¹È¸èGemini¼ä½ÓÌáÐÑ×¢ÈëÎó²îÆØ¹â

Ðû²¼Ê±¼ä 2026-01-21

1. ¹È¸èGemini¼ä½ÓÌáÐÑ×¢ÈëÎó²îÆØ¹â


1ÔÂ19ÈÕ£¬£¬£¬ £¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶һÏîʹÓüä½ÓÌáÐÑ×¢ÈëÊÖÒÕ¹¥»÷¹È¸èGeminiµÄÎó²î£¬£¬£¬ £¬£¬£¬¿ÉÈÆ¹ýÊÚȨ·À»¤»úÖÆ£¬£¬£¬ £¬£¬£¬½«¹È¸èÈÕÀú×÷ΪÊý¾ÝÌáȡͨµÀ¡£¡£¡£¡£¡£Miggo SecurityÑо¿Ö÷¹ÜLiad EliyahuÖ¸³ö£¬£¬£¬ £¬£¬£¬¹¥»÷Õßͨ¹ýÔÚÈÕÀúÔ¼ÇëÖÐǶÈë¶ñÒâ×ÔÈ»ÓïÑÔÌáÐÑ£¬£¬£¬ £¬£¬£¬ÎÞÐèÓû§Ö±½Ó½»»¥¼´¿É»á¼û˽È˾ۻáÊý¾Ý²¢½¨ÉèÓÕÆ­ÐÔÊÂÎñ¡£¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚ¹¥»÷Õß·¢ËͰüÀ¨ÌØÖÆÌáÐѵÄÈÕÀúÔ¼Çë¡£¡£¡£¡£¡£µ±Óû§ÏòGeminiѯÎÊÈÕ³ÌÎÊÌâʱ£¬£¬£¬ £¬£¬£¬AI»áÆÊÎöÊÂÎñÐÎòÖеĶñÒâÌáÐÑ£¬£¬£¬ £¬£¬£¬»ã×ÜÓû§Ìض¨ÈÕÆÚµÄ¾Û»áÊý¾Ý£¬£¬£¬ £¬£¬£¬½¨ÉèÐÂÈÕÀúÊÂÎñ²¢Ð´ÈëÕªÒª¡£¡£¡£¡£¡£ÔÚÐí¶àÆóÒµÉèÖÃÖУ¬£¬£¬ £¬£¬£¬¸ÃÐÂÊÂÎñ¶Ô¹¥»÷Õ߿ɼû£¬£¬£¬ £¬£¬£¬Ê¹ÆäÄÜÇÔȡ˽ÈËÊý¾Ý¶øÓû§¾ø²»ÖªÇé¡£¡£¡£¡£¡£´Ë´ÎÅû¶ÕýÖµÆäËûAIÇå¾²Îó²îƵ·¢Ö®¼Ê¡£¡£¡£¡£¡£VaronisÐÎòµÄ¡°Reprompt¡±¹¥»÷¿ÉÈÆ¹ýÆóÒµÇå¾²¿ØÖÆÌáÈ¡Microsoft CopilotÃô¸ÐÊý¾Ý£» £»£»£»XM CyberÔڹȸèÔÆVertex AIºÍRayÖз¢Ã÷ȨÏÞÌáÉýÎó²î£¬£¬£¬ £¬£¬£¬ÔÊÐíµÍȨÏÞ¹¥»÷ÕßÐ®ÖÆ¸ßȨÏÞЧÀÍÊðÀí£» £»£»£»The Librarian¹¤¾ß±£´æ¶à¸öÎó²î£¨CVE-2026-0612µÈ£©£¬£¬£¬ £¬£¬£¬¿Éй¶ÄÚ²¿»ù´¡ÉèÊ©ÐÅÏ¢£» £»£»£»ÏµÍ³ÌáÐÑÌáÈ¡Îó²îͨ¹ýLLMÖúÊÖÌáȡϵͳÌáÐÑ£» £»£»£»Claude CodeÊг¡±£´æ¶ñÒâ²å¼þ¹¥»÷£» £»£»£»Cursor±£´æRCEÎó²î£¨CVE-2026-22708£©£¬£¬£¬ £¬£¬£¬¿ÉʹÓÃShellÏÂÁîʵÏÖÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£


