{"id":3572,"date":"2025-03-19T21:49:44","date_gmt":"2025-03-19T21:49:44","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=3572"},"modified":"2025-03-19T21:49:48","modified_gmt":"2025-03-19T21:49:48","slug":"cisa-them-ba-lo-hong-moi-vao-danh-sach-nguy-hiem-nhat-cua-ho-nhung-dieu-ban-can-biet","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/tin-tuc\/cisa-them-ba-lo-hong-moi-vao-danh-sach-nguy-hiem-nhat-cua-ho-nhung-dieu-ban-can-biet\/","title":{"rendered":"CISA Th\u00eam Ba L\u1ed7 H\u1ed5ng M\u1edbi V\u00e0o Danh S\u00e1ch \u201cNguy Hi\u1ec3m Nh\u1ea5t\u201d C\u1ee7a H\u1ecd: Nh\u1eefng \u0110i\u1ec1u B\u1ea1n C\u1ea7n Bi\u1ebft"},"content":{"rendered":"<p>C\u01a1 quan An ninh m\u1ea1ng v\u00e0 C\u01a1 s\u1edf h\u1ea1 t\u1ea7ng (CISA) v\u1eeba c\u00f4ng b\u1ed1 Danh m\u1ee5c c\u00e1c l\u1ed7 h\u1ed5ng \u0111\u00e3 bi\u1ebft b\u1ecb khai th\u00e1c (KEV) m\u1edbi nh\u1ea5t v\u1edbi ba \u0111i\u1ec3m y\u1ebfu b\u1ea3o m\u1eadt m\u1edbi m\u00e0 tin t\u1eb7c hi\u1ec7n \u0111ang khai th\u00e1c \u0111\u1ec3 hack v\u00e0o h\u1ec7 th\u1ed1ng. \u00dd ngh\u0129a c\u1ee7a th\u00f4ng b\u00e1o n\u00e0y d\u1ef1a tr\u00ean th\u1ef1c t\u1ebf l\u00e0 c\u00e1c c\u1ea3nh b\u00e1o c\u1ee7a CISA kh\u00f4ng ch\u1ec9 ra m\u1ed9t s\u1ed1 t\u00ecnh hu\u1ed1ng l\u00fd thuy\u1ebft n\u00e0o \u0111\u00f3 \u2013 nh\u1eefng l\u1ed7 h\u1ed5ng n\u00e0y l\u00e0 nh\u1eefng l\u1ed7 h\u1ed5ng ch\u1eafc ch\u1eafn theo ngh\u0129a l\u00e0 ch\u00fang th\u1ef1c s\u1ef1 \u0111ang b\u1ecb x\u00e2m ph\u1ea1m cho c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng th\u1ef1c s\u1ef1.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-was-added\"><strong>\u0110\u00e3 th\u00eam nh\u1eefng g\u00ec?<\/strong><\/h2>\n\n\n<p>Ch\u00fang ta h\u00e3y d\u1ecbch ba l\u1ed7 h\u1ed5ng n\u00e0y sang ng\u00f4n ng\u1eef th\u00f4ng th\u01b0\u1eddng:<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"1-edimax-ip-camera-vulnerability-cve20251316\"><strong>1. L\u1ed7 h\u1ed5ng c\u1ee7a Camera IP Edimax (CVE-2025-1316)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability.jpg\" alt=\"L\u1ed7 h\u1ed5ng c\u1ee7a Camera IP Edimax\" class=\"wp-image-3574\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/Edimax-IP-Camera-Vulnerability-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p>V\u1ea5n \u0111\u1ec1 b\u1ea3o m\u1eadt \u0111\u01b0\u1ee3c \u0111\u1ec1 c\u1eadp trong <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-1316\">camera an ninh Edimax IC-7100<\/a> \u0111\u1ec1 c\u1eadp \u0111\u1ebfn c\u00e1i g\u1ecdi l\u00e0 &quot;command injection&quot;. \u00dd t\u01b0\u1edfng l\u00e0 k\u1ebb t\u1ea5n c\u00f4ng c\u00f3 th\u1ec3 khi\u1ebfn camera th\u1ef1c thi m\u00e3 \u0111\u1ed9c h\u1ea1i. V\u1edbi nh\u1eefng camera n\u00e0y \u0111\u01b0\u1ee3c thi\u1ebft l\u1eadp t\u1ea1i nh\u00e0 ho\u1eb7c v\u0103n ph\u00f2ng, ch\u00fang