¹È¸èGemini¼ä½ÓÌáÐÑ×¢ÈëÎó²îÆØ¹â
Ðû²¼Ê±¼ä 2026-01-211. ¹È¸èGemini¼ä½ÓÌáÐÑ×¢ÈëÎó²îÆØ¹â
1ÔÂ19ÈÕ£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶һÏîʹÓüä½ÓÌáÐÑ×¢ÈëÊÖÒÕ¹¥»÷¹È¸èGeminiµÄÎó²î£¬£¬£¬£¬£¬¿ÉÈÆ¹ýÊÚȨ·À»¤»úÖÆ£¬£¬£¬£¬£¬½«¹È¸èÈÕÀú×÷ΪÊý¾ÝÌáȡͨµÀ¡£¡£¡£¡£¡£Miggo SecurityÑо¿Ö÷¹ÜLiad EliyahuÖ¸³ö£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÔÚÈÕÀúÔ¼ÇëÖÐǶÈë¶ñÒâ×ÔÈ»ÓïÑÔÌáÐÑ£¬£¬£¬£¬£¬ÎÞÐèÓû§Ö±½Ó½»»¥¼´¿É»á¼û˽È˾ۻáÊý¾Ý²¢½¨ÉèÓÕÆÐÔÊÂÎñ¡£¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚ¹¥»÷Õß·¢ËͰüÀ¨ÌØÖÆÌáÐѵÄÈÕÀúÔ¼Çë¡£¡£¡£¡£¡£µ±Óû§ÏòGeminiѯÎÊÈÕ³ÌÎÊÌâʱ£¬£¬£¬£¬£¬AI»áÆÊÎöÊÂÎñÐÎòÖеĶñÒâÌáÐÑ£¬£¬£¬£¬£¬»ã×ÜÓû§Ìض¨ÈÕÆÚµÄ¾Û»áÊý¾Ý£¬£¬£¬£¬£¬½¨ÉèÐÂÈÕÀúÊÂÎñ²¢Ð´ÈëÕªÒª¡£¡£¡£¡£¡£ÔÚÐí¶àÆóÒµÉèÖÃÖУ¬£¬£¬£¬£¬¸ÃÐÂÊÂÎñ¶Ô¹¥»÷Õ߿ɼû£¬£¬£¬£¬£¬Ê¹ÆäÄÜÇÔȡ˽ÈËÊý¾Ý¶øÓû§¾ø²»ÖªÇé¡£¡£¡£¡£¡£´Ë´ÎÅû¶ÕýÖµÆäËûAIÇå¾²Îó²îƵ·¢Ö®¼Ê¡£¡£¡£¡£¡£VaronisÐÎòµÄ¡°Reprompt¡±¹¥»÷¿ÉÈÆ¹ýÆóÒµÇå¾²¿ØÖÆÌáÈ¡Microsoft CopilotÃô¸ÐÊý¾Ý£»£»£»£»£»XM CyberÔڹȸèÔÆVertex AIºÍRayÖз¢Ã÷ȨÏÞÌáÉýÎó²î£¬£¬£¬£¬£¬ÔÊÐíµÍȨÏÞ¹¥»÷ÕßÐ®ÖÆ¸ßȨÏÞЧÀÍÊðÀí£»£»£»£»£»The Librarian¹¤¾ß±£´æ¶à¸öÎó²î£¨CVE-2026-0612µÈ£©£¬£¬£¬£¬£¬¿Éй¶ÄÚ²¿»ù´¡ÉèÊ©ÐÅÏ¢£»£»£»£»£»ÏµÍ³ÌáÐÑÌáÈ¡Îó²îͨ¹ýLLMÖúÊÖÌáȡϵͳÌáÐÑ£»£»£»£»£»Claude CodeÊг¡±£´æ¶ñÒâ²å¼þ¹¥»÷£»£»£»£»£»Cursor±£´æRCEÎó²î£¨CVE-2026-22708£©£¬£¬£¬£¬£¬¿ÉʹÓÃShellÏÂÁîʵÏÖÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£
https://thehackernews.com/2026/01/google-gemini-prompt-injection-flaw.html