https://thehackernews.com/2026/01/google-gemini-prompt-injection-flaw.html


2. EverestÀÕË÷Èí¼þ×éÖ¯Ðû³ÆÈëÇÖÂóµ±ÀÍÓ¡¶È¹«Ë¾


1ÔÂ20ÈÕ£¬£¬£¬ £¬£¬£¬EverestÀÕË÷Èí¼þ×éÖ¯ÔÚÆä°µÍøÐ¹Â¶ÍøÕ¾Ðû³ÆÒÑÈëÇÖÂóµ±ÀÍÓ¡¶È¹«Ë¾£¬£¬£¬ £¬£¬£¬²¢ÇÔÈ¡¸ß´ï861GBµÄ¿Í»§Êý¾Ý¼°¹«Ë¾ÄÚ²¿Îļþ¡£¡£¡£¡£¡£¸Ã×é֯ͨ¹ýÐû²¼ÄÚ²¿½ØÍ¼×ôÖ¤Æä˵·¨£¬£¬£¬ £¬£¬£¬½ØÍ¼ÏÔÊ¾Éæ¼°2023ÖÁ2026ÄêµÄ²ÆÎñ±¨¸æ¡¢É󼯏ú×ټͼ¡¢±¾Ç®¸ú×Ù±í¡¢ERPǨáãÎļþ¡¢¶¨¼ÛÊý¾Ý¼°Ãô¸ÐÄÚ²¿Í¨Ñ¶¼Í¼¡£¡£¡£¡£¡£¶à¸öĿ¼°´ÔÂϸ·Ö£¬£¬£¬ £¬£¬£¬ÌåÏÖÆä¶Ô»á¼Æ»òÆóÒµ×ÊÔ´ÍýÏëϵͳӵÓнṹ»¯»á¼ûȨÏÞ¡£¡£¡£¡£¡£ÆäÖС°Í¶×ÊÕßÐÅÏ¢¡±Ä¿Â¼¿ÉÄܰüÀ¨¶­Ê»ἶ±ðÉñÃØ×ÊÁÏ£¬£¬£¬ £¬£¬£¬¶ø¡°ÁªÏµÈËÊý¾Ý¿â¡±µç×Ó±í¸ñÔòÏêϸ¼Í¼ÁËÃÀ¹ú¡¢Ó¢¹ú¡¢ÐÂ¼ÓÆÂºÍÓ¡¶ÈµÈµØÍ¶×ÊÕß¼°ÉÌҵͬ°éµÄÐÕÃû¡¢µØµã¡¢µç»°¼°ÓÊÏä¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬ÄÚ²¿·ÖµêÊý¾Ý°üÀ¨Ë¾ÀíÐÕÃû¡¢mcdonaldsindia.comÓÊÏä¼°ÊýÊ®¼ÒÃŵêµÄÖ±½ÓÁªÏµµç»°¡£¡£¡£¡£¡£EverestÒªÇóÂóµ±ÀÍÓ¡¶È¹«Ë¾ÔÚÁ½ÌìÄÚ»ØÓ¦£¬£¬£¬ £¬£¬£¬µ«×èÖ¹ÏÖÔڸù«Ë¾ÉÐδÐû²¼¹Ù·½ÉùÃ÷£¬£¬£¬ £¬£¬£¬ÊÂÎñÕæÊµÐÔÈÔÐè½øÒ»²½Ö¤Êµ¡£¡£¡£¡£¡£


