¹È¸èGemini¼ä½ÓÌáÐÑ×¢ÈëÎó²îÆØ¹â

Ðû²¼Ê±¼ä 2026-01-21

1. ¹È¸èGemini¼ä½ÓÌáÐÑ×¢ÈëÎó²îÆØ¹â


1ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶һÏîʹÓüä½ÓÌáÐÑ×¢ÈëÊÖÒÕ¹¥»÷¹È¸èGeminiµÄÎó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÈÆ¹ýÊÚȨ·À»¤»úÖÆ£¬£¬£¬£¬£¬£¬£¬½«¹È¸èÈÕÀú×÷ΪÊý¾ÝÌáȡͨµÀ¡£¡£¡£¡£¡£Miggo SecurityÑо¿Ö÷¹ÜLiad EliyahuÖ¸³ö£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýÔÚÈÕÀúÔ¼ÇëÖÐǶÈë¶ñÒâ×ÔÈ»ÓïÑÔÌáÐÑ£¬£¬£¬£¬£¬£¬£¬ÎÞÐèÓû§Ö±½Ó½»»¥¼´¿É»á¼û˽È˾ۻáÊý¾Ý²¢½¨ÉèÓÕÆ­ÐÔÊÂÎñ¡£¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚ¹¥»÷Õß·¢ËͰüÀ¨ÌØÖÆÌáÐѵÄÈÕÀúÔ¼Çë¡£¡£¡£¡£¡£µ±Óû§ÏòGeminiѯÎÊÈÕ³ÌÎÊÌâʱ£¬£¬£¬£¬£¬£¬£¬AI»áÆÊÎöÊÂÎñÐÎòÖеĶñÒâÌáÐÑ£¬£¬£¬£¬£¬£¬£¬»ã×ÜÓû§Ìض¨ÈÕÆÚµÄ¾Û»áÊý¾Ý£¬£¬£¬£¬£¬£¬£¬½¨ÉèÐÂÈÕÀúÊÂÎñ²¢Ð´ÈëÕªÒª¡£¡£¡£¡£¡£ÔÚÐí¶àÆóÒµÉèÖÃÖУ¬£¬£¬£¬£¬£¬£¬¸ÃÐÂÊÂÎñ¶Ô¹¥»÷Õ߿ɼû£¬£¬£¬£¬£¬£¬£¬Ê¹ÆäÄÜÇÔȡ˽ÈËÊý¾Ý¶øÓû§¾ø²»ÖªÇé¡£¡£¡£¡£¡£´Ë´ÎÅû¶ÕýÖµÆäËûAIÇå¾²Îó²îƵ·¢Ö®¼Ê¡£¡£¡£¡£¡£VaronisÐÎòµÄ¡°Reprompt¡±¹¥»÷¿ÉÈÆ¹ýÆóÒµÇå¾²¿ØÖÆÌáÈ¡Microsoft CopilotÃô¸ÐÊý¾Ý£» £»£»£»XM CyberÔڹȸèÔÆVertex AIºÍRayÖз¢Ã÷ȨÏÞÌáÉýÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíµÍȨÏÞ¹¥»÷ÕßÐ®ÖÆ¸ßȨÏÞЧÀÍÊðÀí£» £»£»£»The Librarian¹¤¾ß±£´æ¶à¸öÎó²î£¨CVE-2026-0612µÈ£©£¬£¬£¬£¬£¬£¬£¬¿Éй¶ÄÚ²¿»ù´¡ÉèÊ©ÐÅÏ¢£» £»£»£»ÏµÍ³ÌáÐÑÌáÈ¡Îó²îͨ¹ýLLMÖúÊÖÌáȡϵͳÌáÐÑ£» £»£»£»Claude CodeÊг¡±£´æ¶ñÒâ²å¼þ¹¥»÷£» £»£»£»Cursor±£´æRCEÎó²î£¨CVE-2026-22708£©£¬£¬£¬£¬£¬£¬£¬¿ÉʹÓÃShellÏÂÁîʵÏÖÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£