2. EverestÀÕË÷Èí¼þ×éÖ¯Ðû³ÆÈëÇÖÂóµ±ÀÍÓ¡¶È¹«Ë¾
1ÔÂ20ÈÕ£¬£¬£¬£¬£¬EverestÀÕË÷Èí¼þ×éÖ¯ÔÚÆä°µÍøÐ¹Â¶ÍøÕ¾Ðû³ÆÒÑÈëÇÖÂóµ±ÀÍÓ¡¶È¹«Ë¾£¬£¬£¬£¬£¬²¢ÇÔÈ¡¸ß´ï861GBµÄ¿Í»§Êý¾Ý¼°¹«Ë¾ÄÚ²¿Îļþ¡£¡£¡£¡£¡£¸Ã×é֯ͨ¹ýÐû²¼ÄÚ²¿½ØÍ¼×ôÖ¤Æä˵·¨£¬£¬£¬£¬£¬½ØÍ¼ÏÔÊ¾Éæ¼°2023ÖÁ2026ÄêµÄ²ÆÎñ±¨¸æ¡¢É󼯏ú×ټͼ¡¢±¾Ç®¸ú×Ù±í¡¢ERPǨáãÎļþ¡¢¶¨¼ÛÊý¾Ý¼°Ãô¸ÐÄÚ²¿Í¨Ñ¶¼Í¼¡£¡£¡£¡£¡£¶à¸öĿ¼°´ÔÂϸ·Ö£¬£¬£¬£¬£¬ÌåÏÖÆä¶Ô»á¼Æ»òÆóÒµ×ÊÔ´ÍýÏëϵͳӵÓнṹ»¯»á¼ûȨÏÞ¡£¡£¡£¡£¡£ÆäÖС°Í¶×ÊÕßÐÅÏ¢¡±Ä¿Â¼¿ÉÄܰüÀ¨¶Ê»ἶ±ðÉñÃØ×ÊÁÏ£¬£¬£¬£¬£¬¶ø¡°ÁªÏµÈËÊý¾Ý¿â¡±µç×Ó±í¸ñÔòÏêϸ¼Í¼ÁËÃÀ¹ú¡¢Ó¢¹ú¡¢ÐÂ¼ÓÆÂºÍÓ¡¶ÈµÈµØÍ¶×ÊÕß¼°ÉÌҵͬ°éµÄÐÕÃû¡¢µØµã¡¢µç»°¼°ÓÊÏä¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÄÚ²¿·ÖµêÊý¾Ý°üÀ¨Ë¾ÀíÐÕÃû¡¢mcdonaldsindia.comÓÊÏä¼°ÊýÊ®¼ÒÃŵêµÄÖ±½ÓÁªÏµµç»°¡£¡£¡£¡£¡£EverestÒªÇóÂóµ±ÀÍÓ¡¶È¹«Ë¾ÔÚÁ½ÌìÄÚ»ØÓ¦£¬£¬£¬£¬£¬µ«×èÖ¹ÏÖÔڸù«Ë¾ÉÐδÐû²¼¹Ù·½ÉùÃ÷£¬£¬£¬£¬£¬ÊÂÎñÕæÊµÐÔÈÔÐè½øÒ»²½Ö¤Êµ¡£¡£¡£¡£¡£
https://hackread.com/everest-ransomware-mcdonalds-india-breach-customer-data/
3. ACF Extended¸ßΣÎó²îÒý´ó¹æÄ£Õì̽Σº¦
1ÔÂ20ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬WordPressµÄAdvanced Custom Fields: Extended£¨ACF Extended£©²å¼þ±»ÆØ±£´æÑÏÖØÇå¾²Îó²îCVE-2025-14533£¬£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÔ¶³ÌʹÓøÃÎó²î»ñÈ¡ÖÎÀíȨÏÞ¡£¡£¡£¡£¡£¸Ã²å¼þÏÖÔÚÒÑÔÚ10Íò¸öÍøÕ¾ÉÏÆôÓ㬣¬£¬£¬£¬×÷ΪAdvanced Custom Fields£¨ACF£©µÄÀ©Õ¹²å¼þ£¬£¬£¬£¬£¬Îª¿ª·¢Ö°Ô±ºÍ¸ß¼¶ÍøÕ¾¹¹½¨ÕßÌá¹©ÌØÊ⹦Ч¡£¡£¡£¡£¡£Îó²î±£´æÓÚACF