¹È¸èGemini¼ä½ÓÌáÐÑ×¢ÈëÎó²îÆØ¹â
Ðû²¼Ê±¼ä 2026-01-211. ¹È¸èGemini¼ä½ÓÌáÐÑ×¢ÈëÎó²îÆØ¹â
1ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶һÏîʹÓüä½ÓÌáÐÑ×¢ÈëÊÖÒÕ¹¥»÷¹È¸èGeminiµÄÎó²î£¬£¬£¬£¬£¬£¬¿ÉÈÆ¹ýÊÚȨ·À»¤»úÖÆ£¬£¬£¬£¬£¬£¬½«¹È¸èÈÕÀú×÷ΪÊý¾ÝÌáȡͨµÀ¡£¡£¡£¡£¡£Miggo SecurityÑо¿Ö÷¹ÜLiad EliyahuÖ¸³ö£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÔÚÈÕÀúÔ¼ÇëÖÐǶÈë¶ñÒâ×ÔÈ»ÓïÑÔÌáÐÑ£¬£¬£¬£¬£¬£¬ÎÞÐèÓû§Ö±½Ó½»»¥¼´¿É»á¼û˽È˾ۻáÊý¾Ý²¢½¨ÉèÓÕÆÐÔÊÂÎñ¡£¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚ¹¥»÷Õß·¢ËͰüÀ¨ÌØÖÆÌáÐѵÄÈÕÀúÔ¼Çë¡£¡£¡£¡£¡£µ±Óû§ÏòGeminiѯÎÊÈÕ³ÌÎÊÌâʱ£¬£¬£¬£¬£¬£¬AI»áÆÊÎöÊÂÎñÐÎòÖеĶñÒâÌáÐÑ£¬£¬£¬£¬£¬£¬»ã×ÜÓû§Ìض¨ÈÕÆÚµÄ¾Û»áÊý¾Ý£¬£¬£¬£¬£¬£¬½¨ÉèÐÂÈÕÀúÊÂÎñ²¢Ð´ÈëÕªÒª¡£¡£¡£¡£¡£ÔÚÐí¶àÆóÒµÉèÖÃÖУ¬£¬£¬£¬£¬£¬¸ÃÐÂÊÂÎñ¶Ô¹¥»÷Õ߿ɼû£¬£¬£¬£¬£¬£¬Ê¹ÆäÄÜÇÔȡ˽ÈËÊý¾Ý¶øÓû§¾ø²»ÖªÇé¡£¡£¡£¡£¡£´Ë´ÎÅû¶ÕýÖµÆäËûAIÇå¾²Îó²îƵ·¢Ö®¼Ê¡£¡£¡£¡£¡£VaronisÐÎòµÄ¡°Reprompt¡±¹¥»÷¿ÉÈÆ¹ýÆóÒµÇå¾²¿ØÖÆÌáÈ¡Microsoft CopilotÃô¸ÐÊý¾Ý£»£»£»£»XM CyberÔڹȸèÔÆVertex AIºÍRayÖз¢Ã÷ȨÏÞÌáÉýÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíµÍȨÏÞ¹¥»÷ÕßÐ®ÖÆ¸ßȨÏÞЧÀÍÊðÀí£»£»£»£»The Librarian¹¤¾ß±£´æ¶à¸öÎó²î£¨CVE-2026-0612µÈ£©£¬£¬£¬£¬£¬£¬¿Éй¶ÄÚ²¿»ù´¡ÉèÊ©ÐÅÏ¢£»£»£»£»ÏµÍ³ÌáÐÑÌáÈ¡Îó²îͨ¹ýLLMÖúÊÖÌáȡϵͳÌáÐÑ£»£»£»£»Claude CodeÊг¡±£´æ¶ñÒâ²å¼þ¹¥»÷£»£»£»£»Cursor±£´æRCEÎó²î£¨CVE-2026-22708£©£¬£¬£¬£¬£¬£¬¿ÉʹÓÃShellÏÂÁîʵÏÖÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£
https://thehackernews.com/2026/01/google-gemini-prompt-injection-flaw.html
2. EverestÀÕË÷Èí¼þ×éÖ¯Ðû³ÆÈëÇÖÂóµ±ÀÍÓ¡¶È¹«Ë¾
1ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬EverestÀÕË÷Èí¼þ×éÖ¯ÔÚÆä°µÍøÐ¹Â¶ÍøÕ¾Ðû³ÆÒÑÈëÇÖÂóµ±ÀÍÓ¡¶È¹«Ë¾£¬£¬£¬£¬£¬£¬²¢ÇÔÈ¡¸ß´ï861GBµÄ¿Í»§Êý¾Ý¼°¹«Ë¾ÄÚ²¿Îļþ¡£¡£¡£¡£¡£¸Ã×é֯ͨ¹ýÐû²¼ÄÚ²¿½ØÍ¼×ôÖ¤Æä˵·¨£¬£¬£¬£¬£¬£¬½ØÍ¼ÏÔÊ¾Éæ¼°2023ÖÁ2026ÄêµÄ²ÆÎñ±¨¸æ¡¢É󼯏ú×ټͼ¡¢±¾Ç®¸ú×Ù±í¡¢ERPǨáãÎļþ¡¢¶¨¼ÛÊý¾Ý¼°Ãô¸ÐÄÚ²¿Í¨Ñ¶¼Í¼¡£¡£¡£¡£¡£¶à¸öĿ¼°´ÔÂϸ·Ö£¬£¬£¬£¬£¬£¬ÌåÏÖÆä¶Ô»á¼Æ»òÆóÒµ×ÊÔ´ÍýÏëϵͳӵÓнṹ»¯»á¼ûȨÏÞ¡£¡£¡£¡£¡£ÆäÖС°Í¶×ÊÕßÐÅÏ¢¡±Ä¿Â¼¿ÉÄܰüÀ¨¶Ê»ἶ±ðÉñÃØ×ÊÁÏ£¬£¬£¬£¬£¬£¬¶ø¡°ÁªÏµÈËÊý¾Ý¿â¡±µç×Ó±í¸ñÔòÏêϸ¼Í¼ÁËÃÀ¹ú¡¢Ó¢¹ú¡¢ÐÂ¼ÓÆÂºÍÓ¡¶ÈµÈµØÍ¶×ÊÕß¼°ÉÌҵͬ°éµÄÐÕÃû¡¢µØµã¡¢µç»°¼°ÓÊÏä¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÄÚ²¿·ÖµêÊý¾Ý°üÀ¨Ë¾ÀíÐÕÃû¡¢mcdonaldsindia.comÓÊÏä¼°ÊýÊ®¼ÒÃŵêµÄÖ±½ÓÁªÏµµç»°¡£¡£¡£¡£¡£EverestÒªÇóÂóµ±ÀÍÓ¡¶È¹«Ë¾ÔÚÁ½ÌìÄÚ»ØÓ¦£¬£¬£¬£¬£¬£¬µ«×èÖ¹ÏÖÔڸù«Ë¾ÉÐδÐû²¼¹Ù·½ÉùÃ÷£¬£¬£¬£¬£¬£¬ÊÂÎñÕæÊµÐÔÈÔÐè½øÒ»²½Ö¤Êµ¡£¡£¡£¡£¡£
https://hackread.com/everest-ransomware-mcdonalds-india-breach-customer-data/
3. ACF Extended¸ßΣÎó²îÒý´ó¹æÄ£Õì̽Σº¦
1ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬WordPressµÄAdvanced Custom Fields: Extended£¨ACF Extended£©²å¼þ±»ÆØ±£´æÑÏÖØÇå¾²Îó²îCVE-2025-14533£¬£¬£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÔ¶³ÌʹÓøÃÎó²î»ñÈ¡ÖÎÀíȨÏÞ¡£¡£¡£¡£¡£¸Ã²å¼þÏÖÔÚÒÑÔÚ10Íò¸öÍøÕ¾ÉÏÆôÓ㬣¬£¬£¬£¬£¬×÷ΪAdvanced Custom Fields£¨ACF£©µÄÀ©Õ¹²å¼þ£¬£¬£¬£¬£¬£¬Îª¿ª·¢Ö°Ô±ºÍ¸ß¼¶ÍøÕ¾¹¹½¨ÕßÌá¹©ÌØÊ⹦Ч¡£¡£¡£¡£¡£Îó²î±£´æÓÚACF Extended 