ÃÀ¹úÊ·ÉÏ×î´óÒ½ÁÆÊý¾Ýй¶ÊÂÎñ£ºChange HealthcareÔâÀÕË÷Èí¼þ¹¥»÷

Ðû²¼Ê±¼ä 2025-02-06

1. ÃÀ¹úÊ·ÉÏ×î´óÒ½ÁÆÊý¾Ýй¶ÊÂÎñ£ºChange HealthcareÔâÀÕË÷Èí¼þ¹¥»÷


1ÔÂ25ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÁªºÏ¿µ½¡¼¯ÍÅ×Ó¹«Ë¾Change HealthcareÔÚ2024Äê2ÔÂÔâÊÜÁËÀÕË÷Èí¼þ×éÖ¯ALPHV£¨ÓÖÃûBlack Cat£©µÄ¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÔ¼1.9ÒÚÃÀ¹úÈ˵ÄÃô¸ÐÒ½ÁÆÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬£¬³ÉΪÃÀ¹úÀúÊ·ÉÏ×î´óµÄÒ½ÁÆÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ʹÓÃÁËȱ·¦¶àÒòËØÉí·ÝÑéÖ¤µÄÊÜѬȾÕÊ»§ºÍCitrixÔ¶³Ì»á¼ûÈí¼þÉϵÄÊÜѬȾƾ֤£¬£¬£¬£¬£¬£¬£¬£¬Ôì³ÉÁË8.72ÒÚÃÀÔªµÄ²ÆÎñËðʧºÍ6TBµÄÊý¾Ýй¶¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜºÚ¿Í½üÒ»ÄêÀ´Ò»Ö±ÔÚ»á¼û±»µÁÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬µ«UnitedHealthÉù³ÆÃ»ÓÐÖ¤¾ÝÅú×¢Êý¾Ý±»ÀÄÓᣡ£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬£¬´Ë´ÎÈëÇÖ̻¶Á˰üÀ¨¿µ½¡°ü¹ÜÏêϸÐÅÏ¢¡¢»¼ÕßÕï¶Ï¡¢²âÊÔЧ¹ûºÍÖÎÁÆÐÅÏ¢µÈÔÚÄÚµÄÃô¸ÐÒ½ÁƼͼ£¬£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°Ð¡ÎÒ˽¼ÒÐÕÃû¡¢µØµã¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝÕÕºÅÂëµÈÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¹¥»÷±¬·¢ºó£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ö§¸¶ÁË2200ÍòÃÀÔªµÄÊê½ð£¬£¬£¬£¬£¬£¬£¬£¬µ«BlackCatÓÕÆ­ÁËʵÑé´Ë´Î¹¥»÷µÄ¹ØÁª¹«Ë¾²¢Æ­È¡ÁËÊê½ð£¬£¬£¬£¬£¬£¬£¬£¬µ¼Ö±»µÁÊý¾ÝÂäÈëÍøÂç·¸·¨·Ö×ÓÊÖÖС£¡£¡£¡£¡£¡£¡£´Ë´ÎйÃÜÊÂÎñ²»µ«Ö±½ÓÇÔÈ¡Êý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬»¹ÈÅÂÒÁËÌìϵÄÒ½ÁÆÐ§ÀÍ£¬£¬£¬£¬£¬£¬£¬£¬¸øÔËÓª´øÀ´ÁËÖØ´óÌôÕ½£¬£¬£¬£¬£¬£¬£¬£¬Òý·¢ÁËÈËÃǶԻ¼ÕßÒþ˽ºÍÊý¾ÝÇå¾²µÄµ£ÐÄ¡£¡£¡£¡£¡£¡£¡£ÎªÁË×ñÊØHIPAA£¬£¬£¬£¬£¬£¬£¬£¬ÁªºÏ¿µ½¡¼¯ÍÅÒÑÏòÊÜÓ°Ïì×îÑÏÖØµÄСÎÒ˽¼Òת´ïÁ˴˴ι¥»÷ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£