Extended 0.9.2.1¼°¸üÔç°æ±¾ÖУ¬£¬£¬£¬£¬Í¨¹ýÀÄÓòå¼þµÄ¡°²åÈëÓû§/¸üÐÂÓû§¡±±íµ¥²Ù×÷ʵÏÖ¡£¡£¡£¡£¡£ÎÊÌâȪԴÔÚÓÚ±íµ¥Óû§½¨Éè»ò¸üÐÂÀú³ÌÖУ¬£¬£¬£¬£¬½ÇÉ«ÏÞÖÆÎ´±»Ç¿ÖÆÖ´ÐУ¬£¬£¬£¬£¬×ÝÈ»×Ö¶ÎÉèÖÃÖÐ׼ȷÉèÖÃÁ˽ÇÉ«ÏÞÖÆ£¬£¬£¬£¬£¬¹¥»÷ÕßÈÔ¿Éí§ÒâÉèÖÃÓû§½ÇÉ«£¬£¬£¬£¬£¬´Ó¶øÍêÈ«¿ØÖÆÍøÕ¾¡£¡£¡£¡£¡£¸ÃÎó²îÓÉÇå¾²Ñо¿Ô±Andrea BocchettiÓÚ2025Äê12ÔÂ10ÈÕ·¢Ã÷²¢±¨¸æ£¬£¬£¬£¬£¬¹©Ó¦ÉÌÔÚËÄÌìºóÐû²¼0.9.2.2°æ±¾ÐÞ¸´¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬Æ¾Ö¤wordpress.orgÏÂÔØÍ³¼Æ£¬£¬£¬£¬£¬×ÔÐÞ¸´ÒÔÀ´Ô¼5ÍòÓû§ÏÂÔØÁ˸òå¼þ£¬£¬£¬£¬£¬¼ÙÉèËùÓÐÏÂÔØ¾ùΪ×îа汾£¬£¬£¬£¬£¬ÈÔÓÐÏàͬÊýÄ¿ÍøÕ¾ÃæÁÙ¹¥»÷Σº¦¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/acf-plugin-bug-gives-hackers-admin-on-50-000-wordpress-sites/
4. VoidLinkÔÆ¶ñÒâÈí¼þÌåÏÖ³öÏÔ×ŵÄAIÌìÉúÌØÕ÷
1ÔÂ20ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬Check Point ResearchÅû¶ÁËÒÔÔÆÎªÖÐÐĵÄVoidLink¶ñÒâÈí¼þ¿ò¼ÜµÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬¸Ã¿ò¼Ü±»ÆÀ¹ÀΪÓÉÐÑÄ¿¶à±à³ÌÓïÑÔµÄÖйú¿ª·¢Õß½èÖúÈ˹¤ÖÇÄÜÄ£×Ó¿ª·¢¡£¡£¡£¡£¡£×÷Ϊ¸ß¼¶Linux¶ñÒâÈí¼þ£¬£¬£¬£¬£¬VoidLink°üÀ¨×Ô½ç˵¼ÓÔØÆ÷¡¢Ö²Èë³ÌÐò¡¢rootkit¹æ±ÜÄ£¿£¿£¿£¿£¿£¿é¼°ÊýÊ®¸ö¹¦Ð§À©Õ¹²å¼þ£¬£¬£¬£¬£¬Æä¿ª·¢ÖÜÆÚÖ®¶Ì¡¢´úÂëÁ¿Ö®¾ÞÒý·¢Çå¾²½ç¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£Ñо¿Ö¸³ö£¬£¬£¬£¬£¬VoidLinkµÄ¿ª·¢Ê¼ÓÚ2025Äê11ÔÂÏÂÑ®£¬£¬£¬£¬£¬¿ª·¢ÕßתÏòʹÓÃǶÈëAIÖÐÐÄIDE TRAEµÄÖÇÄÜÖúÊÖTRAE