0.9.2.1¼°¸üÔç°æ±¾ÖУ¬£¬£¬£¬£¬£¬Í¨¹ýÀÄÓòå¼þµÄ¡°²åÈëÓû§/¸üÐÂÓû§¡±±íµ¥²Ù×÷ʵÏÖ¡£¡£¡£¡£¡£ÎÊÌâȪԴÔÚÓÚ±íµ¥Óû§½¨Éè»ò¸üÐÂÀú³ÌÖУ¬£¬£¬£¬£¬£¬½ÇÉ«ÏÞÖÆÎ´±»Ç¿ÖÆÖ´ÐУ¬£¬£¬£¬£¬£¬×ÝÈ»×Ö¶ÎÉèÖÃÖÐ׼ȷÉèÖÃÁ˽ÇÉ«ÏÞÖÆ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÈÔ¿Éí§ÒâÉèÖÃÓû§½ÇÉ«£¬£¬£¬£¬£¬£¬´Ó¶øÍêÈ«¿ØÖÆÍøÕ¾¡£¡£¡£¡£¡£¸ÃÎó²îÓÉÇå¾²Ñо¿Ô±Andrea BocchettiÓÚ2025Äê12ÔÂ10ÈÕ·¢Ã÷²¢±¨¸æ£¬£¬£¬£¬£¬£¬¹©Ó¦ÉÌÔÚËÄÌìºóÐû²¼0.9.2.2°æ±¾ÐÞ¸´¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬Æ¾Ö¤wordpress.orgÏÂÔØÍ³¼Æ£¬£¬£¬£¬£¬£¬×ÔÐÞ¸´ÒÔÀ´Ô¼5ÍòÓû§ÏÂÔØÁ˸òå¼þ£¬£¬£¬£¬£¬£¬¼ÙÉèËùÓÐÏÂÔØ¾ùΪ×îа汾£¬£¬£¬£¬£¬£¬ÈÔÓÐÏàͬÊýÄ¿ÍøÕ¾ÃæÁÙ¹¥»÷Σº¦¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/acf-plugin-bug-gives-hackers-admin-on-50-000-wordpress-sites/
4. VoidLinkÔÆ¶ñÒâÈí¼þÌåÏÖ³öÏÔ×ŵÄAIÌìÉúÌØÕ÷
1ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬Check Point ResearchÅû¶ÁËÒÔÔÆÎªÖÐÐĵÄVoidLink¶ñÒâÈí¼þ¿ò¼ÜµÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬¸Ã¿ò¼Ü±»ÆÀ¹ÀΪÓÉÐÑÄ¿¶à±à³ÌÓïÑÔµÄÖйú¿ª·¢Õß½èÖúÈ˹¤ÖÇÄÜÄ£×Ó¿ª·¢¡£¡£¡£¡£¡£×÷Ϊ¸ß¼¶Linux¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬VoidLink°üÀ¨×Ô½ç˵¼ÓÔØÆ÷¡¢Ö²Èë³ÌÐò¡¢rootkit¹æ±ÜÄ£¿£¿£¿£¿£¿£¿£¿é¼°ÊýÊ®¸ö¹¦Ð§À©Õ¹²å¼þ£¬£¬£¬£¬£¬£¬Æä¿ª·¢ÖÜÆÚÖ®¶Ì¡¢´úÂëÁ¿Ö®¾ÞÒý·¢Çå¾²½ç¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£Ñо¿Ö¸³ö£¬£¬£¬£¬£¬£¬VoidLinkµÄ¿ª·¢Ê¼ÓÚ2025Äê11ÔÂÏÂÑ®£¬£¬£¬£¬£¬£¬¿ª·¢ÕßתÏòʹÓÃǶÈëAIÖÐÐÄIDE TRAEµÄÖÇÄÜÖúÊÖTRAE SOLO¡£¡£¡£¡£¡£ÓÉÓÚЧÀÍÆ÷±£´æ¿ª·ÅĿ¼Îó²î£¬£¬£¬£¬£¬£¬¿ª·¢Àú³ÌÖеÄÔ´´úÂë¡¢Îĵµ¡¢³å´ÌÍýÏë¼°ÄÚ²¿ÏîÄ¿½á¹¹±»ÒâÍâй¶¡£¡£¡£¡£¡£Check