ºÚ¿ÍʹÓÃÇå¾²²âÊÔÓ¦ÓóÌÐòÈëÇֲƲú500Ç¿ÆóÒµ
Ðû²¼Ê±¼ä 2026-01-231. ºÚ¿ÍʹÓÃÇå¾²²âÊÔÓ¦ÓóÌÐòÈëÇֲƲú500Ç¿ÆóÒµ
1ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬×Ô¶¯»¯ÉøÍ¸²âÊÔ¹«Ë¾Pentera×îÐÂÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÕýʹÓþÓÐÄÉèÖÃÎó²îµÄÇå¾²Åàѵ¼°ÉøÍ¸²âÊÔWebÓ¦Óã¨ÈçDVWA¡¢OWASP Juice ShopµÈ£©£¬£¬£¬£¬£¬£¬¶Ô²Æ²ú500Ç¿ÆóÒµ¼°Çå¾²³§É̵ÄÔÆÇéÐÎʵÑéÈëÇÖ¡£¡£¡£¡£¡£¡£¡£ÕâЩӦÓÃÒòÉèÖùýʧ̻¶ÓÚ¹«¹²»¥ÁªÍø£¬£¬£¬£¬£¬£¬²¢ÓëȨÏÞ¹ý¸ßµÄIAM½ÇÉ«¹ØÁª£¬£¬£¬£¬£¬£¬°²ÅÅÔÚAWS¡¢GCP¡¢AzureµÈÔÆÆ½Ì¨£¬£¬£¬£¬£¬£¬ÐγÉÑÏÖØÇ徲Σº¦¡£¡£¡£¡£¡£¡£¡£Ñо¿ÍŶÓÔÚ¹«¹²ÍøÂç·¢Ã÷1926¸ö±£´æÎó²îµÄ»îÔ¾Ó¦ÓÃʵÀý£¬£¬£¬£¬£¬£¬²¿·ÖÊôÓÚCloudflare¡¢F5¡¢Palo Alto NetworksµÈ×ÅÃûÆóÒµ¡£¡£¡£¡£¡£¡£¡£ÕâЩʵÀýÖУ¬£¬£¬£¬£¬£¬³¬°ëÊýÈÔʹÓÃĬÈÏÆ¾Ö¤£¬£¬£¬£¬£¬£¬Î´×ñÕÕ"×îСȨÏÞ"ÔÔò£¬£¬£¬£¬£¬£¬µ¼Ö¹¥»÷Õß¿ÉÈÝÒ×»ñÈ¡S3´æ´¢Í°¡¢Secrets Manager¶ÁдȨÏÞ£¬£¬£¬£¬£¬£¬ÉõÖÁ»ñµÃÔÆÇéÐÎÖÎÀíÔ±»á¼ûȨ¡£¡£¡£¡£¡£¡£¡£Pentera֤ʵ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÒÑʹÓÃÕâЩÈë¿Úµã°²ÅżÓÃÜÇ®±ÒÍÚ¿ó³ÌÐò£¨ÈçXMRig£©¡¢webshell¼°³¤ÆÚ»¯»úÖÆ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÃûΪ"filemanager.php"µÄwebshellÖ§³ÖÎļþ²Ù×÷ÓëÏÂÁîÖ´ÐУ¬£¬£¬£¬£¬£¬ÆäÊ±ÇøÉèÖÃΪŷÖÞ/Ã÷˹¿Ë£¨UTC+3£©£¬£¬£¬£¬£¬£¬¿ÉÄÜÌåÏÖ¹¥»÷ÕßȪԴ¡£¡£¡£¡£¡£¡£¡£ÕâЩ¶ñÒâ³ÌÐòÔÚPentera֪ͨÏà¹Ø¹«Ë¾ºóÈÔÒ»Á¬»î¶¯£¬£¬£¬£¬£¬£¬Ö±ÖÁÆóÒµÐÞ¸´ÎÊÌâ¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-security-testing-apps-to-breach-fortune-500-firms/
2. LastPass´¹ÂÚ¹¥»÷ʹÓÃά»¤Í¨ÖªÓÕÆÓû§±¸·Ý
1ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬£¬ÃÜÂëÖÎÀíÆ½Ì¨LastPassÐû²¼Çå¾²ÖÒÑÔ£¬£¬£¬£¬£¬£¬½ÒÆÆÒ»ÖÖαװ³ÉЧÀÍά»¤Í¨ÖªµÄÐÂÐÍÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß×Ô1ÔÂ19ÈÕÆð£¬£¬£¬£¬£¬£¬Í¨¹ý·¢ËÍÖ÷ÌâΪ"LastPass»ù´¡¼Ü¹¹¸üУºÁ¬Ã¦±£»£»£»£»£»¤ÄúµÄ°ü¹Ü¿â""ά»¤Ç°±¸·ÝÄúµÄ°ü¹Ü¿â£¨24Сʱ´°¿ÚÆÚ£©"µÈÓʼþ£¬£¬£¬£¬£¬£¬ÓÕµ¼Óû§ÔÚ24СʱÄÚ±¸·ÝÊý¾Ý°ü¹Ü¿â¡£¡£¡£¡£¡£¡£¡£ÕâЩÓʼþαװ³É¹Ù·½Í¨Ñ¶£¬£¬£¬£¬£¬£¬Éù³ÆÒò»ù´¡Éèʩά»¤Ð轨ÉèÍâµØ±¸·ÝÒÔÈ·±£Êý¾ÝÇå¾²£¬£¬£¬£¬£¬£¬²¢Ç¿µ÷"ÍòÒ»·ºÆðÊÖÒÕÄÑÌ⣬£¬£¬£¬£¬£¬±¸·Ý¿É°ü¹ÜÐÅÏ¢Çå¾²¿É»Ö¸´"£¬£¬£¬£¬£¬£¬¿ÌÒâÖÆÔì½ôÆÈ¸ÐÒÔʵÑéÉç»á¹¤³Ì¹¥»÷¡£¡£¡£¡£¡£¡£¡£¾ÝLastPassÍþвÇ鱨ÍŶÓÅû¶£¬£¬£¬£¬£¬£¬¶ñÒâÓʼþȪԴ°üÀ¨"support@lastpass[.]server8""support@sr22vegas[.]com"µÈ·ÂðµØµã¡£¡£¡£¡£¡£¡£¡£Óû§µã»÷ÓʼþÖеÄ"Á¬Ã¦½¨×°±¸·Ý"°´Å¥ºó£¬£¬£¬£¬£¬£¬½«±»Öض¨ÏòÖÁ"mail-lastpass[.]com"´¹ÂÚÍøÕ¾¡£¡£¡£¡£¡£¡£¡£¸ÃÍøÕ¾ËäÏÖÔÚÒÑÀëÏߣ¬£¬£¬£¬£¬£¬µ«¹¥»÷ÕßÒâͼͨ¹ýÓÕµ¼Óû§ÊäÈëÖ÷ÃÜÂë»òÖ´ÐжñÒâ²Ù×÷£¬£¬£¬£¬£¬£¬ÊµÏÖÕË»§Ð®ÖÆ»òƾ֤ÇÔÈ¡¡£¡£¡£¡£¡£¡£¡£LastPassