¹È¸èGemini¼ä½ÓÌáÐÑ×¢ÈëÎó²îÆØ¹â

Ðû²¼Ê±¼ä 2026-01-21

1. ¹È¸èGemini¼ä½ÓÌáÐÑ×¢ÈëÎó²îÆØ¹â


1ÔÂ19ÈÕ£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶һÏîʹÓüä½ÓÌáÐÑ×¢ÈëÊÖÒÕ¹¥»÷¹È¸èGeminiµÄÎó²î£¬£¬£¬£¬£¬¿ÉÈÆ¹ýÊÚȨ·À»¤»úÖÆ£¬£¬£¬£¬£¬½«¹È¸èÈÕÀú×÷ΪÊý¾ÝÌáȡͨµÀ¡£¡£¡£¡£¡£Miggo SecurityÑо¿Ö÷¹ÜLiad EliyahuÖ¸³ö£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÔÚÈÕÀúÔ¼ÇëÖÐǶÈë¶ñÒâ×ÔÈ»ÓïÑÔÌáÐÑ£¬£¬£¬£¬£¬ÎÞÐèÓû§Ö±½Ó½»»¥¼´¿É»á¼û˽È˾ۻáÊý¾Ý²¢½¨ÉèÓÕÆ­ÐÔÊÂÎñ¡£¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚ¹¥»÷Õß·¢ËͰüÀ¨ÌØÖÆÌáÐѵÄÈÕÀúÔ¼Çë¡£¡£¡£¡£¡£µ±Óû§ÏòGeminiѯÎÊÈÕ³ÌÎÊÌâʱ£¬£¬£¬£¬£¬AI»áÆÊÎöÊÂÎñÐÎòÖеĶñÒâÌáÐÑ£¬£¬£¬£¬£¬»ã×ÜÓû§Ìض¨ÈÕÆÚµÄ¾Û»áÊý¾Ý£¬£¬£¬£¬£¬½¨ÉèÐÂÈÕÀúÊÂÎñ²¢Ð´ÈëÕªÒª¡£¡£¡£¡£¡£ÔÚÐí¶àÆóÒµÉèÖÃÖУ¬£¬£¬£¬£¬¸ÃÐÂÊÂÎñ¶Ô¹¥»÷Õ߿ɼû£¬£¬£¬£¬£¬Ê¹ÆäÄÜÇÔȡ˽ÈËÊý¾Ý¶øÓû§¾ø²»ÖªÇé¡£¡£¡£¡£¡£´Ë´ÎÅû¶ÕýÖµÆäËûAIÇå¾²Îó²îƵ·¢Ö®¼Ê¡£¡£¡£¡£¡£VaronisÐÎòµÄ¡°Reprompt¡±¹¥»÷¿ÉÈÆ¹ýÆóÒµÇå¾²¿ØÖÆÌáÈ¡Microsoft CopilotÃô¸ÐÊý¾Ý£»£» £»£»£»XM CyberÔڹȸèÔÆVertex AIºÍRayÖз¢Ã÷ȨÏÞÌáÉýÎó²î£¬£¬£¬£¬£¬ÔÊÐíµÍȨÏÞ¹¥»÷ÕßÐ®ÖÆ¸ßȨÏÞЧÀÍÊðÀí£»£» £»£»£»The Librarian¹¤¾ß±£´æ¶à¸öÎó²î£¨CVE-2026-0612µÈ£©£¬£¬£¬£¬£¬¿Éй¶ÄÚ²¿»ù´¡ÉèÊ©ÐÅÏ¢£»£» £»£»£»ÏµÍ³ÌáÐÑÌáÈ¡Îó²îͨ¹ýLLMÖúÊÖÌáȡϵͳÌáÐÑ£»£» £»£»£»Claude CodeÊг¡±£´æ¶ñÒâ²å¼þ¹¥»÷£»£» £»£»£»Cursor±£´æRCEÎó²î£¨CVE-2026-22708£©£¬£¬£¬£¬£¬¿ÉʹÓÃShellÏÂÁîʵÏÖÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£


https://thehackernews.com/2026/01/google-gemini-prompt-injection-flaw.html


2. EverestÀÕË÷Èí¼þ×éÖ¯Ðû³ÆÈëÇÖÂóµ±ÀÍÓ¡¶È¹«Ë¾


1ÔÂ20ÈÕ£¬£¬£¬£¬£¬EverestÀÕË÷Èí¼þ×éÖ¯ÔÚÆä°µÍøÐ¹Â¶ÍøÕ¾Ðû³ÆÒÑÈëÇÖÂóµ±ÀÍÓ¡¶È¹«Ë¾£¬£¬£¬£¬£¬²¢ÇÔÈ¡¸ß´ï861GBµÄ¿Í»§Êý¾Ý¼°¹«Ë¾ÄÚ²¿Îļþ¡£¡£¡£¡£¡£¸Ã×é֯ͨ¹ýÐû²¼ÄÚ²¿½ØÍ¼×ôÖ¤Æä˵·¨£¬£¬£¬£¬£¬½ØÍ¼ÏÔÊ¾Éæ¼°2023ÖÁ2026ÄêµÄ²ÆÎñ±¨¸æ¡¢É󼯏ú×ټͼ¡¢±¾Ç®¸ú×Ù±í¡¢ERPǨáãÎļþ¡¢¶¨¼ÛÊý¾Ý¼°Ãô¸ÐÄÚ²¿Í¨Ñ¶¼Í¼¡£¡£¡£¡£¡£¶à¸öĿ¼°´ÔÂϸ·Ö£¬£¬£¬£¬£¬ÌåÏÖÆä¶Ô»á¼Æ»òÆóÒµ×ÊÔ´ÍýÏëϵͳӵÓнṹ»¯»á¼ûȨÏÞ¡£¡£¡£¡£¡£ÆäÖС°Í¶×ÊÕßÐÅÏ¢¡±Ä¿Â¼¿ÉÄܰüÀ¨¶­Ê»ἶ±ðÉñÃØ×ÊÁÏ£¬£¬£¬£¬£¬¶ø¡°ÁªÏµÈËÊý¾Ý¿â¡±µç×Ó±í¸ñÔòÏêϸ¼Í¼ÁËÃÀ¹ú¡¢Ó¢¹ú¡¢ÐÂ¼ÓÆÂºÍÓ¡¶ÈµÈµØÍ¶×ÊÕß¼°ÉÌҵͬ°éµÄÐÕÃû¡¢µØµã¡¢µç»°¼°ÓÊÏä¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÄÚ²¿·ÖµêÊý¾Ý°üÀ¨Ë¾ÀíÐÕÃû¡¢mcdonaldsindia.comÓÊÏä¼°ÊýÊ®¼ÒÃŵêµÄÖ±½ÓÁªÏµµç»°¡£¡£¡£¡£¡£EverestÒªÇóÂóµ±ÀÍÓ¡¶È¹«Ë¾ÔÚÁ½ÌìÄÚ»ØÓ¦£¬£¬£¬£¬£¬µ«×èÖ¹ÏÖÔڸù«Ë¾ÉÐδÐû²¼¹Ù·½ÉùÃ÷£¬£¬£¬£¬£¬ÊÂÎñÕæÊµÐÔÈÔÐè½øÒ»²½Ö¤Êµ¡£¡£¡£¡£¡£


https://hackread.com/everest-ransomware-mcdonalds-india-breach-customer-data/


3. ACF Extended¸ßΣÎó²îÒý´ó¹æÄ£Õì̽Σº¦


1ÔÂ20ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬WordPressµÄAdvanced Custom Fields: Extended£¨ACF Extended£©²å¼þ±»ÆØ±£´æÑÏÖØÇå¾²Îó²îCVE-2025-14533£¬£¬£¬£¬£¬Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÔ¶³ÌʹÓøÃÎó²î»ñÈ¡ÖÎÀíȨÏÞ¡£¡£¡£¡£¡£¸Ã²å¼þÏÖÔÚÒÑÔÚ10Íò¸öÍøÕ¾ÉÏÆôÓ㬣¬£¬£¬£¬×÷ΪAdvanced Custom Fields£¨ACF£©µÄÀ©Õ¹²å¼þ£¬£¬£¬£¬£¬Îª¿ª·¢Ö°Ô±ºÍ¸ß¼¶ÍøÕ¾¹¹½¨ÕßÌá¹©ÌØÊ⹦Ч¡£¡£¡£¡£¡£Îó²î±£´æÓÚACF Extended 0.9.2.1¼°¸üÔç°æ±¾ÖУ¬£¬£¬£¬£¬Í¨¹ýÀÄÓòå¼þµÄ¡°²åÈëÓû§/¸üÐÂÓû§¡±±íµ¥²Ù×÷ʵÏÖ¡£¡£¡£¡£¡£ÎÊÌâȪԴÔÚÓÚ±íµ¥Óû§½¨Éè»ò¸üÐÂÀú³ÌÖУ¬£¬£¬£¬£¬½ÇÉ«ÏÞÖÆÎ´±»Ç¿ÖÆÖ´ÐУ¬£¬£¬£¬£¬×ÝÈ»×Ö¶ÎÉèÖÃÖÐ׼ȷÉèÖÃÁ˽ÇÉ«ÏÞÖÆ£¬£¬£¬£¬£¬¹¥»÷ÕßÈÔ¿Éí§ÒâÉèÖÃÓû§½ÇÉ«£¬£¬£¬£¬£¬´Ó¶øÍêÈ«¿ØÖÆÍøÕ¾¡£¡£¡£¡£¡£¸ÃÎó²îÓÉÇå¾²Ñо¿Ô±Andrea BocchettiÓÚ2025Äê12ÔÂ10ÈÕ·¢Ã÷²¢±¨¸æ£¬£¬£¬£¬£¬¹©Ó¦ÉÌÔÚËÄÌìºóÐû²¼0.9.2.2°æ±¾ÐÞ¸´¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬Æ¾Ö¤wordpress.orgÏÂÔØÍ³¼Æ£¬£¬£¬£¬£¬×ÔÐÞ¸´ÒÔÀ´Ô¼5ÍòÓû§ÏÂÔØÁ˸òå¼þ£¬£¬£¬£¬£¬¼ÙÉèËùÓÐÏÂÔØ¾ùΪ×îа汾£¬£¬£¬£¬£¬ÈÔÓÐÏàͬÊýÄ¿ÍøÕ¾ÃæÁÙ¹¥»÷Σº¦¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/acf-plugin-bug-gives-hackers-admin-on-50-000-wordpress-sites/