c\u00f3 th\u1ec3 b\u1ecb nh\u1eafm m\u1ee5c ti\u00eau b\u1edfi nh\u1eefng ng\u01b0\u1eddi d\u00f9ng kh\u00f4ng \u0111\u01b0\u1ee3c \u1ee7y quy\u1ec1n, nh\u1eefng ng\u01b0\u1eddi c\u00f3 th\u1ec3 truy c\u1eadp v\u00e0o ngu\u1ed3n c\u1ea5p d\u1eef li\u1ec7u camera c\u1ee7a b\u1ea1n, thay \u0111\u1ed5i c\u00e0i \u0111\u1eb7t ho\u1eb7c s\u1eed d\u1ee5ng nh\u1eefng camera n\u00e0y \u0111\u1ec3 t\u1ea5n c\u00f4ng c\u00e1c thi\u1ebft b\u1ecb kh\u00e1c tr\u00ean m\u1ea1ng c\u1ee7a b\u1ea1n.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"2-nakivo-backup-software-vulnerability-cve202448248\"><strong>2. L\u1ed7 h\u1ed5ng ph\u1ea7n m\u1ec1m sao l\u01b0u NAKIVO (CVE-2024-48248)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability.jpg\" alt=\"L\u1ed7 h\u1ed5ng ph\u1ea7n m\u1ec1m sao l\u01b0u NAKIVO\" class=\"wp-image-3575\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/NAKIVO-Backup-Software-Vulnerability-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.nakivo.com\/\">NAKIVO<\/a> ph\u00e1t tri\u1ec3n c\u00e1c gi\u1ea3i ph\u00e1p sao l\u01b0u v\u00e0 ph\u1ee5c h\u1ed3i \u0111\u01b0\u1ee3c nhi\u1ec1u doanh nghi\u1ec7p s\u1eed d\u1ee5ng \u0111\u1ec3 \u0111\u1ea3m b\u1ea3o b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u. L\u1ed7i \u0111ang \u0111\u01b0\u1ee3c \u0111\u1ec1 c\u1eadp \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 \u201c<a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/36.html\">duy\u1ec7t \u0111\u01b0\u1eddng d\u1eabn tuy\u1ec7t \u0111\u1ed1i<\/a>\u201d, cho ph\u00e9p k\u1ebb t\u1ea5n c\u00f4ng truy c\u1eadp v\u00e0o c\u00e1c t\u1ec7p m\u00e0 ch\u00fang kh\u00f4ng \u0111\u01b0\u1ee3c ph\u00e9p xem. \u0110i\u1ec1u n\u00e0y \u0111\u1eb7c bi\u1ec7t nguy hi\u1ec3m trong tr\u01b0\u1eddng h\u1ee3p ph\u1ea7n m\u1ec1m sao l\u01b0u, n\u01a1i c\u00e1c b\u1ea3n sao l\u01b0u th\u01b0\u1eddng ch\u1ee9a d\u1eef li\u1ec7u nh\u1ea1y c\u1ea3m. K\u1ebb x\u00e2m nh\u1eadp x\u00e2m ph\u1ea1m l\u1ed7 h\u1ed5ng n\u00e0y c\u00f3 th\u1ec3 truy c\u1eadp, \u0111\u00e1nh c\u1eafp ho\u1eb7c x\u00f3a d\u1eef li\u1ec7u \u0111\u00e3 sao l\u01b0u.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"3-sap-netweaver-vulnerability-cve201712637\"><strong>3. L\u1ed7 h\u1ed5ng SAP NetWeaver (CVE-2017-12637)<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver.jpg\" alt=\"L\u1ed7 h\u1ed5ng SAP NetWeaver\" class=\"wp-image-3576\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver.jpg 960w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-300x169.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-768x432.