https://hackread.com/unitedhealth-groups-data-breach-impacts-americans/


2. TalkTalkÊý¾Ýй¶ÊÂÎñ£ºÍþвÕßÉù³ÆÇÔÈ¡1880ÍòÓû§Êý¾Ý


1ÔÂ27ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ó¢¹úµçÐŹ«Ë¾TalkTalkÔâÓöÁËÒ»ÆðÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬Ò»Ãû×Ô³ÆÎª¡°b0nd¡±µÄÍþвÐÐΪÕßÔÚÍøÂç·¸·¨ÂÛ̳ÉÏÐû²¼¶Ô´Ë´ÎºÚ¿Í¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬£¬£¬£¬²¢Éù³ÆÇÔÈ¡ÁËÁè¼Ý1880ÍòTalkTalkÓû§µÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢IPµØµã¡¢µç»°ºÅÂëºÍPINµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬£¬TalkTalk¹«Ë¾½²»°ÈËÌåÏÖÕâһ˵·¨¡°ÍêÈ«½û¾øÈ·ÇÒÑÏÖØÇ¿µ÷¡±£¬£¬£¬£¬£¬£¬£¬£¬²¢Ö¸³ö´Ë´ÎÐ¹Â¶Éæ¼°µÚÈý·½Æ½Ì¨¡£¡£¡£¡£¡£¡£¡£¾Ý͸¶£¬£¬£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñÔ´ÓÚÒ»¸öµÚÈý·½¹©Ó¦É̵Äϵͳ±»ÒâÍâ»á¼ûºÍÀÄÓ㬣¬£¬£¬£¬£¬£¬£¬TalkTalkÕýÓ빩ӦÉÌÏàÖú½â¾ö¸ÃÎÊÌ⣬£¬£¬£¬£¬£¬£¬£¬µ«²¢Î´Í¸Â¶¹©Ó¦ÉÌÃû³Æ¡£¡£¡£¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬£¬£¬£¬Ð¹Â¶µÄÊý¾ÝÊÇ´ÓµçÐÅÌṩÉÌʹÓõÄAscendon SaaSƽ̨ÇÔÈ¡µÄ£¬£¬£¬£¬£¬£¬£¬£¬¶ø¸Ãƽ̨ÌṩÉÌCSGÈÏ¿ÉÊý¾ÝÊÇ´ÓÆäÆ½Ì¨ÉÏÇÔÈ¡µÄ£¬£¬£¬£¬£¬£¬£¬£¬µ«ÌåÏÖÖ»ÓÐÒ»Ãû¿Í»§Êܵ½Ó°Ï죬£¬£¬£¬£¬£¬£¬£¬ÇÒûÓÐÖ¤¾ÝÅú×¢ÆäÊÖÒÕºÍϵͳÊܵ½ÁËË𺦡£¡£¡£¡£¡£¡£¡£Õâ²¢·ÇTalkTalkÊ×´ÎÔâÓöÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬2015Äê¸Ã¹«Ë¾Ð§ÀÍÆ÷Ò²ÔøÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁË400ÍòÓû§¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/173526/cyber-crime/talktalk-confirms-data-breach.html