https://thehackernews.com/2026/01/google-gemini-prompt-injection-flaw.html


2. EverestÀÕË÷Èí¼þ×éÖ¯Ðû³ÆÈëÇÖÂóµ±ÀÍÓ¡¶È¹«Ë¾


1ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬£¬EverestÀÕË÷Èí¼þ×éÖ¯ÔÚÆä°µÍøÐ¹Â¶ÍøÕ¾Ðû³ÆÒÑÈëÇÖÂóµ±ÀÍÓ¡¶È¹«Ë¾£¬£¬£¬£¬£¬£¬£¬²¢ÇÔÈ¡¸ß´ï861GBµÄ¿Í»§Êý¾Ý¼°¹«Ë¾ÄÚ²¿Îļþ¡£¡£¡£¡£¡£¸Ã×é֯ͨ¹ýÐû²¼ÄÚ²¿½ØÍ¼×ôÖ¤Æä˵·¨£¬£¬£¬£¬£¬£¬£¬½ØÍ¼ÏÔÊ¾Éæ¼°2023ÖÁ2026ÄêµÄ²ÆÎñ±¨¸æ¡¢É󼯏ú×ټͼ¡¢±¾Ç®¸ú×Ù±í¡¢ERPǨáãÎļþ¡¢¶¨¼ÛÊý¾Ý¼°Ãô¸ÐÄÚ²¿Í¨Ñ¶¼Í¼¡£¡£¡£¡£¡£¶à¸öĿ¼°´ÔÂϸ·Ö£¬£¬£¬£¬£¬£¬£¬ÌåÏÖÆä¶Ô»á¼Æ»òÆóÒµ×ÊÔ´ÍýÏëϵͳӵÓнṹ»¯»á¼ûȨÏÞ¡£¡£¡£¡£¡£ÆäÖС°Í¶×ÊÕßÐÅÏ¢¡±Ä¿Â¼¿ÉÄܰüÀ¨¶­Ê»ἶ±ðÉñÃØ×ÊÁÏ£¬£¬£¬£¬£¬£¬£¬¶ø¡°ÁªÏµÈËÊý¾Ý¿â¡±µç×Ó±í¸ñÔòÏêϸ¼Í¼ÁËÃÀ¹ú¡¢Ó¢¹ú¡¢ÐÂ¼ÓÆÂºÍÓ¡¶ÈµÈµØÍ¶×ÊÕß¼°ÉÌҵͬ°éµÄÐÕÃû¡¢µØµã¡¢µç»°¼°ÓÊÏä¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÄÚ²¿·ÖµêÊý¾Ý°üÀ¨Ë¾ÀíÐÕÃû¡¢mcdonaldsindia.comÓÊÏä¼°ÊýÊ®¼ÒÃŵêµÄÖ±½ÓÁªÏµµç»°¡£¡£¡£¡£¡£EverestÒªÇóÂóµ±ÀÍÓ¡¶È¹«Ë¾ÔÚÁ½ÌìÄÚ»ØÓ¦£¬£¬£¬£¬£¬£¬£¬µ«×èÖ¹ÏÖÔڸù«Ë¾ÉÐδÐû²¼¹Ù·½ÉùÃ÷£¬£¬£¬£¬£¬£¬£¬ÊÂÎñÕæÊµÐÔÈÔÐè½øÒ»²½Ö¤Êµ¡£¡£¡£¡£¡£


https://hackread.com/everest-ransomware-mcdonalds-india-breach-customer-data/


3. ACF Extended¸ßΣÎó²îÒý´ó¹æÄ£Õì̽Σº¦


1ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬WordPressµÄAdvanced Custom Fields: Extended£¨ACF Extended£©²å¼þ±»ÆØ±£´æÑÏÖØÇå¾²Îó²îCVE-2025-14533£¬£¬£¬£¬£¬£¬£¬Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÔ¶³ÌʹÓøÃÎó²î»ñÈ¡ÖÎÀíȨÏÞ¡£¡£¡£¡£¡£¸Ã²å¼þÏÖÔÚÒÑÔÚ10Íò¸öÍøÕ¾ÉÏÆôÓ㬣¬£¬£¬£¬£¬£¬×÷ΪAdvanced Custom Fields£¨ACF£©µÄÀ©Õ¹²å¼þ£¬£¬£¬£¬£¬£¬£¬Îª¿ª·¢Ö°Ô±ºÍ¸ß¼¶ÍøÕ¾¹¹½¨ÕßÌá¹©ÌØÊ⹦Ч¡£¡£¡£¡£¡£Îó²î±£´æÓÚACF Extended 0.9.2.1¼°¸üÔç°æ±¾ÖУ¬£¬£¬£¬£¬£¬£¬Í¨¹ýÀÄÓòå¼þµÄ¡°²åÈëÓû§/¸üÐÂÓû§¡±±íµ¥²Ù×÷ʵÏÖ¡£¡£¡£¡£¡£ÎÊÌâȪԴÔÚÓÚ±íµ¥Óû§½¨Éè»ò¸üÐÂÀú³ÌÖУ¬£¬£¬£¬£¬£¬£¬½ÇÉ«ÏÞÖÆÎ´±»Ç¿ÖÆÖ´ÐУ¬£¬£¬£¬£¬£¬£¬×ÝÈ»×Ö¶ÎÉèÖÃÖÐ׼ȷÉèÖÃÁ˽ÇÉ«ÏÞÖÆ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÈÔ¿Éí§ÒâÉèÖÃÓû§½ÇÉ«£¬£¬£¬£¬£¬£¬£¬´Ó¶øÍêÈ«¿ØÖÆÍøÕ¾¡£¡£¡£¡£¡£¸ÃÎó²îÓÉÇå¾²Ñо¿Ô±Andrea BocchettiÓÚ2025Äê12ÔÂ10ÈÕ·¢Ã÷²¢±¨¸æ£¬£¬£¬£¬£¬£¬£¬¹©Ó¦ÉÌÔÚËÄÌìºóÐû²¼0.9.2.2°æ±¾ÐÞ¸´¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬£¬Æ¾Ö¤wordpress.orgÏÂÔØÍ³¼Æ£¬£¬£¬£¬£¬£¬£¬×ÔÐÞ¸´ÒÔÀ´Ô¼5ÍòÓû§ÏÂÔØÁ˸òå¼þ£¬£¬£¬£¬£¬£¬£¬¼ÙÉèËùÓÐÏÂÔØ¾ùΪ×îа汾£¬£¬£¬£¬£¬£¬£¬ÈÔÓÐÏàͬÊýÄ¿ÍøÕ¾ÃæÁÙ¹¥»÷Σº¦¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/acf-plugin-bug-gives-hackers-admin-on-50-000-wordpress-sites/


4. VoidLinkÔÆ¶ñÒâÈí¼þÌåÏÖ³öÏÔ×ŵÄAIÌìÉúÌØÕ÷


1ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬£¬Check Point ResearchÅû¶ÁËÒÔÔÆÎªÖÐÐĵÄVoidLink¶ñÒâÈí¼þ¿ò¼ÜµÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬¸Ã¿ò¼Ü±»ÆÀ¹ÀΪÓÉÐÑÄ¿¶à±à³ÌÓïÑÔµÄÖйú¿ª·¢Õß½èÖúÈ˹¤ÖÇÄÜÄ£×Ó¿ª·¢¡£¡£¡£¡£¡£×÷Ϊ¸ß¼¶Linux¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬VoidLink°üÀ¨×Ô½ç˵¼ÓÔØÆ÷¡¢Ö²Èë³ÌÐò¡¢rootkit¹æ±ÜÄ£¿£¿£¿£¿£¿£¿£¿é¼°ÊýÊ®¸ö¹¦Ð§À©Õ¹²å¼þ£¬£¬£¬£¬£¬£¬£¬Æä¿ª·¢ÖÜÆÚÖ®¶Ì¡¢´úÂëÁ¿Ö®¾ÞÒý·¢Çå¾²½ç¸ß¶È¹Ø×¢¡£¡£¡£¡£¡£Ñо¿Ö¸³ö£¬£¬£¬£¬£¬£¬£¬VoidLinkµÄ¿ª·¢Ê¼ÓÚ2025Äê11ÔÂÏÂÑ®£¬£¬£¬£¬£¬£¬£¬¿ª·¢ÕßתÏòʹÓÃǶÈëAIÖÐÐÄIDE TRAEµÄÖÇÄÜÖúÊÖTRAE SOLO¡£¡£¡£¡£¡£ÓÉÓÚЧÀÍÆ÷±£´æ¿ª·ÅĿ¼Îó²î£¬£¬£¬£¬£¬£¬£¬¿ª·¢Àú³ÌÖеÄÔ´´úÂë¡¢Îĵµ¡¢³å´ÌÍýÏë¼°ÄÚ²¿ÏîÄ¿½á¹¹±»ÒâÍâй¶¡£¡£¡£¡£¡£Check Point̫ͨ¹ýÎöÕâЩÎļþ·¢Ã÷£¬£¬£¬£¬£¬£¬£¬¿ª·¢Õß½ÓÄɹ淶Çý¶¯¿ª·¢£¨SDD£©Ä£Ê½£¬£¬£¬£¬£¬£¬£¬Í¨¹ýAIÌìÉúº­¸Ç¼Ü¹¹¡¢µü´úºÍ±ê×¼µÄ¶àÍŶӿª·¢ÍýÏë¡£¡£¡£¡£¡£Ö»¹ÜÏîÄ¿ÍýÏëÖÜÆÚΪ16-30ÖÜ£¬£¬£¬£¬£¬£¬£¬µ«ÏÖʵ½öÓÃÒ»Öܼ´ÊµÏÖ¿ÉÔËÐа汾£¬£¬£¬£¬£¬£¬£¬ÖÁ2025Äê12Ô³õ´úÂëÁ¿ÒÑ´ï88,000ÐС£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/voidlink-cloud-malware-shows-clear-signs-of-being-ai-generated/