Point̫ͨ¹ýÎöÕâЩÎļþ·¢Ã÷£¬£¬£¬£¬£¬£¬¿ª·¢Õß½ÓÄɹ淶Çý¶¯¿ª·¢£¨SDD£©Ä£Ê½£¬£¬£¬£¬£¬£¬Í¨¹ýAIÌìÉúº¸Ç¼Ü¹¹¡¢µü´úºÍ±ê×¼µÄ¶àÍŶӿª·¢ÍýÏë¡£¡£¡£¡£¡£Ö»¹ÜÏîÄ¿ÍýÏëÖÜÆÚΪ16-30ÖÜ£¬£¬£¬£¬£¬£¬µ«ÏÖʵ½öÓÃÒ»Öܼ´ÊµÏÖ¿ÉÔËÐа汾£¬£¬£¬£¬£¬£¬ÖÁ2025Äê12Ô³õ´úÂëÁ¿ÒÑ´ï88,000ÐС£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/voidlink-cloud-malware-shows-clear-signs-of-being-ai-generated/
5. TP-LinkÐÞ¸ßΣÎó²î£º32¿îÆóÒµÉãÏñÍ·Á¢×ã·ÝÑé֤Σº¦
1ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬TP-Link½üÆÚÐÞ¸´Á˱àºÅΪCVE-2026-0629£¨CVSSÆÀ·Ö8.7£©µÄ¸ßΣÎó²î£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÆäVIGI²úÆ·ÏßÖÐÁè¼Ý32¿îVIGI CºÍVIGI InSightÆóÒµ¼¶CCTVÉãÏñÍ·Ðͺ𣡣¡£¡£¡£Îó²î½¹µãÔÚÓÚÍâµØWeb½çÃæµÄÃÜÂë»Ö¸´¹¦Ð§±£´æÉí·ÝÑéÖ¤ÈÆ¹ýȱÏÝ£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓôËÎó²îͨ¹ýʹÓÿͻ§¶Ë״̬£¬£¬£¬£¬£¬£¬ÔÚδ¾ÍâµØÍøÂçÉí·ÝÑéÖ¤µÄÇéÐÎÏÂÖ±½ÓÖØÖÃÖÎÀíÔ±ÃÜÂ룬£¬£¬£¬£¬£¬´Ó¶ø»ñµÃ×°±¸µÄÍêÈ«ÖÎÀíȨÏÞ¡£¡£¡£¡£¡£¾ÝÇ徲ͨ¸æÅû¶£¬£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐí¾ÖÓòÍø¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤»úÖÆ£¬£¬£¬£¬£¬£¬Ö±½ÓÐÞ¸ÄÖÎÀíÔ±ÕË»§ÃÜÂë¡£¡£¡£¡£¡£Ò»µ©ÀÖ³ÉʹÓ㬣¬£¬£¬£¬£¬¹¥»÷Õß²»µ«ÄÜ¿ØÖÆÉãÏñÍ·ÉèÖᢻá¼ûʵʱ¼°ÀúÊ·ÊÓÆµÊý¾Ý£¬£¬£¬£¬£¬£¬»¹¿É½«×°±¸ÄÉÈë½©Ê¬ÍøÂçÌᳫDDoS¹¥»÷£¬£¬£¬£¬£¬£¬»ò¸Ä¶¯¼à¿ØÖ¤¾Ý¡¢ÈÅÂÒÆóÒµÔËÓª£¬£¬£¬£¬£¬£¬ÉõÖÁͨ¹ýÉãÏñÍ·×÷ÎªÌø°åÈëÇÖÆóÒµÄÚÍø£¬£¬£¬£¬£¬£¬Òý·¢Ìع¤»î¶¯¡¢ÎïÀíÈëÇÖµÈÑÜÉúΣº¦£¬£¬£¬£¬£¬£¬²¢¿ÉÄÜÒòÇÖÕ¼Òþ˽´¥·¢Ö´·¨Óëî¿Ïµ´¦·Ö¡£¡£¡£¡£¡£
https://securityaffairs.com/187110/hacking/critical-tp-link-vigi-camera-flaw-allowed-remote-takeover-of-surveillance-systems.html