https://hackread.com/everest-ransomware-mcdonalds-india-breach-customer-data/


3. ACF Extended¸ßΣÎó²îÒý´ó¹æÄ£Õì̽Σº¦


1ÔÂ20ÈÕ£¬£¬£¬ £¬£¬£¬¿ËÈÕ£¬£¬£¬ £¬£¬£¬WordPressµÄAdvanced Custom Fields: Extended£¨ACF Extended£©²å¼þ±»ÆØ±£´æÑÏÖØÇå¾²Îó²îCVE-2025-14533£¬£¬£¬ £¬£¬£¬Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÔ¶³ÌʹÓøÃÎó²î»ñÈ¡ÖÎÀíȨÏÞ¡£¡£¡£¡£¡£¸Ã²å¼þÏÖÔÚÒÑÔÚ10Íò¸öÍøÕ¾ÉÏÆôÓ㬣¬£¬ £¬£¬£¬×÷ΪAdvanced Custom Fields£¨ACF£©µÄÀ©Õ¹²å¼þ£¬£¬£¬ £¬£¬£¬Îª¿ª·¢Ö°Ô±ºÍ¸ß¼¶ÍøÕ¾¹¹½¨ÕßÌá¹©ÌØÊ⹦Ч¡£¡£¡£¡£¡£Îó²î±£´æÓÚACF Extended 0.9.2.1¼°¸üÔç°æ±¾ÖУ¬£¬£¬ £¬£¬£¬Í¨¹ýÀÄÓòå¼þµÄ¡°²åÈëÓû§/¸üÐÂÓû§¡±±íµ¥²Ù×÷ʵÏÖ¡£¡£¡£¡£¡£ÎÊÌâȪԴÔÚÓÚ±íµ¥Óû§½¨Éè»ò¸üÐÂÀú³ÌÖУ¬£¬£¬ £¬£¬£¬½ÇÉ«ÏÞÖÆÎ´±»Ç¿ÖÆÖ´ÐУ¬£¬£¬ £¬£¬£¬×ÝÈ»×Ö¶ÎÉèÖÃÖÐ׼ȷÉèÖÃÁ˽ÇÉ«ÏÞÖÆ£¬£¬£¬ £¬£¬£¬¹¥»÷ÕßÈÔ¿Éí§ÒâÉèÖÃÓû§½ÇÉ«£¬£¬£¬ £¬£¬£¬´Ó¶øÍêÈ«¿ØÖÆÍøÕ¾¡£¡£¡£¡£¡£¸ÃÎó²îÓÉÇå¾²Ñо¿Ô±Andrea BocchettiÓÚ2025Äê12ÔÂ10ÈÕ·¢Ã÷²¢±¨¸æ£¬£¬£¬ £¬£¬£¬¹©Ó¦ÉÌÔÚËÄÌìºóÐû²¼0.9.2.2°æ±¾ÐÞ¸´¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬ £¬£¬£¬Æ¾Ö¤wordpress.orgÏÂÔØÍ³¼Æ£¬£¬£¬ £¬£¬£¬×ÔÐÞ¸´ÒÔÀ´Ô¼5ÍòÓû§ÏÂÔØÁ˸òå¼þ£¬£¬£¬ £¬£¬£¬¼ÙÉèËùÓÐÏÂÔØ¾ùΪ×îа汾£¬£¬£¬ £¬£¬£¬ÈÔÓÐÏàͬÊýÄ¿ÍøÕ¾ÃæÁÙ¹¥»÷Σº¦¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/acf-plugin-bug-gives-hackers-admin-on-50-000-wordpress-sites/


4. VoidLinkÔÆ¶ñÒâÈí¼þÌåÏÖ³öÏÔ×ŵÄAIÌìÉúÌØÕ÷


1ÔÂ20ÈÕ£¬£¬£¬ £¬£¬£¬¿ËÈÕ£¬£¬£¬ £¬£¬£¬Check Point ResearchÅû¶ÁËÒÔÔÆÎªÖÐÐĵÄVoidLink¶ñÒâÈí¼þ¿ò¼ÜµÄÏêϸÐÅÏ¢£¬£¬£¬ £¬£¬£¬¸Ã¿ò¼Ü±»ÆÀ¹ÀΪÓÉÐÑÄ¿¶à±à³ÌÓïÑÔµÄÖйú¿ª·¢Õß½èÖúÈ˹¤ÖÇÄÜÄ£×Ó¿ª·¢¡£¡£¡£¡£¡£×÷Ϊ¸ß¼¶Linux¶ñÒâÈí¼þ£¬£¬£¬ £¬£¬£¬VoidLink°üÀ¨×Ô½ç˵¼ÓÔØÆ÷¡¢Ö²Èë³ÌÐò¡¢rootkit¹æ±ÜÄ£¿£¿£¿ £¿£¿£¿£¿é¼°ÊýÊ®¸ö¹¦Ð§À©Õ¹²å¼þ£¬£¬£¬ £¬£¬£¬Æä¿ª·¢ÖÜÆÚÖ®¶Ì¡¢´úÂëÁ¿Ö®¾ÞÒý·¢Çå¾²½ç¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£Ñо¿Ö¸³ö£¬£¬£¬ £¬£¬£¬VoidLinkµÄ¿ª·¢Ê¼ÓÚ2025Äê11ÔÂÏÂÑ®£¬£¬£¬ £¬£¬£¬¿ª·¢ÕßתÏòʹÓÃǶÈëAIÖÐÐÄIDE TRAEµÄÖÇÄÜÖúÊÖTRAE SOLO¡£¡£¡£¡£¡£ÓÉÓÚЧÀÍÆ÷±£´æ¿ª·ÅĿ¼Îó²î£¬£¬£¬ £¬£¬£¬¿ª·¢Àú³ÌÖеÄÔ´´úÂë¡¢Îĵµ¡¢³å´ÌÍýÏë¼°ÄÚ²¿ÏîÄ¿½á¹¹±»ÒâÍâй¶¡£¡£¡£¡£¡£Check Point̫ͨ¹ýÎöÕâЩÎļþ·¢Ã÷£¬£¬£¬ £¬£¬£¬¿ª·¢Õß½ÓÄɹ淶Çý¶¯¿ª·¢£¨SDD£©Ä£Ê½£¬£¬£¬ £¬£¬£¬Í¨¹ýAIÌìÉúº­¸Ç¼Ü¹¹¡¢µü´úºÍ±ê×¼µÄ¶àÍŶӿª·¢ÍýÏë¡£¡£¡£¡£¡£Ö»¹ÜÏîÄ¿ÍýÏëÖÜÆÚΪ16-30ÖÜ£¬£¬£¬ £¬£¬£¬µ«ÏÖʵ½öÓÃÒ»Öܼ´ÊµÏÖ¿ÉÔËÐа汾£¬£¬£¬ £¬£¬£¬ÖÁ2025Äê12Ô³õ´úÂëÁ¿ÒÑ´ï88,000ÐС£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/voidlink-cloud-malware-shows-clear-signs-of-being-ai-generated/