4. VoidLinkÔÆ¶ñÒâÈí¼þÌåÏÖ³öÏÔ×ŵÄAIÌìÉúÌØÕ÷


1ÔÂ20ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬Check Point ResearchÅû¶ÁËÒÔÔÆÎªÖÐÐĵÄVoidLink¶ñÒâÈí¼þ¿ò¼ÜµÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬¸Ã¿ò¼Ü±»ÆÀ¹ÀΪÓÉÐÑÄ¿¶à±à³ÌÓïÑÔµÄÖйú¿ª·¢Õß½èÖúÈ˹¤ÖÇÄÜÄ£×Ó¿ª·¢¡£¡£¡£¡£¡£×÷Ϊ¸ß¼¶Linux¶ñÒâÈí¼þ£¬£¬£¬£¬£¬VoidLink°üÀ¨×Ô½ç˵¼ÓÔØÆ÷¡¢Ö²Èë³ÌÐò¡¢rootkit¹æ±ÜÄ£¿£¿£¿£¿£¿£¿é¼°ÊýÊ®¸ö¹¦Ð§À©Õ¹²å¼þ£¬£¬£¬£¬£¬Æä¿ª·¢ÖÜÆÚÖ®¶Ì¡¢´úÂëÁ¿Ö®¾ÞÒý·¢Çå¾²½ç¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£Ñо¿Ö¸³ö£¬£¬£¬£¬£¬VoidLinkµÄ¿ª·¢Ê¼ÓÚ2025Äê11ÔÂÏÂÑ®£¬£¬£¬£¬£¬¿ª·¢ÕßתÏòʹÓÃǶÈëAIÖÐÐÄIDE TRAEµÄÖÇÄÜÖúÊÖTRAE SOLO¡£¡£¡£¡£¡£ÓÉÓÚЧÀÍÆ÷±£´æ¿ª·ÅĿ¼Îó²î£¬£¬£¬£¬£¬¿ª·¢Àú³ÌÖеÄÔ´´úÂë¡¢Îĵµ¡¢³å´ÌÍýÏë¼°ÄÚ²¿ÏîÄ¿½á¹¹±»ÒâÍâй¶¡£¡£¡£¡£¡£Check Point̫ͨ¹ýÎöÕâЩÎļþ·¢Ã÷£¬£¬£¬£¬£¬¿ª·¢Õß½ÓÄɹ淶Çý¶¯¿ª·¢£¨SDD£©Ä£Ê½£¬£¬£¬£¬£¬Í¨¹ýAIÌìÉúº­¸Ç¼Ü¹¹¡¢µü´úºÍ±ê×¼µÄ¶àÍŶӿª·¢ÍýÏë¡£¡£¡£¡£¡£Ö»¹ÜÏîÄ¿ÍýÏëÖÜÆÚΪ16-30ÖÜ£¬£¬£¬£¬£¬µ«ÏÖʵ½öÓÃÒ»Öܼ´ÊµÏÖ¿ÉÔËÐа汾£¬£¬£¬£¬£¬ÖÁ2025Äê12Ô³õ´úÂëÁ¿ÒÑ´ï88,000ÐС£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/voidlink-cloud-malware-shows-clear-signs-of-being-ai-generated/


5. TP-LinkÐÞ¸ßΣÎó²î£º32¿îÆóÒµÉãÏñÍ·Á¢×ã·ÝÑé֤Σº¦


1ÔÂ20ÈÕ£¬£¬£¬£¬£¬TP-Link½üÆÚÐÞ¸´Á˱àºÅΪCVE-2026-0629£¨CVSSÆÀ·Ö8.7£©µÄ¸ßΣÎó²î£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÆäVIGI²úÆ·ÏßÖÐÁè¼Ý32¿îVIGI CºÍVIGI InSightÆóÒµ¼¶CCTVÉãÏñÍ·ÐͺÅ¡£¡£¡£¡£¡£Îó²î½¹µãÔÚÓÚÍâµØWeb½çÃæµÄÃÜÂë»Ö¸´¹¦Ð§±£´æÉí·ÝÑéÖ¤ÈÆ¹ýȱÏÝ£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓôËÎó²îͨ¹ýʹÓÿͻ§¶Ë״̬£¬£¬£¬£¬£¬ÔÚδ¾­ÍâµØÍøÂçÉí·ÝÑéÖ¤µÄÇéÐÎÏÂÖ±½ÓÖØÖÃÖÎÀíÔ±ÃÜÂ룬£¬£¬£¬£¬´Ó¶ø»ñµÃ×°±¸µÄÍêÈ«ÖÎÀíȨÏÞ¡£¡£¡£¡£¡£¾ÝÇ徲ͨ¸æÅû¶£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐí¾ÖÓòÍø¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤»úÖÆ£¬£¬£¬£¬£¬Ö±½ÓÐÞ¸ÄÖÎÀíÔ±ÕË»§ÃÜÂë¡£¡£¡£¡£¡£Ò»µ©ÀÖ³ÉʹÓ㬣¬£¬£¬£¬¹¥»÷Õß²»µ«ÄÜ¿ØÖÆÉãÏñÍ·ÉèÖᢻá¼ûʵʱ¼°ÀúÊ·ÊÓÆµÊý¾Ý£¬£¬£¬£¬£¬»¹¿É½«×°±¸ÄÉÈë½©Ê¬ÍøÂçÌᳫDDoS¹¥»÷£¬£¬£¬£¬£¬»ò¸Ä¶¯¼à¿ØÖ¤¾Ý¡¢ÈÅÂÒÆóÒµÔËÓª£¬£¬£¬£¬£¬ÉõÖÁͨ¹ýÉãÏñÍ·×÷ÎªÌø°åÈëÇÖÆóÒµÄÚÍø£¬£¬£¬£¬£¬Òý·¢Ìع¤»î¶¯¡¢ÎïÀíÈëÇÖµÈÑÜÉúΣº¦£¬£¬£¬£¬£¬²¢¿ÉÄÜÒòÇÖÕ¼Òþ˽´¥·¢Ö´·¨Óëî¿Ïµ´¦·Ö¡£¡£¡£¡£¡£


https://securityaffairs.com/187110/hacking/critical-tp-link-vigi-camera-flaw-allowed-remote-takeover-of-surveillance-systems.html


6. "Nomad Leopard"´¹ÂÚ¹¥»÷¾«×¼Õë¶Ô°¢¸»º¹Õþ¸®¹ÍÔ±


1ÔÂ21ÈÕ£¬£¬£¬£¬£¬Ó¡¶ÈÍøÂçÇå¾²¹«Ë¾Seqrite¿ËÈÕÅû¶£¬£¬£¬£¬£¬ºÚ¿ÍÕýͨ¹ýαÔì°¢¸»º¹×ÜÀí°ì¹«ÊÒ¹Ù·½º²ÔýµÄÍøÂç´¹ÂÚÓʼþ£¬£¬£¬£¬£¬¶Ô°¢¸»º¹Õþ¸®¹ÍÔ±Ìᳫ¾«×¼¹¥»÷¡£¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯×Ô2025Äê12ÔÂÆð±»·¢Ã÷£¬£¬£¬£¬£¬¹¥»÷ÕßÈ«ÐÄÉè¼ÆÓÕ¶üÎĵµ£¬£¬£¬£¬£¬ÒÔ×Ú½ÌÎʺòÓ↑ͷ¡¢°üÀ¨²ÆÎñÉ걨ָʾ²¢Î±Ôì¸ß¼¶¹ÙÔ±ÊðÃûµÄ"Õýʽ¹«ë¹"£¬£¬£¬£¬£¬ÓÕʹĿµÄ·­¿ªÎļþºóÖ²ÈëFalseCub¶ñÒâÈí¼þ£¬£¬£¬£¬£¬ÊµÏÖÊý¾ÝÇÔÈ¡ÓëÍâ´«¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬¹¥»÷Õß½«GitHub×÷ΪÔÝÊ±ÔØºÉÍÐ¹ÜÆ½Ì¨£¬£¬£¬£¬£¬Í¨¹ý12ÔÂÏÂÑ®½¨ÉèµÄÕ˺ŷַ¢¶ñÒâÎļþ£¬£¬£¬£¬£¬Ðж¯¿¢ÊºóѸËÙɾ³ýÄÚÈÝ¡£¡£¡£¡£¡£¸üÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÔÚScribdÉÏ´«ÁË´ó×ÚÖ´·¨ÓëÐÐÕþÎļþ£¬£¬£¬£¬£¬°üÀ¨°¢¸»º¹Õþ¸®Ö¸Áî¡¢¹ú·À²¿Í¨Ñ¶Îļþ¼°ÃÀ¹úÉæ°¢¸»º¹ºÇ»¤ÈËȨÎļþ£¬£¬£¬£¬£¬ÕâЩÖÊÁÏ»ò³ÉΪδÀ´¹¥»÷µÄ"ÓÕ¶ü¿â"¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃ"Afghan Khan"¼ÙÃû£¬£¬£¬£¬£¬ÔÚPinterest¡¢DailymotionµÈƽ̨»î¶¯£¬£¬£¬£¬£¬²¿·ÖÕ˺ŹØÁª°Í»ù˹̹£¬£¬£¬£¬£¬ÇÒÓÃÓÚÖØ¶¨ÏòµÄ¶ÌÁ´½ÓÒàÔ´×Ô°Í»ù˹̹¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±»ÃüÃûΪ"Nomad Leopard"£¬£¬£¬£¬£¬SeqriteÖÒÑÔÆä¹æÄ£¿ÉÄÜÀ©Õ¹ÖÁÆäËû¹ú¼Ò¡£¡£¡£¡£¡£


https://therecord.media/hackers-target-afghan-workers