SOLO¡£¡£¡£¡£¡£ÓÉÓÚЧÀÍÆ÷±£´æ¿ª·ÅĿ¼Îó²î£¬£¬£¬£¬£¬¿ª·¢Àú³ÌÖеÄÔ´´úÂë¡¢Îĵµ¡¢³å´ÌÍýÏë¼°ÄÚ²¿ÏîÄ¿½á¹¹±»ÒâÍâй¶¡£¡£¡£¡£¡£Check Point̫ͨ¹ýÎöÕâЩÎļþ·¢Ã÷£¬£¬£¬£¬£¬¿ª·¢Õß½ÓÄɹ淶Çý¶¯¿ª·¢£¨SDD£©Ä£Ê½£¬£¬£¬£¬£¬Í¨¹ýAIÌìÉúº¸Ç¼Ü¹¹¡¢µü´úºÍ±ê×¼µÄ¶àÍŶӿª·¢ÍýÏë¡£¡£¡£¡£¡£Ö»¹ÜÏîÄ¿ÍýÏëÖÜÆÚΪ16-30ÖÜ£¬£¬£¬£¬£¬µ«ÏÖʵ½öÓÃÒ»Öܼ´ÊµÏÖ¿ÉÔËÐа汾£¬£¬£¬£¬£¬ÖÁ2025Äê12Ô³õ´úÂëÁ¿ÒÑ´ï88,000ÐС£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/voidlink-cloud-malware-shows-clear-signs-of-being-ai-generated/
5. TP-LinkÐÞ¸ßΣÎó²î£º32¿îÆóÒµÉãÏñÍ·Á¢×ã·ÝÑé֤Σº¦
1ÔÂ20ÈÕ£¬£¬£¬£¬£¬TP-Link½üÆÚÐÞ¸´Á˱àºÅΪCVE-2026-0629£¨CVSSÆÀ·Ö8.7£©µÄ¸ßΣÎó²î£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÆäVIGI²úÆ·ÏßÖÐÁè¼Ý32¿îVIGI CºÍVIGI InSightÆóÒµ¼¶CCTVÉãÏñÍ·Ðͺ𣡣¡£¡£¡£Îó²î½¹µãÔÚÓÚÍâµØWeb½çÃæµÄÃÜÂë»Ö¸´¹¦Ð§±£´æÉí·ÝÑéÖ¤ÈÆ¹ýȱÏÝ£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓôËÎó²îͨ¹ýʹÓÿͻ§¶Ë״̬£¬£¬£¬£¬£¬ÔÚδ¾ÍâµØÍøÂçÉí·ÝÑéÖ¤µÄÇéÐÎÏÂÖ±½ÓÖØÖÃÖÎÀíÔ±ÃÜÂ룬£¬£¬£¬£¬´Ó¶ø»ñµÃ×°±¸µÄÍêÈ«ÖÎÀíȨÏÞ¡£¡£¡£¡£¡£¾ÝÇ徲ͨ¸æÅû¶£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐí¾ÖÓòÍø¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤»úÖÆ£¬£¬£¬£¬£¬Ö±½ÓÐÞ¸ÄÖÎÀíÔ±ÕË»§ÃÜÂë¡£¡£¡£¡£¡£Ò»µ©ÀÖ³ÉʹÓ㬣¬£¬£¬£¬¹¥»÷Õß²»µ«ÄÜ¿ØÖÆÉãÏñÍ·ÉèÖᢻá¼ûʵʱ¼°ÀúÊ·ÊÓÆµÊý¾Ý£¬£¬£¬£¬£¬»¹¿É½«×°±¸ÄÉÈë½©Ê¬ÍøÂçÌᳫDDoS¹¥»÷£¬£¬£¬£¬£¬»ò¸Ä¶¯¼à¿ØÖ¤¾Ý¡¢ÈÅÂÒÆóÒµÔËÓª£¬£¬£¬£¬£¬ÉõÖÁͨ¹ýÉãÏñÍ·×÷ÎªÌø°åÈëÇÖÆóÒµÄÚÍø£¬£¬£¬£¬£¬Òý·¢Ìع¤»î¶¯¡¢ÎïÀíÈëÇÖµÈÑÜÉúΣº¦£¬£¬£¬£¬£¬²¢¿ÉÄÜÒòÇÖÕ¼Òþ˽´¥·¢Ö´·¨Óëî¿Ïµ´¦·Ö¡£¡£¡£¡£¡£
