LogezyÊý¾Ý¿âÉèÖùýʧÖÂ800ÍòÒ½ÁÆÊÂÇéÕßÊý¾Ýй¶

Ðû²¼Ê±¼ä 2025-04-17

1. LogezyÊý¾Ý¿âÉèÖùýʧÖÂ800ÍòÒ½ÁÆÊÂÇéÕßÊý¾Ýй¶


4ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬Ó¢¹úÈí¼þ¹«Ë¾LogezyÒòÔ±¹¤ÖÎÀíÊý¾Ý¿âÉèÖùýʧ£¬£¬£¬£¬£¬£¬µ¼Ö½ü800ÍòÌõÒ½ÁƱ£½¡ÊÂÇéÕ߼ͼй¶£¬£¬£¬£¬£¬£¬Êý¾Ý×ÜÁ¿´ï1.1TB£¬£¬£¬£¬£¬£¬°üÀ¨Éí·ÝÖ¤¡¢²ÆÎñÊý¾ÝµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£ÕâЩÐÅÏ¢´æ´¢ÔÚδ¼ÓÃÜÇÒÎÞÃÜÂë±£»£»£»¤µÄÊý¾Ý¿âÖУ¬£¬£¬£¬£¬£¬Ì»Â¶µÄÊý¾Ý¿âº­¸ÇÊÂÇéÊÚȨÎļþ¡¢¹úÃñ°ü¹ÜºÅÂëµÈ£¬£¬£¬£¬£¬£¬Éæ¼°656¸öĿ¼ÌõÄ¿£¬£¬£¬£¬£¬£¬¶àΪҽÁƱ£½¡ÌṩÉÌ¡¢ÕÐÆ¸»ú¹¹»òÔÝʱ¾ÍҵЧÀÍ¡£¡£¡£¡£¡£¡£ÊÂÎñ·¢Ã÷ºó£¬£¬£¬£¬£¬£¬LogezyѸËÙÏÞÖÆÁËÊý¾Ý¿â»á¼û£¬£¬£¬£¬£¬£¬µ«¹ØÓÚÊý¾Ý¿â¹ûÕæÊ±³¤¡¢ÊÇ·ñÔâδ¾­ÊÚȨ»á¼û¼°ÖÎÀí·½µÈÎÊÌâÈÔ´æÒÉ¡£¡£¡£¡£¡£¡£LogezyµÄÔ±¹¤ÖÎÀíÈí¼þÖ¼ÔÚ¼ò»¯Ô±¹¤ÖÎÀí£¬£¬£¬£¬£¬£¬Ìṩ°²ÅÅ¡¢Ö§¸¶¡¢¼Æ·ÑµÈ¹¦Ð§£¬£¬£¬£¬£¬£¬Ö»¹ÜÆäÉù³ÆÐ§À͸÷ÐÐÒµ£¬£¬£¬£¬£¬£¬µ«Ð¹Â¶¼Í¼Ö÷񻃾¼°Ò½ÁƱ£½¡ÐÐÒµºÍÒ½»¤Ö°Ô±¡£¡£¡£¡£¡£¡£´Ë´ÎÊý¾Ýй¶Σº¦Öش󣬣¬£¬£¬£¬£¬Ò½ÁƱ£½¡ÐÐÒµ³ÉÍøÂç¹¥»÷Ä¿µÄ£¬£¬£¬£¬£¬£¬Ð¹Â¶ÐÅÏ¢»ò±»ÓÃÓÚÉí·Ý͵ÇÔ¡¢»ñÈ¡¾­¼ÃÀûÒæ£¬£¬£¬£¬£¬£¬»¹¿ÉÄÜÖú³¤Î´¾­ÊÚȨ»á¼ûÄÚ²¿Ò½ÁÆÏµÍ³£¬£¬£¬£¬£¬£¬Ð¹Â¶»¼ÕßÊý¾Ý¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Ð¡ÎÒ˽¼ÒÐÅÏ¢»ò±»ÓÃÓÚÉç»á¹¤³Ì¹¥»÷£¬£¬£¬£¬£¬£¬ÔöÌíÀÕË÷Èí¼þ¹¥»÷Σº¦¡£¡£¡£¡£¡£¡£