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/SAP-NetWeaver-18x10.jpg 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n\n\n\n<p>\u0110i\u1ec1u n\u00e0y \u0111\u1eb7c bi\u1ec7t quan tr\u1ecdng v\u00ec n\u00f3 xu\u1ea5t hi\u1ec7n t\u1eeb n\u0103m 2017, kh\u00e1 l\u00e2u r\u1ed3i \u2013 t\u1ee9c l\u00e0 g\u1ea7n t\u00e1m n\u0103m. SAP NetWeaver l\u00e0 m\u1ed9t trong nh\u1eefng n\u1ec1n t\u1ea3ng c\u00f4ng ngh\u1ec7 th\u1ef1c hi\u1ec7n nhi\u1ec1u \u1ee9ng d\u1ee5ng kinh doanh quan tr\u1ecdng. Kho\u1ea3ng c\u00e1ch \u0111\u00f3 ch\u00ednh x\u00e1c l\u00e0 lo\u1ea1i th\u1ee9 s\u1ebd t\u1ea1o n\u00ean m\u1ed9t \u201c<a href=\"https:\/\/portswigger.net\/web-security\/file-path-traversal\">duy\u1ec7t th\u01b0 m\u1ee5c<\/a>\u201d n\u01a1i m\u00e0, v\u00ec n\u00f3, nh\u1eefng k\u1ebb x\u00e2m nh\u1eadp c\u00f3 th\u1ec3 n\u1eafm gi\u1eef c\u00e1c t\u1ec7p v\u00e0 th\u01b0 m\u1ee5c kh\u00f4ng \u0111\u01b0\u1ee3c ph\u00e9p. Th\u1ef1c t\u1ebf l\u00e0 nhi\u1ec1u h\u1ec7 th\u1ed1ng kh\u00f4ng b\u1ecb \u1ea3nh h\u01b0\u1edfng b\u1edfi b\u1ea3n v\u00e1, ngay c\u1ea3 sau nhi\u1ec1u n\u0103m, l\u00e0 l\u00fd do t\u1ea1i sao nh\u1eefng k\u1ebb t\u1ea5n c\u00f4ng hi\u1ec7n \u0111ang khai th\u00e1c n\u00f3.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"why-this-matters-to-everyone\"><strong>T\u1ea1i sao \u0111i\u1ec1u n\u00e0y quan tr\u1ecdng v\u1edbi m\u1ecdi ng\u01b0\u1eddi<\/strong><\/h2>\n\n\n<p>M\u1eb7c d\u00f9 c\u00e1c h\u01b0\u1edbng d\u1eabn c\u1ee7a CISA ch\u1ec9 b\u1eaft bu\u1ed9c \u0111\u1ed1i v\u1edbi c\u00e1c c\u01a1 quan ch\u00ednh quy\u1ec1n li\u00ean bang, nh\u01b0ng KEV Catalog c\u1ee7a h\u1ecd \u0111\u00e3 \u0111\u01b0\u1ee3c thi\u1ebft l\u1eadp l\u00e0 ngu\u1ed3n c\u1eadp nh\u1eadt nh\u1ea5t \u0111\u1ec3 l\u1ef1a ch\u1ecdn c\u00e1c l\u1ed7i quan tr\u1ecdng nh\u1ea5t c\u1ea7n s\u1eeda. Khi m\u1ed9t l\u1ed7i \u0111\u01b0\u1ee3c \u0111\u01b0a v\u00e0o danh s\u00e1ch n\u00e0y, \u0111i\u1ec1u \u0111\u00f3 c\u00f3 ngh\u0129a l\u00e0:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tin t\u1eb7c s\u1eed d\u1ee5ng nh\u1eefng l\u1ed7 h\u1ed5ng n\u00e0y<\/li>\n\n\n\n<li>C\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng th\u00e0nh c\u00f4ng \u0111\u1ebfn m\u1ee9c ch\u00fang \u0111\u00e3 lan ra c\u1ea5p \u0111\u1ed9 qu\u1ed1c gia<\/li>\n\n\n\n<li>Thi\u1ec7t h\u1ea1i ti\u1ec1m t\u00e0ng t\u1eeb nh\u1eefng l\u1ed7 h\u1ed5ng n\u00e0y l\u00e0 r\u1ea5t l\u1edbn<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-should-you-do\"><strong>B\u1ea1n n\u00ean l\u00e0m g\u00ec?<\/strong><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"for-home-users\"><strong>\u0110\u1ed1i v\u1edbi ng\u01b0\u1eddi d\u00f9ng t\u1ea1i nh\u00e0:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>N\u1ebfu b\u1ea1n c\u00f3 m\u00e1y \u1ea3nh Edimax, h\u00e3y ki\u1ec3m tra trang web c\u1ee7a nh\u00e0 s\u1ea3n xu\u1ea5t \u0111\u1ec3 xem h\u1ecd c\u00f3 ph\u00e1t h\u00e0nh b\u1ea3n c\u1eadp nh\u1eadt ph\u1ea7n m\u1ec1m kh\u00f4ng<\/li>\n\n\n\n<li>\u0110\u1ea3m b\u1ea3o thi\u1ebft b\u1ecb c\u1ee7a b\u1ea1n c\u00f3 t\u1ea5t c\u1ea3 c\u00e1c