5. TP-LinkÐÞ¸ßΣÎó²î£º32¿îÆóÒµÉãÏñÍ·Á¢×ã·ÝÑé֤Σº¦


1ÔÂ20ÈÕ£¬£¬£¬£¬£¬£¬£¬TP-Link½üÆÚÐÞ¸´Á˱àºÅΪCVE-2026-0629£¨CVSSÆÀ·Ö8.7£©µÄ¸ßΣÎó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÆäVIGI²úÆ·ÏßÖÐÁè¼Ý32¿îVIGI CºÍVIGI InSightÆóÒµ¼¶CCTVÉãÏñÍ·ÐͺÅ¡£¡£¡£¡£¡£Îó²î½¹µãÔÚÓÚÍâµØWeb½çÃæµÄÃÜÂë»Ö¸´¹¦Ð§±£´æÉí·ÝÑéÖ¤ÈÆ¹ýȱÏÝ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓôËÎó²îͨ¹ýʹÓÿͻ§¶Ë״̬£¬£¬£¬£¬£¬£¬£¬ÔÚδ¾­ÍâµØÍøÂçÉí·ÝÑéÖ¤µÄÇéÐÎÏÂÖ±½ÓÖØÖÃÖÎÀíÔ±ÃÜÂ룬£¬£¬£¬£¬£¬£¬´Ó¶ø»ñµÃ×°±¸µÄÍêÈ«ÖÎÀíȨÏÞ¡£¡£¡£¡£¡£¾ÝÇ徲ͨ¸æÅû¶£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐí¾ÖÓòÍø¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤»úÖÆ£¬£¬£¬£¬£¬£¬£¬Ö±½ÓÐÞ¸ÄÖÎÀíÔ±ÕË»§ÃÜÂë¡£¡£¡£¡£¡£Ò»µ©ÀÖ³ÉʹÓ㬣¬£¬£¬£¬£¬£¬¹¥»÷Õß²»µ«ÄÜ¿ØÖÆÉãÏñÍ·ÉèÖᢻá¼ûʵʱ¼°ÀúÊ·ÊÓÆµÊý¾Ý£¬£¬£¬£¬£¬£¬£¬»¹¿É½«×°±¸ÄÉÈë½©Ê¬ÍøÂçÌᳫDDoS¹¥»÷£¬£¬£¬£¬£¬£¬£¬»ò¸Ä¶¯¼à¿ØÖ¤¾Ý¡¢ÈÅÂÒÆóÒµÔËÓª£¬£¬£¬£¬£¬£¬£¬ÉõÖÁͨ¹ýÉãÏñÍ·×÷ÎªÌø°åÈëÇÖÆóÒµÄÚÍø£¬£¬£¬£¬£¬£¬£¬Òý·¢Ìع¤»î¶¯¡¢ÎïÀíÈëÇÖµÈÑÜÉúΣº¦£¬£¬£¬£¬£¬£¬£¬²¢¿ÉÄÜÒòÇÖÕ¼Òþ˽´¥·¢Ö´·¨Óëî¿Ïµ´¦·Ö¡£¡£¡£¡£¡£


https://securityaffairs.com/187110/hacking/critical-tp-link-vigi-camera-flaw-allowed-remote-takeover-of-surveillance-systems.html