5. TP-LinkÐÞ¸ßΣÎó²î£º32¿îÆóÒµÉãÏñÍ·Á¢×ã·ÝÑé֤Σº¦


1ÔÂ20ÈÕ£¬£¬£¬ £¬£¬£¬TP-Link½üÆÚÐÞ¸´Á˱àºÅΪCVE-2026-0629£¨CVSSÆÀ·Ö8.7£©µÄ¸ßΣÎó²î£¬£¬£¬ £¬£¬£¬¸ÃÎó²îÓ°ÏìÆäVIGI²úÆ·ÏßÖÐÁè¼Ý32¿îVIGI CºÍVIGI InSightÆóÒµ¼¶CCTVÉãÏñÍ·ÐͺÅ¡£¡£¡£¡£¡£Îó²î½¹µãÔÚÓÚÍâµØWeb½çÃæµÄÃÜÂë»Ö¸´¹¦Ð§±£´æÉí·ÝÑéÖ¤ÈÆ¹ýȱÏÝ£¬£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉʹÓôËÎó²îͨ¹ýʹÓÿͻ§¶Ë״̬£¬£¬£¬ £¬£¬£¬ÔÚδ¾­ÍâµØÍøÂçÉí·ÝÑéÖ¤µÄÇéÐÎÏÂÖ±½ÓÖØÖÃÖÎÀíÔ±ÃÜÂ룬£¬£¬ £¬£¬£¬´Ó¶ø»ñµÃ×°±¸µÄÍêÈ«ÖÎÀíȨÏÞ¡£¡£¡£¡£¡£¾ÝÇ徲ͨ¸æÅû¶£¬£¬£¬ £¬£¬£¬¸ÃÎó²îÔÊÐí¾ÖÓòÍø¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤»úÖÆ£¬£¬£¬ £¬£¬£¬Ö±½ÓÐÞ¸ÄÖÎÀíÔ±ÕË»§ÃÜÂë¡£¡£¡£¡£¡£Ò»µ©ÀÖ³ÉʹÓ㬣¬£¬ £¬£¬£¬¹¥»÷Õß²»µ«ÄÜ¿ØÖÆÉãÏñÍ·ÉèÖᢻá¼ûʵʱ¼°ÀúÊ·ÊÓÆµÊý¾Ý£¬£¬£¬ £¬£¬£¬»¹¿É½«×°±¸ÄÉÈë½©Ê¬ÍøÂçÌᳫDDoS¹¥»÷£¬£¬£¬ £¬£¬£¬»ò¸Ä¶¯¼à¿ØÖ¤¾Ý¡¢ÈÅÂÒÆóÒµÔËÓª£¬£¬£¬ £¬£¬£¬ÉõÖÁͨ¹ýÉãÏñÍ·×÷ÎªÌø°åÈëÇÖÆóÒµÄÚÍø£¬£¬£¬ £¬£¬£¬Òý·¢Ìع¤»î¶¯¡¢ÎïÀíÈëÇÖµÈÑÜÉúΣº¦£¬£¬£¬ £¬£¬£¬²¢¿ÉÄÜÒòÇÖÕ¼Òþ˽´¥·¢Ö´·¨Óëî¿Ïµ´¦·Ö¡£¡£¡£¡£¡£


https://securityaffairs.com/187110/hacking/critical-tp-link-vigi-camera-flaw-allowed-remote-takeover-of-surveillance-systems.html


