GoBrute½©Ê¬ÍøÂç½èAIÈõµã¹¥»÷¼ÓÃÜÇ®±ÒÏîÄ¿
Ðû²¼Ê±¼ä 2026-01-081. GoBrute½©Ê¬ÍøÂç½èAIÈõµã¹¥»÷¼ÓÃÜÇ®±ÒÏîÄ¿
1ÔÂ7ÈÕ£¬£¬£¬½üÆÚ£¬£¬£¬GoBruteforcer£¨ÓÖ³ÆGoBrut£©½©Ê¬ÍøÂçÕë¶Ô̻¶ЧÀÍÆ÷ÉϵļÓÃÜÇ®±Ò¼°Çø¿éÁ´ÏîÄ¿Êý¾Ý¿âÌᳫÐÂÒ»ÂÖ¹¥»÷£¬£¬£¬Æä½¹µãÌØÕ÷ΪʹÓÃÈ˹¤ÖÇÄÜÌìÉúµÄЧÀÍÆ÷ÉèÖÃʾÀýµ¼ÖµÄÈõÃÜÂëÎó²î£¬£¬£¬ÒÔ¼°¹ýʱ¼Ü¹¹ÈçXAMPPµÄĬÈÏÆ¾Ö¤Î£º¦¡£¡£¡£¸Ã¶ñÒâÈí¼þ»ùÓÚGolang¿ª·¢£¬£¬£¬Ö÷ÒªÃé×¼FTP¡¢MySQL¡¢PostgreSQL¼°phpMyAdminЧÀÍ£¬£¬£¬Í¨¹ý±»ÈëÇÖµÄLinuxЧÀÍÆ÷ɨÃèËæ»ú¹«¹²IPµØµã£¬£¬£¬Ö´Ðб©Á¦ÆÆ½âµÇ¼¹¥»÷¡£¡£¡£Check PointÑо¿ÏÔʾ£¬£¬£¬³¬50,000Ì¨ÃæÏò»¥ÁªÍøµÄЧÀÍÆ÷Ò×Êܹ¥»÷£¬£¬£¬³õʼÈëÇÖ¶àͨ¹ýXAMPPЧÀÍÆ÷µÄFTPʵÏÖ£¬£¬£¬ÒòÖÎÀíÔ±³£±£´æÄ¬ÈÏÈõÃÜÂë¡£¡£¡£¹¥»÷Õß»ñÈ¡»á¼ûȨÏ޺󣬣¬£¬Í¨³£½«Web shellÉÏ´«ÖÁWeb¸ùĿ¼£¬£¬£¬»òͨ¹ýÉèÖùýʧµÄMySQL/phpMyAdminÉÏ´«£¬£¬£¬ÐγÉѬȾÁ´£ºÏÂÔØÆ÷»ñÈ¡IRC»úеÈË£¬£¬£¬×îÖÕ¼ÓÔØ±©Á¦ÆÆ½âÄ£¿£¿£¿£¿£¿£¿é¡£¡£¡£¹¥»÷Æô¶¯ºó£¬£¬£¬ÔÚx86_64¼Ü¹¹ÉÏ¿ÉÆô¶¯¶à´ï95¸öỊ̈߳¬£¬£¬ÑÓ³Ù10-400ÃëºóɨÃèËæ»úIP¹æÄ££¬£¬£¬Ìø¹ý˽ÓÐÍøÂç¡¢AWSÔÆ¼°ÃÀ¹úÕþ¸®ÍøÂç¡£¡£¡£Ã¿¸öÊÂÇéÀú³ÌÌìÉúËæ»úIPv4µØµã£¬£¬£¬Ì½²âЧÀͶ˿ڲ¢±éÀúƾ֤ÁÐ±í£¬£¬£¬Î¬³ÖÉ趨²¢·¢¼¶±ð¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-gobruteforcer-attack-wave-targets-crypto-blockchain-projects/
2. jsPDF¿âÏÖ¸ßΣÎó²îÍþвJavaScriptÓ¦ÓÃÇå¾²
1ÔÂ7ÈÕ£¬£¬£¬ÆÕ±éÓÃÓÚJavaScriptÓ¦ÓóÌÐòÌìÉúPDFµÄjsPDF¿â¿ËÈÕÆØ³öÑÏÖØÇå¾²Îó²î£¨±àºÅCVE-2025-68428£©£¬£¬£¬ÑÏÖØÐÔÆÀ·Ö´ï9.2¡£¡£¡£¸ÃÎó²îÔ´ÓÚ4.0°æ±¾Ç°jsPDFµÄNode.js¹¹½¨°æ±¾Öб£´æµÄÍâµØÎļþ°üÀ¨Óë·¾¶±éÀúΣº¦£¬£¬£¬µ±Óû§¿É¿ØÊäÈëδÂÄÀúÖ¤¼´×÷ΪÎļþ·¾¶×ª´ï¸øloadFileº¯Êýʱ£¬£¬£¬¹¥»÷Õ߿ɽè´Ë¶ÁÈ¡ÍâµØÎļþϵͳÃô¸ÐÊý¾Ý²¢Ç¶ÈëÌìÉúµÄPDFÎļþ£¬£¬£¬ÊµÏÖÊý¾ÝÇÔÈ¡¡£¡£¡£Îó²îÓ°Ïì¹æÄ£Ã÷È·Ö¸ÏòjsPDFµÄNode.js°æ±¾Îļþ£¬£¬£¬Éæ¼°loadFileº¯Êý¼°Å²Óøú¯ÊýµÄÆäËûÒªÁì¡£¡£¡£Ó¦ÓÃÇå¾²¹«Ë¾Endor LabsÆÊÎöÖ¸³ö£¬£¬£¬ÈôÎļþ·¾¶ÎªÓ²±àÂë¡¢Ô´×Ô¿ÉÐÅÉèÖûò½ÓÄÉÑÏ¿áÔÊÐíÁбíÑéÖ¤£¬£¬£¬ÔòʹÓÃÄѶÈÏÔÖø½µµÍ£»£»£»£»£»µ«¼øÓÚjsPDFÔÚnpm×¢²á±íÿÖܳ¬350Íò´ÎÏÂÔØµÄÆÕ±éʹÓÃÁ¿£¬£¬£¬¸ÃÎó²îÈÔ±»ÆÀ¹ÀΪÒ×±»Æð¾¢Ê¹ÓõĸßΣº¦È±ÏÝ¡£¡£¡£ÐÞ¸´¼Æ»®ÒÑÔÚjsPDF 4.0.0°æ±¾ÖÐʵÑ飬£¬£¬Í¨¹ýĬÈÏÏÞÖÆÎļþϵͳ»á¼û²¢ÒÀÀµNode.jsȨÏÞģʽ×è¶ÏÎó²î·¾¶¡£¡£¡£
https://www.bleepingcomputer.com/news/security/critical-jspdf-flaw-lets-hackers-steal-secrets-via-generated-pdfs/
3. n8nƽ̨"Ni8mare"¸ßΣ©¶¼òª¶³Ì´úÂëÖ´ÐÐΣº¦
1ÔÂ7ÈÕ£¬£¬£¬¿ËÈÕ£¬£¬£¬¿ªÔ´ÊÂÇéÁ÷×Ô¶¯»¯Æ½Ì¨n8n±»ÆØ³ö±àºÅΪCVE-2026-21858µÄ"Ni8mare"¸ßΣÎó²î£¬£¬£¬ÑÏÖØË®Æ½ÆÀ·Ö´ïÂú·Ö10·Ö¡£¡£¡£¸ÃÎó²îÓ°ÏìÈ«Çò³¬10Íǫ̀n8nЧÀÍÆ÷ʵÀý£¬£¬£¬¹¥»÷Õß¿ÉÎÞÐèÉí·ÝÑéÖ¤Ô¶³Ì¿ØÖÆÍâµØ°²ÅŵÄn8nƽ̨£¬£¬£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý»òÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£n8n×÷ΪAIÁìÓòÈÈÃŹ¤¾ß£¬£¬£¬Ã¿ÖÜnpmÏÂÔØÁ¿³¬5Íò´Î£¬£¬£¬Docker HubÀÈ¡Á¿ÆÆÒڴΣ¬£¬£¬Ö÷ÒªÓÃÓÚÅþÁ¬Ó¦Óá¢API¼°Ð§À͹¹½¨×Ô¶¯»¯ÊÂÇéÁ÷£¬£¬£¬²¢Ö§³ÖÓëLLMЧÀͼ¯³É¡£¡£¡£Îó²îȪԴÔÚÓÚn8n´¦Öóͷ£webhookÇëÇóʱµÄÄÚÈÝÀàÐÍ»ìÏý»úÖÆ£¬£¬£¬µ±ÇëÇóµÄContent-Type±»Î±ÔìΪ·Çmultipart/form-data£¨Èçapplication/json£©Ê±£¬£¬£¬ÏµÍ³»áÈÆ¹ýÎļþÉÏ´«ÆÊÎöÆ÷µÄÇå¾²·À»¤£¬£¬£¬Ö±½Ó´¦Öóͷ£Îļþ×ֶζøÎ´ÑéÖ¤ÊÇ·ñΪÓÐÓÃÉÏ´«¡£¡£¡£Õâʹ¹¥»÷Õß¿Éͨ¹ý²Ù¿Øreq.body.files¹¤¾ßµÄfilepath²ÎÊý£¬£¬£¬¶ÁÈ¡n8nʵÀýÉϵÄí§ÒâÍâµØÎļþ£¬£¬£¬°üÀ¨´æ´¢APIÃÜÔ¿¡¢OAuthÁîÅÆ¡¢Êý¾Ý¿âƾ֤¡¢ÔÆ´æ´¢»á¼ûȨÏÞµÈÃô¸ÐÐÅÏ¢µÄÉèÖÃÎļþ¡£¡£¡£ÏÖÔÚ£¬£¬£¬n8nÒÑÐû²¼1.121.0¼°ÒÔÉÏÐÞ¸´°æ±¾£¬£¬£¬½¨ÒéÓû§Á¬Ã¦Éý¼¶¡£¡£¡£
https://www.bleepingcomputer.com/news/security/max-severity-ni8mare-flaw-lets-hackers-hijack-n8n-servers/
4. °²×¿¶ñÒâÈí¼þʹÓÃNFCÊÖÒÕʵÏַǽӴ¥Ê½Ö§¸¶Ú²Æ
1ÔÂ8ÈÕ£¬£¬£¬Group-IB×îб¨¸æÕ¹ÏÖ£¬£¬£¬Ò»ÖÖÐÂÐͰ²×¿¶ñÒâÈí¼þÕýͨ¹ýTelegramÖÐÎÄÍøÂç·¸·¨ÉçÇøÈö²¥£¬£¬£¬Ê¹¹¥»÷ÕßÎÞÐèÎïÀí½Ó´¥Êܺ¦ÕßÒøÐп¨¼´¿ÉÍê³É·Ç½Ó´¥Ê½Ö§¸¶Ú²Æ¡£¡£¡£ÏÖÔÚÒÑ·¢Ã÷54¸ö¶ñÒâAPKÑù±¾£¬£¬£¬¶àαװ³ÉÕýµ±½ðÈÚ»òÖ§¸¶Ó¦Ó㬣¬£¬Í¨¹ý¶ÌÐÅ/ÓïÒô´¹ÂÚÓÕÆÓû§×°Ö㬣¬£¬²¢ÒªÇó½«Ö§¸¶¿¨Ìù½üÊÖ»úÒÔ¼¤»îNFCÊý¾Ý²¶»ñ¹¦Ð§¡£¡£¡£¸Ã¶ñÒâÈí¼þ½ÓÄÉ¡°Ë«Ó¦ÓÃÐ×÷¡±Ä£Ê½£ºÊܺ¦ÕßÊÖ»úÖеġ°¶ÁÈ¡Æ÷¡±Ó¦Óò¶»ñNFC¿¨Êý¾Ýºó£¬£¬£¬Í¨¹ýC2ЧÀÍÆ÷´«ÊäÖÁ·¸·¨·Ö×Ó¿ØÖƵÄ×°±¸£»£»£»£»£»¹¥»÷ÕßʹÓá°Çû÷Æ÷¡±Ó¦ÓÃÔÚ²»·¨POSÖÕ¶ËÍê³ÉÉúÒ⣬£¬£¬»òͨ¹ýÒÆ¶¯Ç®°üÏ´Ç®ÍøÂçÔÚ¶à¹úʵÌåµê¹ºÎ£¬£¬ÊµÏÖ×ʽð͵ȡ¡£¡£¡£²¿·Ö°¸ÀýÏÔʾ£¬£¬£¬·¸·¨·Ö×Ó¿ÉÍêÈ«ÈÆ¹ýÓëÊܺ¦ÕßÖ±½Ó½Ó´¥£¬£¬£¬½öͨ¹ýÔ¤¼ÓÔØ±»µÁ¿¨Êý¾ÝµÄÒÆ¶¯Ç®°ü¼´¿ÉÍê³ÉÉúÒâ¡£¡£¡£TelegramÉϵÄTX-NFC¡¢X-NFC¡¢NFU PayµÈ¹©Ó¦É̹ûÕæÏúÊÛ´ËÀà¶ñÒâÈí¼þ£¬£¬£¬½ÓÄÉ¶ÌÆÚÊÔÓÃÖÁ¶àÔ¶©ÔĵÄÊÕ·Ñģʽ¡£¡£¡£
https://www.infosecurity-magazine.com/news/ghost-tap-malware-remote-nfc-fraud/
5. µÂÖÝGulshan¹«Ë¾37.7Íò¿Í»§Êý¾ÝÔâй¶
1ÔÂ7ÈÕ£¬£¬£¬×ܲ¿Î»Óڵ¿ËÈøË¹ÖݵÄGulshan Management Services, Inc.¹«Ë¾¿ËÈÕ֤ʵ±¬·¢´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬£¬£¬Ó°ÏìÁè¼Ý377,000Ãû¿Í»§¼°Ô±¹¤¡£¡£¡£¸Ã¹«Ë¾ÔËÓª×ÅÈ«ÃÀ150Óà¼ÒHandi PlusºÍHandi StopÆ·ÅÆ¼ÓÓÍÕ¾Óë±ãµ±µê£¬£¬£¬ÒòÉæ¼°ÏûºÄÕßÖ§¸¶¡¢Ô±¹¤µµ°¸¼°¹©Ó¦Á´Êý¾Ý£¬£¬£¬³ÉΪ¹¥»÷Ä¿µÄ¡£¡£¡£¾ÝÏòÃåÒòÖÝ×ÜÉó²é³¤Ìá½»µÄÎļþÅû¶£¬£¬£¬2025Äê9ÔÂ17ÈÕÖÁ27ÈÕʱ´ú£¬£¬£¬¹¥»÷Õß²»·¨»á¼ûÁ˸ù«Ë¾Íⲿϵͳ£¬£¬£¬Îó²îÖ±ÖÁ27Èղű»·¢Ã÷¡£¡£¡£È»¶ø£¬£¬£¬ÊÜÓ°ÏìСÎÒ˽¼ÒÖ±ÖÁ2026Äê1ÔÂ5ÈÕ²ÅÊÕµ½ÊéÃæÍ¨Öª£¬£¬£¬¾àÀëÊÂÎñ¿¢ÊÂÒѳ¬Èý¸öÔ£¬£¬£¬Ô¶³¬Ö´·¨»®¶¨µÄת´ïʱÏÞ¡£¡£¡£´Ë´ÎÐ¹Â¶Éæ¼°Ãô¸ÐÐÅÏ¢°üÀ¨ÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂë¡¢¼Ýʻ֤ºÅ¡¢Õþ¸®ID£¨È绤ÕÕ/ÖÝÉí·ÝÖ¤£©¡¢ÒøÐÐÕ˺ż°ÐÅÓÿ¨/½è¼Ç¿¨ºÅÂëµÈ£¬£¬£¬ÏÔÖøÔöÌíÉí·Ý͵ÇÔΣº¦¡£¡£¡£µÂ¿ËÈøË¹ÖÝ×ÜÉó²éÓŵãµÄ×ÔÁ¦±¨¸æ½øÒ»²½Ö¤Êµ£¬£¬£¬²ÆÎñÐÅÏ¢ÓëÉí·Ý±êʶÊý¾ÝµÄ̻¶ʹÊܺ¦ÕßÃæÁÙ½ðÈÚڲƼ°Éí·ÝðÓõÄË«ÖØÍþв¡£¡£¡£