https://hackread.com/uk-software-firm-exposed-healthcare-worker-records/


2. ºÚ¿ÍÇÔÈ¡ÎäÌïÖÆÒ©Êý¾Ý£¬£¬£¬£¬£¬£¬Ë÷Òª75,000ÃÀÔªÅâ³¥


4ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬ÎäÌïÖÆÒ©ÊÐÖµ450ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬×¨×¢ÓÚ¶à¸öÒªº¦ÁìÓòµÄÒ©ÎïÑз¢£¬£¬£¬£¬£¬£¬ÓµÓг¬4.9ÍòÃûÔ±¹¤¡£¡£¡£¡£¡£¡£¿ËÈÕ£¬£¬£¬£¬£¬£¬Ò»ÃûÍþвÐÐΪÕßÔÚ²»·¨ÂÛ̳beltwayÉϳöÊ۾ݳÆÊôÓÚÈÕ±¾ÉÏÊÐÉúÎïÖÆÒ©¹«Ë¾ÎäÌïµÄÖØ´óÊý¾Ý¿â£¬£¬£¬£¬£¬£¬´Ë´ÎÊý¾Ýй¶ÊÂÎñÉÐδ»ñµÃ¹Ù·½Ö¤Êµ¡£¡£¡£¡£¡£¡£¸ÃÐÂÕË»§Éù³ÆÓÚ2025Äê4Ô´ÓTakeda.comµ¼³öÁËÔ¼200ÍòÐÐÓû§ÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢¹ûÕæ³öÊÛ£¬£¬£¬£¬£¬£¬±¨¼ÛÆð¼Û7.5ÍòÃÀÔªÇÒÖ»ÂôÒ»´Î£¬£¬£¬£¬£¬£¬»¹³ÆÎäÌïÊÂÇéÖ°Ô±ÔøÁªÏµÆä³·ÏÂÐÅÏ¢¡£¡£¡£¡£¡£¡£ÍþвÐÐΪÕßÌṩµÄÊý¾ÝÑù±¾¿´ËÆÐ¡ÎÒ˽¼ÒÐÅÏ¢¡¢×¨ÒµÏêϸÐÅÏ¢ºÍÄÚ²¿ÏµÍ³±êʶ·ûµÄ×éºÏ£¬£¬£¬£¬£¬£¬¿ÉÄÜÀ´×ÔCRM»òÊý¾ÝÖÎÀíϵͳVeeva£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂ롢ְλ¡¢×éÖ¯Á¥Êô¹ØÏµÒÔ¼°ÖÖÖÖϵͳÊý¾ÝµÈ¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬ÕâЩÑù±¾È±·¦ÒÔÈ·ÈÏÊý¾Ýй¶µÄÕæÊµÐÔ¡£¡£¡£¡£¡£¡£ÎäÌ﹫˾¶Ô´Ë¸ß¶ÈÖØÊÓ£¬£¬£¬£¬£¬£¬ÒÑÆô¶¯ÄÚ²¿ÊӲ첢ÆÀ¹ÀÖ¸¿ØµÄÓÐÓÃÐÔ¡£¡£¡£¡£¡£¡£ÎäÌï½²»°ÈËÌåÏÖ¹«Ë¾ºÜÊÇÖØÊÓÊý¾ÝºÍÒþ˽ÍêÕûÐÔ¡£¡£¡£¡£¡£¡£Çå¾²Ñо¿Ô±Ö¸³ö£¬£¬£¬£¬£¬£¬Ö»¹ÜVeevaϵͳÔÚÖÆÒ©µÈÐÐÒµÓ¦ÓÃÆÕ±é£¬£¬£¬£¬£¬£¬µ«Ñù±¾½ö°üÀ¨¼¸¸öÓû§£¬£¬£¬£¬£¬£¬ÄÑÒÔÅÐ¶ÏÆäÕýµ±ÐÔ¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÖÐÌáµ½µÄ¡°Ò½Éú¡±ºÍ¡°Ò©¼Áʦ¡±ºÜ¿ÉÄÜÊǿͻ§£¬£¬£¬£¬£¬£¬Ñù±¾Êý¾Ý°üÀ¨×¨ÒµÖ°³ÆµÈÊôÐÔ¡£¡£¡£¡£¡£¡£ÈôÊý¾Ýй¶Êôʵ£¬£¬£¬£¬£¬£¬ÊÜÓ°Ïì¿Í»§½«ÃæÁÙÉÌÒµµç×ÓÓʼþÈëÇÖΣº¦¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/takeda-data-breach-claimed-by-cybercriminals/


3. ¾È»¤³µ¹«Ë¾MedExÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬³¬10Íò»¼ÕßÊý¾Ýй¶


4ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÖÐÎ÷²¿Ò»¼Ò¾È»¤³µ¹«Ë¾Ò½ÁÆ¿ìÔ˾Ȼ¤³µ£¨MedEx£©ÔâÊÜ´ó¹æÄ£ÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬µ¼ÖÂÑÏÖØÊý¾Ýй¶¡£¡£¡£¡£¡£¡£MedEx×ܲ¿Î»ÓÚÒÁÀûŵÒÁÖÝ˹¿Æ»ù£¬£¬£¬£¬£¬£¬ÓµÓÐ80¶àÁ¾¾È»¤³µºÍ375¶àÃûÔ±¹¤£¬£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñ¿ÉÄÜй¶ÁËÁè¼Ý118,418Ãû»¼ÕßµÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨È«Ãû¡¢³öÉúÈÕÆÚ¡¢Éç»áÇå¾²ºÅÂë¡¢¼ÝʻִÕÕºÅÂë¡¢Ò½ÁƺͰü¹ÜÐÅÏ¢¡¢µÇ¼ƾ֤£¬£¬£¬£¬£¬£¬ÉõÖÁ»¤ÕÕÐÅÏ¢¡£¡£¡£¡£¡£¡£¸ÃÎ¥¹æÐÐΪ±¬·¢ÔÚ2024Ä꣬£¬£¬£¬£¬£¬ÊӲ쿢ʺó²Åͨ¹ýÏà¹ØÎļþ¹ûÕæ¡£¡£¡£¡£¡£¡£3ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬MedEx·¢Ã÷ÍøÂçÖÐÖ¹ºó£¬£¬£¬£¬£¬£¬Á¬Ã¦¹Ø±Õϵͳ£¬£¬£¬£¬£¬£¬²¢ÒýÈëµÚÈý·½ÍøÂçÇå¾²ÍŶӾÙÐÐÓ¦¶Ô¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬ÉÐδ·¢Ã÷±»µÁÊý¾Ý±»ÀÄÓõļ£Ï󣬣¬£¬£¬£¬£¬ÇҸù«Ë¾ÒÑΪÊܺ¦ÕßÌṩ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»£»¤¡£¡£¡£¡£¡£¡£½üÄêÀ´£¬£¬£¬£¬£¬£¬Ò½ÁƱ£½¡ºÍ½ôÆÈЧÀÍÁìÓòÒѳÉÎªÍøÂç·¸·¨·Ö×ÓµÄÖ÷ҪĿµÄ£¬£¬£¬£¬£¬£¬ÕâÖ÷ÒªÔ´ÓÚ¸ÃÐÐÒµ¶ÔITÇå¾²ÖØÊÓȱ·¦¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/medex-ambulance-data-breach-patient-details-compromised/


4. EndueSoftwareÔâºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬£¬³¬11.8ÍòÈËÃô¸ÐÐÅϢй¶


4ÔÂ15ÈÕ£¬£¬£¬£¬£¬£¬×ܲ¿Î»ÓÚŦԼµÄÊäÒºÕïËùЧÀͿƼ¼¹«Ë¾EndueSoftwareÒÑÈ·Èϱ¬·¢Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬Ð¹Â¶ÁËÁè¼Ý118,000È˵ÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨Éç»áÇå¾²ºÅÂ롢ȫÃû¡¢³öÉúÈÕÆÚºÍÒ½ÁƼͼ±àºÅµÈ¡£¡£¡£¡£¡£¡£´Ë´ÎÏ®»÷±¬·¢ÔÚ2025Äê2ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬µ«Ï¸½ÚÒòÖ´·¨ÒªÇóÏòî¿Ïµ»ú¹¹ºÍÊÜÓ°ÏìСÎÒ˽¼Ò·¢³ö֪ͨ¶ø¸Õ¸Õ¸¡³öË®Ãæ¡£¡£¡£¡£¡£¡£EndueÊÇÒ»¼Ò¿ª·¢ÓÃÓÚÖÎÀíÊäÒºÖÐÐĵϼÕß°²ÅÅ¡¢ÎüÊÕ¡¢¿â´æºÍ¼Í¼µÄÈí¼þµÄ¹«Ë¾£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÀÖ³ÉÉøÍ¸ÁËÆäϵͳ²¢¸´ÖÆÁË´ó×ÚСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚÉÐÎÞÖ¤¾ÝÅú×¢±»µÁÊý¾ÝÒѱ»ÀÄÓ㬣¬£¬£¬£¬£¬µ«Êܺ¦ÕßÈÔÐèÉóÉ÷´¦Öóͷ£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÒÑΪÊܺ¦ÕßÌṩ12¸öÔµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»£»¤£¬£¬£¬£¬£¬£¬²¢ÊµÑéÁËÌØÁíÍâÇå¾²²½·¥ÒÔ¼õ΢Σº¦¡£¡£¡£¡£¡£¡£´Ë´ÎÊý¾Ýй¶ÊÂÎñ͹ÏÔÁËÒ½ÁƱ£½¡ÁìÓòÊý×ÖÉí·ÝÇå¾²µÄųÈõÐÔ£¬£¬£¬£¬£¬£¬ÌØÊâÊǹØÓÚÄÇЩ»¼ÓÐÖØ´óÇÒÂýÐÔ¼²²¡µÄÊäÒºÖÐÐÄ»¼Õß¶øÑÔ¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/infusion-center-software-breach-exposes-patient-data/