6. "Nomad Leopard"´¹ÂÚ¹¥»÷¾«×¼Õë¶Ô°¢¸»º¹Õþ¸®¹ÍÔ±


1ÔÂ21ÈÕ£¬£¬£¬ £¬£¬£¬Ó¡¶ÈÍøÂçÇå¾²¹«Ë¾Seqrite¿ËÈÕÅû¶£¬£¬£¬ £¬£¬£¬ºÚ¿ÍÕýͨ¹ýαÔì°¢¸»º¹×ÜÀí°ì¹«ÊÒ¹Ù·½º²ÔýµÄÍøÂç´¹ÂÚÓʼþ£¬£¬£¬ £¬£¬£¬¶Ô°¢¸»º¹Õþ¸®¹ÍÔ±Ìᳫ¾«×¼¹¥»÷¡£¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯×Ô2025Äê12ÔÂÆð±»·¢Ã÷£¬£¬£¬ £¬£¬£¬¹¥»÷ÕßÈ«ÐÄÉè¼ÆÓÕ¶üÎĵµ£¬£¬£¬ £¬£¬£¬ÒÔ×Ú½ÌÎʺòÓ↑ͷ¡¢°üÀ¨²ÆÎñÉ걨ָʾ²¢Î±Ôì¸ß¼¶¹ÙÔ±ÊðÃûµÄ"Õýʽ¹«ë¹"£¬£¬£¬ £¬£¬£¬ÓÕʹĿµÄ·­¿ªÎļþºóÖ²ÈëFalseCub¶ñÒâÈí¼þ£¬£¬£¬ £¬£¬£¬ÊµÏÖÊý¾ÝÇÔÈ¡ÓëÍâ´«¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬ £¬£¬£¬¹¥»÷Õß½«GitHub×÷ΪÔÝÊ±ÔØºÉÍÐ¹ÜÆ½Ì¨£¬£¬£¬ £¬£¬£¬Í¨¹ý12ÔÂÏÂÑ®½¨ÉèµÄÕ˺ŷַ¢¶ñÒâÎļþ£¬£¬£¬ £¬£¬£¬Ðж¯¿¢ÊºóѸËÙɾ³ýÄÚÈÝ¡£¡£¡£¡£¡£¸üÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬ £¬£¬£¬ÍþвÐÐΪÕßÔÚScribdÉÏ´«ÁË´ó×ÚÖ´·¨ÓëÐÐÕþÎļþ£¬£¬£¬ £¬£¬£¬°üÀ¨°¢¸»º¹Õþ¸®Ö¸Áî¡¢¹ú·À²¿Í¨Ñ¶Îļþ¼°ÃÀ¹úÉæ°¢¸»º¹ºÇ»¤ÈËȨÎļþ£¬£¬£¬ £¬£¬£¬ÕâЩÖÊÁÏ»ò³ÉΪδÀ´¹¥»÷µÄ"ÓÕ¶ü¿â"¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃ"Afghan Khan"¼ÙÃû£¬£¬£¬ £¬£¬£¬ÔÚPinterest¡¢DailymotionµÈƽ̨»î¶¯£¬£¬£¬ £¬£¬£¬²¿·ÖÕ˺ŹØÁª°Í»ù˹̹£¬£¬£¬ £¬£¬£¬ÇÒÓÃÓÚÖØ¶¨ÏòµÄ¶ÌÁ´½ÓÒàÔ´×Ô°Í»ù˹̹¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±»ÃüÃûΪ"Nomad Leopard"£¬£¬£¬ £¬£¬£¬SeqriteÖÒÑÔÆä¹æÄ£¿ÉÄÜÀ©Õ¹ÖÁÆäËû¹ú¼Ò¡£¡£¡£¡£¡£


https://therecord.media/hackers-target-afghan-workers