https://securityaffairs.com/187110/hacking/critical-tp-link-vigi-camera-flaw-allowed-remote-takeover-of-surveillance-systems.html
6. "Nomad Leopard"´¹ÂÚ¹¥»÷¾«×¼Õë¶Ô°¢¸»º¹Õþ¸®¹ÍÔ±
1ÔÂ21ÈÕ£¬£¬£¬£¬£¬Ó¡¶ÈÍøÂçÇå¾²¹«Ë¾Seqrite¿ËÈÕÅû¶£¬£¬£¬£¬£¬ºÚ¿ÍÕýͨ¹ýαÔì°¢¸»º¹×ÜÀí°ì¹«ÊÒ¹Ù·½º²ÔýµÄÍøÂç´¹ÂÚÓʼþ£¬£¬£¬£¬£¬¶Ô°¢¸»º¹Õþ¸®¹ÍÔ±Ìᳫ¾«×¼¹¥»÷¡£¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯×Ô2025Äê12ÔÂÆð±»·¢Ã÷£¬£¬£¬£¬£¬¹¥»÷ÕßÈ«ÐÄÉè¼ÆÓÕ¶üÎĵµ£¬£¬£¬£¬£¬ÒÔ×Ú½ÌÎʺòÓ↑ͷ¡¢°üÀ¨²ÆÎñÉ걨ָʾ²¢Î±Ôì¸ß¼¶¹ÙÔ±ÊðÃûµÄ"Õýʽ¹«ë¹"£¬£¬£¬£¬£¬ÓÕʹĿµÄ·¿ªÎļþºóÖ²ÈëFalseCub¶ñÒâÈí¼þ£¬£¬£¬£¬£¬ÊµÏÖÊý¾ÝÇÔÈ¡ÓëÍâ´«¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬¹¥»÷Õß½«GitHub×÷ΪÔÝÊ±ÔØºÉÍÐ¹ÜÆ½Ì¨£¬£¬£¬£¬£¬Í¨¹ý12ÔÂÏÂÑ®½¨ÉèµÄÕ˺ŷַ¢¶ñÒâÎļþ£¬£¬£¬£¬£¬Ðж¯¿¢ÊºóѸËÙɾ³ýÄÚÈÝ¡£¡£¡£¡£¡£¸üÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÔÚScribdÉÏ´«ÁË´ó×ÚÖ´·¨ÓëÐÐÕþÎļþ£¬£¬£¬£¬£¬°üÀ¨°¢¸»º¹Õþ¸®Ö¸Áî¡¢¹ú·À²¿Í¨Ñ¶Îļþ¼°ÃÀ¹úÉæ°¢¸»º¹ºÇ»¤ÈËȨÎļþ£¬£¬£¬£¬£¬ÕâЩÖÊÁÏ»ò³ÉΪδÀ´¹¥»÷µÄ"ÓÕ¶ü¿â"¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃ"Afghan Khan"¼ÙÃû£¬£¬£¬£¬£¬ÔÚPinterest¡¢DailymotionµÈƽ̨»î¶¯£¬£¬£¬£¬£¬²¿·ÖÕ˺ŹØÁª°Í»ù˹̹£¬£¬£¬£¬£¬ÇÒÓÃÓÚÖØ¶¨ÏòµÄ¶ÌÁ´½ÓÒàÔ´×Ô°Í»ù˹̹¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±»ÃüÃûΪ"Nomad Leopard"£¬£¬£¬£¬£¬SeqriteÖÒÑÔÆä¹æÄ£¿ÉÄÜÀ©Õ¹ÖÁÆäËû¹ú¼Ò¡£¡£¡£¡£¡£
https://therecord.media/hackers-target-afghan-workers


¾©¹«Íø°²±¸11010802024551ºÅ