5. BidenCash°µÍøÐÅÓÿ¨Ú²Æ­Êг¡ÔÙй´ó×Ú±»µÁ¼Í¼


4ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬°µÍøÐÅÓÿ¨Ú²Æ­Êг¡BidenCashÒÔ¼¤½øÕ½ÂÔÖøÃû£¬£¬£¬£¬£¬£¬¿ËÈÕÔÚ¶íÓïÍøÂç·¸·¨ÂÛ̳XSSй¶һÅúеÄ910,380Ìõ±»µÁÐÅÓÿ¨¼Í¼£¬£¬£¬£¬£¬£¬ÓÚ4ÔÂ14ÈÕÏÂÖç6:37£¨UTC£©Ðû²¼£¬£¬£¬£¬£¬£¬°üÀ¨¿¨ºÅ¡¢CVVÂëºÍÓÐÓÃÆÚ£¬£¬£¬£¬£¬£¬ËäÎÞÐÕÃûµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¬£¬£¬£¬£¬£¬µ«ÈÔ±£´æÍøÂçڲƭΣº¦£¬£¬£¬£¬£¬£¬ÓÈÆäÔÚÎÞ¿¨ÉúÒâÖС£¡£¡£¡£¡£¡£Õâ²¢·ÇBidenCashÊ״δó×ÚÐû²¼±»µÁÊý¾Ý£¬£¬£¬£¬£¬£¬´Ëǰ¸Ãƽ̨¾Í³£Í¨¹ýÐû²¼Ãâ·ÑйÃÜÐÅÏ¢ÎüÒý¹Ø×¢¡¢½¨ÉèÐÅÓþ»òÉù³ÆÖ´ÐÐÊг¡¹æÔò¡£¡£¡£¡£¡£¡£2023Äê3Ô£¬£¬£¬£¬£¬£¬Æäй¶200ÍòÕÅÐÅÓÿ¨ÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬º­¸Ç³Ö¿¨ÈËÈ«Ãû¡¢¿¨ºÅ¡¢ÒøÐÐÏêϸÐÅÏ¢µÈ£»£»£»2023Äê12Ô£¬£¬£¬£¬£¬£¬ÓÖÐû²¼³¬160ÍòÌõÐÅÓÿ¨¼Í¼£¬£¬£¬£¬£¬£¬¾ùÒÔ´¿Îı¾ÃûÌô洢¡£¡£¡£¡£¡£¡£´Ë´Îй¶ʱ£¬£¬£¬£¬£¬£¬BidenCashÔÚ¶íÂÞ˹ÂÛ̳Ðû²¼Ìû×ӳƣ¬£¬£¬£¬£¬£¬Êý¾ÝÊÇÒÑÍùÒ»¸öÔ´Ӳî±ðÂÛ̳ºÍTelegramȺ×éץȡµÄ£¬£¬£¬£¬£¬£¬Ä¿µÄÊÇչʾÆä¡°·´¹ûÕæÏµÍ³¡±£¬£¬£¬£¬£¬£¬¸ÃϵͳּÔÚʶ±ð²¢ÒƳýÊг¡ÉÏÒÑÁ÷ͨµÄ¿¨Æ¬¡£¡£¡£¡£¡£¡£Èô·¢Ã÷Âô¼Ò³öÊÛÒÑÔÚÁ÷ͨµÄ¿¨Æ¬£¬£¬£¬£¬£¬£¬Ïà¹ØÁÐ±í½«±»Ï¼Ü£¬£¬£¬£¬£¬£¬Âô¼ÒÒ²½«ÊÜËæ´¦·Ö£¬£¬£¬£¬£¬£¬Õâ¼ÈÊÇÒ»ÖÖÖÊÁ¿¿ØÖÆÊµÑ飬£¬£¬£¬£¬£¬Ò²ÊÇÒ»ÖÖÍÆ¹ãÊֶΣ¬£¬£¬£¬£¬£¬Í¨¹ýÃâ·ÑÌṩº£Á¿Êý¾Ý¼¯£¬£¬£¬£¬£¬£¬Ìá¸ßÔÚ¿¨Æ¬³ÖÓÐÕßÖÐµÄÆØ¹â¶È£¬£¬£¬£¬£¬£¬ÎüÒýÁ÷Á¿»Øµ½ÍøÕ¾¡£¡£¡£¡£¡£¡£