6. "Nomad Leopard"´¹ÂÚ¹¥»÷¾«×¼Õë¶Ô°¢¸»º¹Õþ¸®¹ÍÔ±
1ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬Ó¡¶ÈÍøÂçÇå¾²¹«Ë¾Seqrite¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬ºÚ¿ÍÕýͨ¹ýαÔì°¢¸»º¹×ÜÀí°ì¹«ÊÒ¹Ù·½º²ÔýµÄÍøÂç´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬¶Ô°¢¸»º¹Õþ¸®¹ÍÔ±Ìᳫ¾«×¼¹¥»÷¡£¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯×Ô2025Äê12ÔÂÆð±»·¢Ã÷£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÈ«ÐÄÉè¼ÆÓÕ¶üÎĵµ£¬£¬£¬£¬£¬£¬ÒÔ×Ú½ÌÎʺòÓ↑ͷ¡¢°üÀ¨²ÆÎñÉ걨ָʾ²¢Î±Ôì¸ß¼¶¹ÙÔ±ÊðÃûµÄ"Õýʽ¹«ë¹"£¬£¬£¬£¬£¬£¬ÓÕʹĿµÄ·¿ªÎļþºóÖ²ÈëFalseCub¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬ÊµÏÖÊý¾ÝÇÔÈ¡ÓëÍâ´«¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬¹¥»÷Õß½«GitHub×÷ΪÔÝÊ±ÔØºÉÍÐ¹ÜÆ½Ì¨£¬£¬£¬£¬£¬£¬Í¨¹ý12ÔÂÏÂÑ®½¨ÉèµÄÕ˺ŷַ¢¶ñÒâÎļþ£¬£¬£¬£¬£¬£¬Ðж¯¿¢ÊºóѸËÙɾ³ýÄÚÈÝ¡£¡£¡£¡£¡£¸üÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÔÚScribdÉÏ´«ÁË´ó×ÚÖ´·¨ÓëÐÐÕþÎļþ£¬£¬£¬£¬£¬£¬°üÀ¨°¢¸»º¹Õþ¸®Ö¸Áî¡¢¹ú·À²¿Í¨Ñ¶Îļþ¼°ÃÀ¹úÉæ°¢¸»º¹ºÇ»¤ÈËȨÎļþ£¬£¬£¬£¬£¬£¬ÕâЩÖÊÁÏ»ò³ÉΪδÀ´¹¥»÷µÄ"ÓÕ¶ü¿â"¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃ"Afghan Khan"¼ÙÃû£¬£¬£¬£¬£¬£¬ÔÚPinterest¡¢DailymotionµÈƽ̨»î¶¯£¬£¬£¬£¬£¬£¬²¿·ÖÕ˺ŹØÁª°Í»ù˹̹£¬£¬£¬£¬£¬£¬ÇÒÓÃÓÚÖØ¶¨ÏòµÄ¶ÌÁ´½ÓÒàÔ´×Ô°Í»ù˹̹¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±»ÃüÃûΪ"Nomad Leopard"£¬£¬£¬£¬£¬£¬SeqriteÖÒÑÔÆä¹æÄ£¿ÉÄÜÀ©Õ¹ÖÁÆäËû¹ú¼Ò¡£¡£¡£¡£¡£
https://therecord.media/hackers-target-afghan-workers


¾©¹«Íø°²±¸11010802024551ºÅ