b\u1ea3n v\u00e1 b\u1ea3o m\u1eadt c\u1ea7n thi\u1ebft<\/li>\n\n\n\n<li>H\u00e3y ngh\u0129 \u0111\u1ebfn nh\u1eefng thi\u1ebft b\u1ecb c\u0169 ho\u00e0n to\u00e0n m\u1edbi kh\u00f3 c\u00f3 th\u1ec3 nh\u1eadn \u0111\u01b0\u1ee3c b\u1ea3n v\u00e1 b\u1ea3o m\u1eadt n\u1eefa<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"for-business-users\"><strong>\u0110\u1ed1i v\u1edbi ng\u01b0\u1eddi d\u00f9ng doanh nghi\u1ec7p:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Bao g\u1ed3m trong kho c\u1ee7a b\u1ea1n nh\u1eefng s\u1ea3n ph\u1ea9m b\u1ecb \u1ea3nh h\u01b0\u1edfng (m\u00e1y \u1ea3nh Edimax, ph\u1ea7n m\u1ec1m sao l\u01b0u NAKIVO ho\u1eb7c SAP NetWeaver) m\u00e0 t\u1ed5 ch\u1ee9c c\u1ee7a b\u1ea1n s\u1eed d\u1ee5ng<\/li>\n\n\n\n<li>\u0110\u1eb7t vi\u1ec7c v\u00e1 c\u00e1c h\u1ec7 th\u1ed1ng n\u00e0y l\u00ean \u0111\u1ea7u danh s\u00e1ch vi\u1ec7c c\u1ea7n l\u00e0m c\u1ee7a b\u1ea1n<\/li>\n\n\n\n<li>N\u1ebfu b\u1ea1n kh\u00f4ng th\u1ec3 c\u00e0i \u0111\u1eb7t b\u1ea3n v\u00e1 ngay l\u1eadp t\u1ee9c, th\u00ec b\u1ea1n n\u00ean c\u1ed1 g\u1eafng gi\u1ea3m thi\u1ec3u thi\u1ec7t h\u1ea1i ti\u1ec1m \u1ea9n b\u1eb1ng c\u00e1ch c\u00f4 l\u1eadp ph\u1ea7n c\u00f2n l\u1ea1i c\u1ee7a m\u1ea1ng b\u1eb1ng c\u00e1ch ph\u00e2n \u0111o\u1ea1n m\u1ea1ng<\/li>\n\n\n\n<li>Th\u1ef1c hi\u1ec7n c\u00e1c quy tr\u00ecnh sao l\u01b0u c\u1ee7a b\u1ea1n \u0111\u1ec3 \u0111\u1ea3m b\u1ea3o b\u1ea1n c\u00f3 c\u00e1c b\u1ea3n sao kh\u00f4ng b\u1ecb nhi\u1ec5m \u0111\u1ec3 kh\u00f4i ph\u1ee5c trong tr\u01b0\u1eddng h\u1ee3p b\u1ecb vi ph\u1ea1m<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"for-it-professionals\"><strong>D\u00e0nh cho chuy\u00ean gia CNTT:<\/strong><\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>T\u1eadn d\u1ee5ng l\u1ee3i th\u1ebf c\u1ee7a <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">Danh m\u1ee5c KEV c\u1ee7a CISA<\/a>, v\u1ec1 c\u01a1 b\u1ea3n l\u00e0 m\u1ed9t b\u1ea3ng \u0111i\u1ec3m cho ch\u01b0\u01a1ng tr\u00ecnh qu\u1ea3n l\u00fd l\u1ed7 h\u1ed5ng c\u1ee7a b\u1ea1n<\/li>\n\n\n\n<li>\u0110\u1eebng qu\u00ean c\u00e1c h\u1ec7 th\u1ed1ng c\u0169 c\u00f3 th\u1ec3 \u0111ang ch\u1ea1y c\u00e1c phi\u00ean b\u1ea3n l\u1ed7i th\u1eddi c\u1ee7a n\u1ec1n t\u1ea3ng SAP NetWeaver trong qu\u00e1 tr\u00ecnh c\u1eadp nh\u1eadt<\/li>\n\n\n\n<li>C\u00f3 l\u1ebd b\u1ea1n c\u00f3 th\u1ec3 mu\u1ed1n th\u1ef1c hi\u1ec7n qu\u00e9t l\u1ed7 h\u1ed5ng th\u01b0\u1eddng xuy\u00ean h\u01a1n cho c\u00e1c h\u1ec7 th\u1ed1ng r\u1ea5t quan tr\u1ecdng<\/li>\n\n\n\n<li>Trong tr\u01b0\u1eddng h\u1ee3p n\u00e0y, h\u00e3y \u0111\u01b0a ra m\u1ed9t k\u1ebf ho\u1ea1ch c\u1ef1c nhanh v\u1ec1 c\u00e1ch gi\u1ea3i quy\u1ebft nh\u1eefng t\u00ecnh hu\u1ed1ng quan tr\u1ecdng nh\u1ea5t khi ch\u00fang v\u1eabn c\u00f2n \u1edf th\u1eddi \u0111i\u1ec3m hi\u1ec7n t\u1ea1i<\/li>\n<\/ul>\n\n\n\n<p>V\u00ed d\u1ee5 