https://hackread.com/data-breach-us-gas-stations-company/
6. Óʼþ·ÓÉÉèÖÃÎó²î³É´¹ÂÚ¹¥»÷ÐÂ;¾¶
1ÔÂ7ÈÕ£¬£¬£¬Î¢Èí×îб¨¸æÕ¹ÏÖ£¬£¬£¬×Ô2025Äê5ÔÂÆð£¬£¬£¬ÍøÂç´¹ÂÚ¹¥»÷ÕßÕýʹÓÃÉèÖùýʧµÄÓʼþ·ÓɺÍÓÕÆ±£»£»£»£»£»¤²½·¥£¬£¬£¬Î±Ôì×éÖ¯»ú¹¹ÓòÃû·¢ËÍ¿´ËÆÄÚ²¿ÓʼþµÄ´¹ÂÚÐÅÏ¢£¬£¬£¬²¢Í¨¹ýTycoon2FAµÈÉí·ÝÈÏÖ¤¼´Ð§ÀÍ£¨PhaaS£©Æ½Ì¨ÇÔȡƾ֤¡£¡£¡£´ËÀ๥»÷ͨ¹ýÖØºàáéÓɳ¡¾°ºÍ±¡Èõ·À»¤²½·¥£¬£¬£¬Ê¹ÓʼþÖ÷ÌâαװÕëÑÔÒôÓʼþ¡¢¹²ÏíÎĵµ¡¢ÈËÁ¦×ÊԴ֪ͨ¡¢ÃÜÂëÖØÖõȳ£¼û³¡¾°£¬£¬£¬ÓÕµ¼Êܺ¦Õßµã»÷Á´½Ó½øÈëÐéαÑéÖ¤ÂëÒ³Ãæ£¬£¬£¬×îÖÕÌø×ªÖÁTycoon2FA´¹ÂÚ½çÃæ£¬£¬£¬²»µ«ÇÔÈ¡Õ˺ÅÃÜÂ룬£¬£¬»¹¿ÉÈÆ¹ý¶àÒòËØÈÏÖ¤£¨MFA£©ÊµÑé½ðÈÚÕ©Æ¡£¡£¡£¹¥»÷ÀÖ³ÉÒªº¦ÔÚÓÚÄ¿µÄ×â»§µÄÓʼþϵͳ±£´æÉèÖÃȱÏÝ£ºMX¼Í¼δָÏòOffice 365¡¢DMARCÕ½ÂÔÉèΪ¡°ÎÞ¡±»ò¿íËÉģʽ¡¢SPFÑé֤δÆôÓÃӲʧ°Ü¡¢DKIMÊðÃûȱʧ»òµÚÈý·½ÅþÁ¬Æ÷ÉèÖùýʧ¡£¡£¡£ÕâЩÎó²îʹ¹¥»÷ÕßÄÜαÔì¡°·¢¼þÈË¡±Óë¡°ÊÕ¼þÈË¡±ÏàͬµØµãµÄÓʼþ£¬£¬£¬ÖÆÔì¡°ÄÚ²¿Í¨Ñ¶¡±¼ÙÏ󡣡£¡£Ö»¹ÜÓʼþÍ·¿ÉÄÜÏÔʾSPF/DMARCÑé֤ʧ°Ü¡¢È±ÉÙDKIMÊðÃû»òÀ´×ÔÄäÃûÍⲿЧÀÍÆ÷£¬£¬£¬µ«ÔÚ·À»¤È±Ê§µÄÇéÐÎÖÐÈÔÄÜÖ±´ïÓû§ÊÕ¼þÏä¡£¡£¡£
https://securityaffairs.com/186638/hacking/misconfigured-email-routing-enables-internal-spoofed-phishing.html


¾©¹«Íø°²±¸11010802024551ºÅ