters͸¶£¬£¬£¬£¬£¬£¬£¬ËûÃÇͨ¹ýÓïÒô´¹ÂÚ¹¥»÷ÈëÇÖADT£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÒ»ÃûÔ±¹¤µÄOktaµ¥µãµÇ¼ÕË»§±»µÁ£¬£¬£¬£¬£¬£¬£¬½ø¶øÊ¹ÓøÃÕË»§»á¼û²¢ÇÔÈ¡ÁËADT SalesforceϵͳÖеÄÊý¾Ý¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/adt-confirms-data-breach-after-shinyhunters-leak-threat/
4. ÀÕË÷×éÖ¯BlackFile½èÓïÒô´¹ÂÚ¹¥»÷ÁãÊÛÓëÂùÝÒµ
4ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬×Ô2026Äê2ÔÂÒÔÀ´£¬£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪBlackFileµÄÒÔ¾¼ÃÀûÒæÎªÄ¿µÄµÄÐÂÐ˺ڿÍ×éÖ¯ÓëһϵÁÐÕë¶ÔÁãÊÛºÍÂùÝÒµµÄÊý¾Ý͵ÇÔ¼°ÀÕË÷¹¥»÷Óйء£¡£¡£¡£¡£¡£¾ÝPalo Alto NetworksµÄUnit 42ÓëÁãÊÛºÍÂùÝÐÅÏ¢¹²ÏíÓëÆÊÎöÖÐÐÄÅû¶£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯£¨Òà³ÆCL-CRI-1116¡¢UNC6671ºÍCordial Spider£©Í¨¹ýð³äÆóÒµITЧÀĮְ́ԱÇÔȡԱ¹¤Æ¾Ö¤£¬£¬£¬£¬£¬£¬£¬²¢ÏòÊܺ¦ÕßË÷ÒªÆßλÊýÊê½ð¡£¡£¡£¡£¡£¡£BlackFileµÄ¹¥»÷ʼÓÚʹÓÃαÔìºÅÂë¸øÔ±¹¤´òµç»°£¬£¬£¬£¬£¬£¬£¬ÍþвÕßð³äITÖ§³ÖÖ°Ô±£¬£¬£¬£¬£¬£¬£¬ÓÕÆÔ±¹¤»á¼ûÐéαµÄÆóÒµµÇÂ¼Ò³Ãæ£¬£¬£¬£¬£¬£¬£¬ÒªÇóÊäÈëÆ¾Ö¤ºÍÒ»´ÎÐÔÃÜÂë¡£¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÇÔÈ¡µÄƾ֤ע²á×Ô¼ºµÄ×°±¸ÒÔÈÆ¹ý¶àÒòËØÈÏÖ¤£¬£¬£¬£¬£¬£¬£¬Ëæºóͨ¹ýץȡÄÚ²¿Ô±¹¤Ä¿Â¼ÌáÉý¶Ô¸ß¹Ü¼¶ÕË»§µÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¸Ã×é֯ʹÓñê×¼APIº¯Êý´ÓÊܺ¦ÕßµÄSalesforceºÍSharePointЧÀÍÆ÷ÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬£¬£¬×¨ÃÅËÑË÷°üÀ¨¡°ÉñÃØ¡±ºÍ¡°SSN¡±µÈÃô¸ÐÊõÓïµÄÎļþ¡£¡£¡£¡£¡£¡£ÇÔÈ¡µÄÎļþ±»ÏÂÔØµ½¹¥»÷Õß¿ØÖƵÄЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬²¢Ðû²¼µ½¸ÃÍÅ»ïµÄ°µÍøÊý¾ÝÐ¹Â¶ÍøÕ¾£¬£¬£¬£¬£¬£¬£¬ËæºóÊܺ¦Õß»áͨ¹ý±»ÈëÇÖµÄÔ±¹¤µç×ÓÓʼþÕË»§»òËæ»úÌìÉúµÄGmailµØµãÊÕµ½Êê½ðÒªÇ󡣡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-blackfile-extortion-gang-targets-retail-and-hospitality-orgs/
5. ShinyHuntersÉù³ÆÈëÇÖÔÚÏßѧϰƽ̨Udemy
4ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬ÀÕË÷×éÖ¯ShinyHunters¿ËÈÕÉù³ÆÒÑÀÖ³ÉÈëÇÖÔÚÏßѧϰƽ̨Udemy£¬£¬£¬£¬£¬£¬£¬²¢ÍþвҪÐû²¼Áè¼Ý140ÍòÌõ°üÀ¨Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢¼°ÆäËûÄÚ²¿¹«Ë¾Êý¾ÝµÄ¼Í¼¡£¡£¡£¡£¡£¡£2026Äê4ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬¸ÃÎÛÃûÕÑÖøµÄÍøÂç·¸·¨ÍŻォUdemyÁÐÈëÆä°µÍøÊܺ¦ÕßÃûµ¥£¬£¬£¬£¬£¬£¬£¬²¢·¢³ö×îºóͨ뺣¬£¬£¬£¬£¬£¬£¬ÒªÇó¹«Ë¾ÔÚ2026Äê4ÔÂ27ÈÕǰÁªÏµËûÃDz¢Ö§¸¶Êê½ð£¬£¬£¬£¬£¬£¬£¬²»È»½«¹ûÕæÐ¹Â¶Êý¾Ý¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¸Ã˵·¨ÉÐδ»ñµÃ¹Ù·½Ö¤Êµ£¬£¬£¬£¬£¬£¬£¬ShinyHuntersҲδÏñ´Ëǰ¹¥»÷ÆäËû¹«Ë¾Ê±ÄÇÑù¸½ÉÏÑù±¾Êý¾Ý»ò½ØÍ¼ÒÔ×ôÖ¤ÆäÖ÷ÕÅ¡£¡£¡£¡£¡£¡£UdemyÊÇÈ«ÇòÁìÏȵÄÔÚÏßѧϰƽ̨֮һ£¬£¬£¬£¬£¬£¬£¬2024ÄêÔ¤¼ÆÓµÓÐ7700ÍòÔÚÏßѧϰÕߣ¬£¬£¬£¬£¬£¬£¬×ÔÄÇʱÆðÕâÒ»Êý×Ö¿ÉÄÜ»¹ÔÚÔöÌí¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¾Ý³ÆÐ¹Â¶µÄ140ÍòÌõ¼Í¼Ïêϸ°üÀ¨ÄÄЩÓû§ÈºÌåµÄÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜÊÇͨË×ѧԱ¡¢½²Ê¦¡¢Ô±¹¤»òÕâЩȺÌåµÄ×éºÏ¡£¡£¡£¡£¡£¡£µ«ÎÞÂÛÔõÑù£¬£¬£¬£¬£¬£¬£¬140ÍòÌõ¼Í¼¶¼ÊÇÒ»¸öÖØ´óµÄÊý×Ö£¬£¬£¬£¬£¬£¬£¬ÆäDZÔÚЧ¹ûÊ®·ÖÑÏÖØ£¬£¬£¬£¬£¬£¬£¬³ýÁËÏÔ¶øÒ×¼ûµÄթƺͽðÈÚÚ²ÆÎ£º¦Í⣬£¬£¬£¬£¬£¬£¬ÕâЩÊý¾Ý»¹¿ÉÄÜΪ¹¥»÷ÕßÌṩÕìÌ½ËØ²Ä£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÐí¶àÈËʹÓÃUdemy¿Î³ÌÀ´ÌáÉýÖ°ÒµÊÖÒÕ¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/shinyhunters-claim-udemy-data-theft/
6. Bitwarden CLI npm°üÔ⹩ӦÁ´¹¥»÷
4ÔÂ24ÈÕ£¬£¬£¬£¬£¬£¬£¬Ò»Á¬Ò»Ö±µÄÈí¼þ¹©Ó¦Á´ºÚ¿Í¹¥»÷À˳±ÏÖÔÚ²¨¼°µ½ÁË×îÊܽӴýµÄÃÜÂëÖÎÀíÆ÷Ö®Ò»Bitwarden¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÆäÏÂÁîÐй¤¾ßµÄnpm°üÖÐÖ²ÈëÁ˶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£BitwardenÌåÏÖ£¬£¬£¬£¬£¬£¬£¬Óû§ÃÜÂë¿âÊý¾ÝÈÔÈ»ÍêºÃÎÞË𣬣¬£¬£¬£¬£¬£¬Í¨Ë×Óû§Î´ÊÜÓ°Ï죬£¬£¬£¬£¬£¬£¬µ«²¿·Ö¿ª·¢ÕßÐèҪСÐÄ¡£¡£¡£¡£¡£¡£ÄÇЩ´ËǰÈëÇÖCheckmarxÇå¾²¹¤¾ßµÄ¹¥»÷Õߣ¬£¬£¬£¬£¬£¬£¬Í¬ÑùÕÒµ½ÁËÈëÇÖBitwarden npm°üµÄÒªÁ죬£¬£¬£¬£¬£¬£¬ÔÚnpm´úÂë¿âÖÐÐû²¼ÁËÒ»¸ö´øÓжñÒâÈí¼þµÄCLI°æ±¾¡£¡£¡£¡£¡£¡£Bitwarden CLIÊǹ©¸ß¼¶Óû§»òϵͳÖÎÀíÔ±ÒÔ±à³Ì·½·¨ÓëÃÜÂëÖÎÀíÆ÷½»»¥µÄÖն˹¤¾ß¡£¡£¡£¡£¡£¡£BitwardenÇå¾²ÍŶÓÈ·ÈÏ£¬£¬£¬£¬£¬£¬£¬ÊÂÎñ±¬·¢ÔÚ2026Äê4ÔÂ22ÈÕÏÂÖç5:57ÖÁÍíÉÏ7:30£¨ÃÀ¹ú¶«²¿Ê±¼ä£©Ö®¼ä¡£¡£¡£¡£¡£¡£ÔÚ¶ÌÔݵĴ°¿°¢ÚÄÚÏÂÔØÁËCLI°æ±¾2026.4.0µÄÓû§£¬£¬£¬£¬£¬£¬£¬Îñ±Ø½«ÏµÍ³ÊÓΪÒѱ»ÈëÇÖ²¢¼ÙÉèÆ¾Ö¤ÒÑй¶¡£¡£¡£¡£¡£¡£¾ÝArnicaÁªºÏÊ×´´È˼æÊ×ϯÊÖÒÕ¹ÙEran Medan͸¶£¬£¬£¬£¬£¬£¬£¬ËäÈ»Áè¼Ý1000ÍòÓû§Ê¹ÓÃBitwardenµÄ¿ªÔ´ÃÜÂëÖÎÀíÆ÷£¬£¬£¬£¬£¬£¬£¬µ«Ö»ÓÐ334λ¿ª·¢ÕßÏÂÔØÁ˶ñÒâCLI¹¤¾ß¡£¡£¡£¡£¡£¡£StepSecurityÆÊÎöÖ¸³ö£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÍøÂç¹¥»÷Ô´ÓÚBitwardenÒ»Ãû¹¤³ÌʦµÄGitHubÕË»§±»µÁÓᣡ£¡£¡£¡£¡£
https://cybernews.com/security/bitwarden-cli-npm-package-compromised-with-malware/


¾©¹«Íø°²±¸11010802024551ºÅ