v\u1ec1 l\u1ed7 h\u1ed5ng t\u1eeb 8 n\u0103m tr\u01b0\u1edbc l\u00e0 m\u1ed9t b\u00e0i h\u1ecdc tuy\u1ec7t v\u1eddi \u0111\u1ec3 hi\u1ec3u r\u1eb1ng qu\u00e1 tr\u00ecnh <a href=\"https:\/\/securitybriefing.net\/vi\/ai-cach-tiep-can-cua-mot-kien-truc-su-dieu-hanh-doi-voi-finops-lam-the-nao-ai-va-tu-dong-hoa-tinh-gon-viec-quan-ly-du-lieu-thang-10-nam-2024-%c2%b7-cesar-daniel\/an-ninh-mang\/\">an ninh m\u1ea1ng <\/a>l\u00e0 kh\u00f4ng bao gi\u1edd k\u1ebft th\u00fac. C\u00f3 r\u1ea5t nhi\u1ec1u c\u00f4ng ty v\u1eabn s\u1eed d\u1ee5ng ph\u1ea7n m\u1ec1m c\u0169 c\u00f3 th\u1ec3 c\u00f3 l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt \u0111\u00e3 bi\u1ebft v\u00e0 \u0111i\u1ec1u \u0111\u00f3 d\u1eabn \u0111\u1ebfn t\u00ecnh hu\u1ed1ng k\u1ebb t\u1ea5n c\u00f4ng g\u1eb7p v\u1ea5n \u0111\u1ec1 theo c\u00e1ch c\u1ee7a h\u1ecd. Do \u0111\u00f3, \u0111i\u1ec1u n\u00e0y \u0111\u00f2i h\u1ecfi ph\u1ea3i c\u1eadp nh\u1eadt th\u01b0\u1eddng xuy\u00ean ph\u1ea7n m\u1ec1m v\u00e0 h\u1ec7 th\u1ed1ng, c\u0169ng nh\u01b0 c\u00e1c b\u1ea3n v\u00e1 v\u00e0 \u0111\u00e1nh gi\u00e1 b\u1ea3o m\u1eadt c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n cho c\u00e1c m\u00e1y \u0111ang ho\u1ea1t \u0111\u1ed9ng.<\/p>\n\n\n\n<p>H\u00e3y nh\u1edb r\u1eb1ng khi CISA c\u1eadp nh\u1eadt Danh m\u1ee5c KEV c\u1ee7a m\u00ecnh, \u0111\u00f3 kh\u00f4ng ch\u1ec9 l\u00e0 m\u1ed9t \u0111i\u1ec3m y\u1ebfu kh\u00e1c \u2013 m\u00e0 th\u1ef1c t\u1ebf l\u00e0 m\u1ed9t l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt m\u00e0 k\u1ebb t\u1ea5n c\u00f4ng \u0111ang s\u1eed d\u1ee5ng r\u1ed9ng r\u00e3i hi\u1ec7n nay \u0111\u1ec3 l\u00e2y nhi\u1ec5m v\u00e0 \u0111\u00e1nh c\u1eafp d\u1eef li\u1ec7u. H\u00e3y nhanh ch\u00f3ng th\u1ef1c hi\u1ec7n v\u00e0 tr\u1edf th\u00e0nh m\u1ed9t ph\u1ea7n c\u1ee7a ch\u00ednh quy\u1ec1n m\u1edbi s\u1ebd kh\u00f4ng g\u1eb7p kh\u00f3 kh\u0103n do vi ph\u1ea1m ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i g\u00e2y ra.<\/p>","protected":false},"excerpt":{"rendered":"<p>C\u01a1 quan An ninh m\u1ea1ng v\u00e0 C\u01a1 s\u1edf h\u1ea1 t\u1ea7ng (CISA) v\u1eeba c\u00f4ng b\u1ed1 Danh m\u1ee5c l\u1ed7 h\u1ed5ng \u0111\u00e3 bi\u1ebft (KEV) m\u1edbi nh\u1ea5t v\u1edbi ba \u0111i\u1ec3m y\u1ebfu b\u1ea3o m\u1eadt m\u1edbi m\u00e0 tin t\u1eb7c hi\u1ec7n \u0111ang khai th\u00e1c \u0111\u1ec3 t\u1ea5n c\u00f4ng v\u00e0o h\u1ec7 th\u1ed1ng.\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/tin-tuc\/cisa-them-ba-lo-hong-moi-vao-danh-sach-nguy-hiem-nhat-cua-ho-nhung-dieu-ban-can-biet\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">CISA Th\u00eam Ba L\u1ed7 H\u1ed5ng M\u1edbi V\u00e0o Danh S\u00e1ch \u201cNguy Hi\u1ec3m Nh\u1ea5t\u201d C\u1ee7a H\u1ecd: Nh\u1eefng \u0110i\u1ec1u B\u1ea1n C\u1ea7n Bi\u1ebft<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":3573,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-3572","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA Adds Three New Vulnerabilities to Their &quot;Most Dangerous&quot; List: What You Need to Know | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/tin-tuc\/cisa-them-ba-lo-hong-moi-vao-danh-sach-nguy-hiem-nhat-cua-ho-nhung-dieu-ban-can-biet\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA Adds Three New Vulnerabilities to Their &quot;Most Dangerous&quot; List: What You Need to Know | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity and Infrastructure Security Agency (CISA) just announced the latest Known Exploited Vulnerabilities (KEV) Catalog with three new security weaknesses that hackers are currently exploiting to hack into systems.&hellip; Continue reading CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/tin-tuc\/cisa-them-ba-lo-hong-moi-vao-danh-sach-nguy-hiem-nhat-cua-ho-nhung-dieu-ban-can-biet\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-19T21:49:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-19T21:49:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"966\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\",\"datePublished\":\"2025-03-19T21:49:44+00:00\",\"dateModified\":\"2025-03-19T21:49:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"},\"wordCount\":757,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\",\"name\":\"CISA Adds Three New Vulnerabilities to Their \\\"Most Dangerous\\\" List: What You Need to Know | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"datePublished\":\"2025-03-19T21:49:44+00:00\",\"dateModified\":\"2025-03-19T21:49:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg\",\"width\":966,\"height\":425,\"caption\":\"CISA Adds Three New Vulnerabilities to Their Most Dangerous List\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISA Th\u00eam Ba L\u1ed7 H\u1ed5ng M\u1edbi V\u00e0o Danh S\u00e1ch \"Nguy Hi\u1ec3m Nh\u1ea5t\" C\u1ee7a H\u1ecd: Nh\u1eefng \u0110i\u1ec1u B\u1ea1n C\u1ea7n Bi\u1ebft | B\u00e1o C\u00e1o An Ninh","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/tin-tuc\/cisa-them-ba-lo-hong-moi-vao-danh-sach-nguy-hiem-nhat-cua-ho-nhung-dieu-ban-can-biet\/","og_locale":"vi_VN","og_type":"article","og_title":"CISA Adds Three New Vulnerabilities to Their \"Most Dangerous\" List: What You Need to Know | Security Briefing","og_description":"The Cybersecurity and Infrastructure Security Agency (CISA) just announced the latest Known Exploited Vulnerabilities (KEV) Catalog with three new security weaknesses that hackers are currently exploiting to hack into systems.