3. ʷŮʿ¼¯ÍÅÔâδ֪¹¥»÷ÕßÈëÇÖ£¬£¬£¬£¬£¬£¬£¬£¬Åû¶Çå¾²Îó²î


1ÔÂ28ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬×ܲ¿Î»ÓÚÂ׶صĿç¹ú¹¤³Ì¾ÞͷʷŮʿ¼¯ÍÅ£¨Smiths Group£©½üÆÚÔâÓöÁËδ֪¹¥»÷ÕßµÄϵͳÈëÇÖ£¬£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂÇå¾²Îó²î±»Åû¶¡£¡£¡£¡£¡£¡£¡£×÷Ϊһ¼ÒÔÚÂ×¶ØÖ¤È¯ÉúÒâËùÉÏÊеÄÓ¢¹ú¹«Ë¾£¬£¬£¬£¬£¬£¬£¬£¬Ê·Å®Ê¿¼¯ÍÅÔÚ50¶à¸ö¹ú¼ÒÓµÓÐÁè¼Ý15,000ÃûÔ±¹¤£¬£¬£¬£¬£¬£¬£¬£¬È¥ÄêÓªÊոߴï31.32ÒÚÓ¢°÷£¬£¬£¬£¬£¬£¬£¬£¬Ö÷ҪЧÀÍÓÚÄÜÔ´¡¢Çå¾²¡¢°²±£¡¢º½¿Õº½ÌìºÍ¹ú·ÀÊг¡¡£¡£¡£¡£¡£¡£¡£ÔÚÖܶþÌá½»¸øÂ×¶ØÖ¤È¯ÉúÒâËùµÄÎļþÖУ¬£¬£¬£¬£¬£¬£¬£¬Ê·Å®Ê¿¼¯ÍÅ͸¶ÕýÔÚÊÓ²ìÒ»ÆðÉæ¼°¡°Î´¾­ÊÚȨ»á¼û¹«Ë¾ÏµÍ³¡±µÄÍøÂçÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬²¢Á¬Ã¦¸ôÀëÁËÊÜÓ°ÏìµÄϵͳ£¬£¬£¬£¬£¬£¬£¬£¬Æô¶¯ÁËÓªÒµÒ»Á¬ÐÔÍýÏë¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÕýÓëÍøÂçÇ徲ר¼ÒÏàÖú£¬£¬£¬£¬£¬£¬£¬£¬Æð¾¢»Ö¸´ÏµÍ³²¢ÆÀ¹À¶ÔÓªÒµµÄÆÕ±éÓ°Ï죬£¬£¬£¬£¬£¬£¬£¬Í¬Ê±ÔÊÐí½«½ÓÄÉÒ»ÇÐÐëÒª²½·¥×ñÊØÏà¹Øî¿ÏµÒªÇ󣬣¬£¬£¬£¬£¬£¬£¬²¢ÔÚ»ñµÃ¸ü¶àÐÅϢʱÌṩ¸üС£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬£¬Ê·Å®Ê¿¼¯ÍÅÉÐδ͸¶ÈëÇÖµÄÏêϸʱ¼äºÍÊÇ·ñÓÐÓªÒµ»ò¿Í»§Êý¾Ý±»µÁ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/engineering-giant-smiths-group-discloses-security-breach/


4. ËþËþ¿Æ¼¼ÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬²¿·ÖITЧÀͶÌÔÝÖÐÖ¹


1ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ËþËþ¿Æ¼¼ÓÐÏÞ¹«Ë¾£¨Tata Technologies Ltd.£©£¬£¬£¬£¬£¬£¬£¬£¬×÷ΪËþËþÆû³µµÄ×Ó¹«Ë¾£¬£¬£¬£¬£¬£¬£¬£¬ÊÇÒ»¼ÒרעÓÚÆû³µÉè¼Æ¡¢º½¿Õº½Ì칤³Ì¼°×ÛºÏÑз¢¹¤³ÌµÄÓ¡¶ÈÉÏÊпç¹ú¿Æ¼¼¹«Ë¾¡£¡£¡£¡£¡£¡£¡£¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔâÊÜÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬µ¼Ö²¿·ÖITЧÀͲ»µÃ²»ÔÝÍ£¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜËþËþ¿Æ¼¼Ñ¸ËÙ½ÓÄÉÐж¯²¢Ðû²¼IT×ʲúÒѻָ´£¬£¬£¬£¬£¬£¬£¬£¬µ«´Ë´Î¹¥»÷µÄÏêϸϸ½ÚºÍÓ°ÏìÈÔÔÚÊÓ²ìÖС£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬£¬¿Í»§½»¸¶Ð§ÀÍÔÚÍøÂç¹¥»÷ʱ´ú¼á³ÖÖÜÈ«ÔËÐУ¬£¬£¬£¬£¬£¬£¬£¬Î´¶Ô¿Í»§ÔËÓªÔì³ÉÓ°Ïì¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎú¹¥»÷ÕßÊÇ·ñÀÖ³ÉÇÔÈ¡Á˸ù«Ë¾µÄÈκÎÊý¾Ý£¬£¬£¬£¬£¬£¬£¬£¬µ«ÀÕË÷Èí¼þ¹¥»÷ͨ³£Éæ¼°Êý¾Ý͵ÇÔ£¬£¬£¬£¬£¬£¬£¬£¬¶Ô¿Æ¼¼¹«Ë¾¶øÑÔ£¬£¬£¬£¬£¬£¬£¬£¬´ËÀàÊÂÎñ¿ÉÄܵ¼Ö¹«Ë¾ÉñÃØÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬£¬Ëðº¦ÖªÊ¶²úȨºÍÊÖÒÕ×éºÏ¡£¡£¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬£¬£¬HiveÀÕË÷Èí¼þ×éÖ¯Ôø¶ÔÓ¡¶È×î´óµÄ×ۺϵçÁ¦¹«Ë¾ËþËþµçÁ¦·¢¶¯¹¥»÷£¬£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡²¢Ð¹Â¶Á˰üÀ¨¹¤³ÌʾÒâͼ¡¢²ÆÎñ¼Í¼ºÍСÎÒ˽¼Ò¿Í»§ÐÅÏ¢ÔÚÄÚµÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¡£´Ë´ÎËþËþ¿Æ¼¼ÔâÊܵĹ¥»÷ÔÙ´ÎÌáÐÑÆóÒµÐèÔöÇ¿ÍøÂçÇå¾²·À»¤¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/indian-tech-giant-tata-technologies-hit-by-ransomware-attack/


5. GrubHubÔâÊý¾Ýй¶£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓõÚÈý·½ÕË»§ÈëÇÖϵͳ


2ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬Ê³ÎïÅäË͹«Ë¾GrubHubÔâÓöÁËÒ»´ÎÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýµÚÈý·½Ð§ÀÍÌṩÉ̵ÄÕË»§ÈëÇÖÁËGrubHubϵͳ£¬£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁ˿ͻ§¡¢É̼ҺÍ˾»úµÄСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬µ«ÏêϸÊÜÓ°ÏìÊýĿδ¹ûÕæ¡£¡£¡£¡£¡£¡£¡£GrubHubѸËÙ½ÓÄÉÐж¯£¬£¬£¬£¬£¬£¬£¬£¬ÖÕÖ¹ÁËÈëÇÖÕË»§µÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬£¬²¢É¾³ýÁ˸ÃЧÀÍÌṩÉÌ£¬£¬£¬£¬£¬£¬£¬£¬Í¬Ê±Ô¼ÇëÍⲿר¼ÒÆÀ¹ÀÓ°Ïì¡¢ÂÖ»»ÃÜÂë²¢ÔöÇ¿ÁËÄÚ²¿Ð§À͵ÄÒì³£¼ì²â¡£¡£¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßδ»ñÈ¡Ãô¸ÐµÄСÎÒ˽¼ÒºÍ²ÆÎñÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬£¬µ«¿ÉÄÜ»ñÈ¡Á˲¿·ÖУ԰ʳÌÃÓû§µÄÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂë¼°²¿·ÖÖ§¸¶¿¨ÐÅÏ¢£¨°üÀ¨¿¨ÀàÐͺÍ×îºóËÄλ¿¨ºÅ£©¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹»á¼ûÁËijЩÒÅÁôϵͳµÄÉ¢ÁÐÃÜÂ룬£¬£¬£¬£¬£¬£¬£¬GrubHubÒÑ×Ô¶¯ÂÖ»»¿ÉÄܱ£´æÎ£º¦µÄÃÜÂ룬£¬£¬£¬£¬£¬£¬£¬²¢±Þ²ß¿Í»§Ê¹ÓÃÆæÒìÃÜÂëÒÔ½µµÍΣº¦¡£¡£¡£¡£¡£¡£¡£GrubHubÔÚÌìÏÂ4000¶à¸ö¶¼»áÓµÓÐÁè¼Ý375000¼ÒÉ̼ҺÍ200000ÃûÅäËÍÏàÖúͬ°é£¬£¬£¬£¬£¬£¬£¬£¬È¥ÄêÒò¶àÏîÎ¥·¨ÐÐΪ֧¸¶ÁË2500ÍòÃÀԪϢÕù½ð¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/grubhub-data-breach-impacts-customers-drivers-and-merchants/