6. "Nomad Leopard"´¹ÂÚ¹¥»÷¾«×¼Õë¶Ô°¢¸»º¹Õþ¸®¹ÍÔ±


1ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬£¬Ó¡¶ÈÍøÂçÇå¾²¹«Ë¾Seqrite¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÕýͨ¹ýαÔì°¢¸»º¹×ÜÀí°ì¹«ÊÒ¹Ù·½º²ÔýµÄÍøÂç´¹ÂÚÓʼþ£¬£¬£¬£¬£¬£¬£¬¶Ô°¢¸»º¹Õþ¸®¹ÍÔ±Ìᳫ¾«×¼¹¥»÷¡£¡£¡£¡£¡£¸Ã¹¥»÷»î¶¯×Ô2025Äê12ÔÂÆð±»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÈ«ÐÄÉè¼ÆÓÕ¶üÎĵµ£¬£¬£¬£¬£¬£¬£¬ÒÔ×Ú½ÌÎʺòÓ↑ͷ¡¢°üÀ¨²ÆÎñÉ걨ָʾ²¢Î±Ôì¸ß¼¶¹ÙÔ±ÊðÃûµÄ"Õýʽ¹«ë¹"£¬£¬£¬£¬£¬£¬£¬ÓÕʹĿµÄ·­¿ªÎļþºóÖ²ÈëFalseCub¶ñÒâÈí¼þ£¬£¬£¬£¬£¬£¬£¬ÊµÏÖÊý¾ÝÇÔÈ¡ÓëÍâ´«¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß½«GitHub×÷ΪÔÝÊ±ÔØºÉÍÐ¹ÜÆ½Ì¨£¬£¬£¬£¬£¬£¬£¬Í¨¹ý12ÔÂÏÂÑ®½¨ÉèµÄÕ˺ŷַ¢¶ñÒâÎļþ£¬£¬£¬£¬£¬£¬£¬Ðж¯¿¢ÊºóѸËÙɾ³ýÄÚÈÝ¡£¡£¡£¡£¡£¸üÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÔÚScribdÉÏ´«ÁË´ó×ÚÖ´·¨ÓëÐÐÕþÎļþ£¬£¬£¬£¬£¬£¬£¬°üÀ¨°¢¸»º¹Õþ¸®Ö¸Áî¡¢¹ú·À²¿Í¨Ñ¶Îļþ¼°ÃÀ¹úÉæ°¢¸»º¹ºÇ»¤ÈËȨÎļþ£¬£¬£¬£¬£¬£¬£¬ÕâЩÖÊÁÏ»ò³ÉΪδÀ´¹¥»÷µÄ"ÓÕ¶ü¿â"¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃ"Afghan Khan"¼ÙÃû£¬£¬£¬£¬£¬£¬£¬ÔÚPinterest¡¢DailymotionµÈƽ̨»î¶¯£¬£¬£¬£¬£¬£¬£¬²¿·ÖÕ˺ŹØÁª°Í»ù˹̹£¬£¬£¬£¬£¬£¬£¬ÇÒÓÃÓÚÖØ¶¨ÏòµÄ¶ÌÁ´½ÓÒàÔ´×Ô°Í»ù˹̹¡£¡£¡£¡£¡£´Ë´Î¹¥»÷±»ÃüÃûΪ"Nomad Leopard"£¬£¬£¬£¬£¬£¬£¬SeqriteÖÒÑÔÆä¹æÄ£¿ÉÄÜÀ©Õ¹ÖÁÆäËû¹ú¼Ò¡£¡£¡£¡£¡£


https://therecord.media/hackers-target-afghan-workers