&hellip; Continue reading CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know","og_url":"https:\/\/securitybriefing.net\/vi\/tin-tuc\/cisa-them-ba-lo-hong-moi-vao-danh-sach-nguy-hiem-nhat-cua-ho-nhung-dieu-ban-can-biet\/","og_site_name":"Security Briefing","article_published_time":"2025-03-19T21:49:44+00:00","article_modified_time":"2025-03-19T21:49:48+00:00","og_image":[{"width":966,"height":425,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"C\u00e9sar Daniel Barreto","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"5 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know","datePublished":"2025-03-19T21:49:44+00:00","dateModified":"2025-03-19T21:49:48+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"},"wordCount":757,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","articleSection":["News"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/","url":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/","name":"CISA Th\u00eam Ba L\u1ed7 H\u1ed5ng M\u1edbi V\u00e0o Danh S\u00e1ch \"Nguy Hi\u1ec3m Nh\u1ea5t\" C\u1ee7a H\u1ecd: Nh\u1eefng \u0110i\u1ec1u B\u1ea1n C\u1ea7n Bi\u1ebft | B\u00e1o C\u00e1o An Ninh","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","datePublished":"2025-03-19T21:49:44+00:00","dateModified":"2025-03-19T21:49:48+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/03\/CISA-Adds-Three-New-Vulnerabilities-to-Their-Most-Dangerous-List.jpg","width":966,"height":425,"caption":"CISA Adds Three New Vulnerabilities to Their Most Dangerous List"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-three-new-vulnerabilities-to-their-most-dangerous-list-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"CISA Adds Three New Vulnerabilities to Their &#8220;Most Dangerous&#8221; List: What You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto l\u00e0 m\u1ed9t nh\u00e0 v\u0103n v\u00e0 chuy\u00ean gia an ninh m\u1ea1ng \u0111\u01b0\u1ee3c k\u00ednh tr\u1ecdng, n\u1ed5i ti\u1ebfng v\u1edbi ki\u1ebfn th\u1ee9c s\u00e2u r\u1ed9ng v\u00e0 kh\u1ea3 n\u0103ng \u0111\u01a1n gi\u1ea3n h\u00f3a c\u00e1c ch\u1ee7 \u0111\u1ec1 an ninh m\u1ea1ng ph\u1ee9c t\u1ea1p. V\u1edbi kinh nghi\u1ec7m s\u00e2u r\u1ed9ng v\u1ec1 b\u1ea3o m\u1eadt m\u1ea1ng v\u00e0 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u, \u00f4ng th\u01b0\u1eddng xuy\u00ean \u0111\u00f3ng g\u00f3p c\u00e1c b\u00e0i vi\u1ebft v\u00e0 ph\u00e2n t\u00edch s\u00e2u s\u1eafc v\u1ec1 c\u00e1c xu h\u01b0\u1edbng an ninh m\u1ea1ng m\u1edbi nh\u1ea5t, gi\u00e1o d\u1ee5c c\u1ea3 chuy\u00ean gia v\u00e0 c\u00f4ng ch\u00fang.","url":"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/3572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=3572"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/3572\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/3573"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=3572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=3572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=3572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}