6. CISA ½«Ëĸö±»Æð¾¢Ê¹ÓõÄÎó²îÌí¼Óµ½ KEV Ŀ¼ÖÐ


2ÔÂ5ÈÕ£¬£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©ÖܶþÐû²¼ÁËÒ»ÏîÖ÷ÒªÇ徲ͨ¸æ£¬£¬£¬£¬£¬£¬£¬£¬ÏòÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼ÖÐÐÂÔöÁËËĸöÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬£¬²¢ÖÒÑÔÕâЩÎó²îÕý±»Æð¾¢Ê¹Óᣡ£¡£¡£¡£¡£¡£ÕâЩÎó²î°üÀ¨£ºCVE-2024-45195£¬£¬£¬£¬£¬£¬£¬£¬Ò»¸öApache OFBizÖеÄÇ¿ÖÆä¯ÀÀÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß»ñȡδÊÚȨ»á¼ûȨÏÞ²¢Ö´ÐÐí§Òâ´úÂ루ÒÑÐÞ¸´£©£»£»£»£»CVE-2024-29059£¬£¬£¬£¬£¬£¬£¬£¬Microsoft .NET FrameworkÖеÄÐÅϢй¶Îó²î£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜ̻¶Ãô¸ÐÐÅÏ¢²¢µ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ¨ÒÑÐÞ¸´£©£»£»£»£»CVE-2018-9276£¬£¬£¬£¬£¬£¬£¬£¬Paessler PRTGÍøÂç¼àÊÓÆ÷ÖеIJÙ×÷ϵͳÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÖÎÀíȨÏ޵Ĺ¥»÷ÕßÖ´ÐÐÏÂÁÒÑÐÞ¸´£©£»£»£»£»ÒÔ¼°CVE-2018-19410£¬£¬£¬£¬£¬£¬£¬£¬Í¬ÑùÊÇPaessler PRTGÖеÄÍâµØÎļþ°üÀ¨Îó²î£¬£¬£¬£¬£¬£¬£¬£¬¿ÉÔÊÐíÔ¶³Ì¹¥»÷Õß½¨Éè¾ßÓжÁдȨÏÞµÄÓû§£¨ÒÑÐÞ¸´£©¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÕâЩÎó²îÒÑÓɸ÷×Ô¹©Ó¦ÉÌÐÞ¸´£¬£¬£¬£¬£¬£¬£¬£¬µ«ÏÖÔÚÉÐÎÞ¹ØÓÚËüÃÇÔõÑùÔÚÕæÊµ¹¥»÷Öб»Ê¹ÓõÄÏêϸ¹ûÕæ±¨¸æ¡£¡£¡£¡£¡£¡£¡£Îª´Ë£¬£¬£¬£¬£¬£¬£¬£¬Áª°îÃñÊÂÐÐÕþ²¿·Ö£¨FCEB£©ÏÂÊô»ú¹¹±»½ôÆÈ±Þ²ßÔÚ2025Äê2ÔÂ25ÈÕǰӦÓÃÐëÒªµÄÐÞ¸´²½·¥£¬£¬£¬£¬£¬£¬£¬£¬ÒÔÓÐÓÃÌá·ÀÕâЩ×Ô¶¯Íþв£¬£¬£¬£¬£¬£¬£¬£¬È·±£ÍøÂçÇå¾²¡£¡£¡£¡£¡£¡£¡£



https://thehackernews.com/2025/02/cisa-adds-four-actively-exploited.html