https://hackread.com/bidencash-market-leak-credit-cards-russian-forum/


6. InterlockÀÕË÷Èí¼þͨ¹ýÕýµ±ÍøÕ¾Èö²¥¶ñÒâä¯ÀÀÆ÷¸üÐÂ


4ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇ徲ר¼Ò·¢Ã÷ÁËÒ»ÖÖ×Ô2024Äê9ÔÂÆðÇÄÈ»À©´ó»î¶¯¹æÄ£µÄÖØ´óÀÕË÷Èí¼þÍþвInterlock¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ½ÓÄɶà½×¶Î¹¥»÷Á´£¬£¬£¬£¬£¬£¬ÏÈÈëÇÖÕýµ±ÍøÕ¾£¬£¬£¬£¬£¬£¬ÒÔÐéαä¯ÀÀÆ÷¸üÐÂÓÕÆ­ºÁÎÞ½äÐĵÄÓû§¡£¡£¡£¡£¡£¡£×ÔInterlock·ºÆðÒÔÀ´£¬£¬£¬£¬£¬£¬ÆäÕ½ÂÔ±¬·¢ÖØ´óת±ä¡£¡£¡£¡£¡£¡£ÔËÓªÉÌˢй¤¾ß¼¯£¬£¬£¬£¬£¬£¬½ÓÄÉClickFixµÈÐÂÊÖÒÕ°²ÅÅÀÕË÷Èí¼þ¸ºÔØ£¬£¬£¬£¬£¬£¬²¢½ÓÄÉLummaStealerºÍBerserkStealerµÈ¹¤¾ßÔöÇ¿ÄÜÁ¦¡£¡£¡£¡£¡£¡£×î³õµÄѬȾǰÑÔÒÀÀµÉç»á¹¤³Ìѧ£¬£¬£¬£¬£¬£¬Ðéαä¯ÀÀÆ÷¸üгÌÐòÊÇÈ«ÐÄÖÆ×÷µÄPyInstallerÎļþ£¬£¬£¬£¬£¬£¬Æô¶¯Ê±ÏÂÔØ²¢Ö´ÐÐÏÖʵÕýµ±×°ÖóÌÐò£¬£¬£¬£¬£¬£¬Í¬Ê±ÔËÐÐǶÈëµÄPowerShellºóÞ籾¡£¡£¡£¡£¡£¡£¸Ã¾ç±¾×÷Ϊ¹¥»÷µÚÒ»½×¶Î£¬£¬£¬£¬£¬£¬ÒÔÎÞÏÞÑ­»·ÔËÐУ¬£¬£¬£¬£¬£¬ÍøÂç´ó×ÚϵͳÐÅÏ¢£¬£¬£¬£¬£¬£¬¾­¼ÓÃÜ¡¢Ñ¹Ëõºó´«Êäµ½C2ЧÀÍÆ÷¡£¡£¡£¡£¡£¡£ºóÐøµü´úʵÏÖ³¤ÆÚÐÔ»úÖÆ£¬£¬£¬£¬£¬£¬¿ÉÖ´ÐÐí§ÒâWindowsÏÂÁî¡£¡£¡£¡£¡£¡£C2»ù´¡Éèʩͨ¹ýÈ«ÐÄÂþÑÜչʾÆäµ¯ÐÔ¡£¡£¡£¡£¡£¡£2025ÄêÍ·£¬£¬£¬£¬£¬£¬ÔËÓªÉÌÕ½ÂÔÀ©´ó£¬£¬£¬£¬£¬£¬´Óä¯ÀÀÆ÷¸üÐÂÓÕ¶üתÏòÇå¾²Èí¼þ¸üгÌÐò£¬£¬£¬£¬£¬£¬Î±×°³ÉFortiClientµÈÇå¾²²úÆ·¡£¡£¡£¡£¡£¡£´Ë´Î¸Ä±àÅú×¢¸Ã×éÖ¯ÕýÔÚһֱˢÐÂÊÖÒÕ£¬£¬£¬£¬£¬£¬ÒÔ±ãÔÚÐí¶àÇå¾²Ðж¯µÄ¼àÊÓÏÂÔË×÷¡£¡£¡£¡£¡£¡£


https://cybersecuritynews.com/interlock-ransomware-employs-multi-stage-attack/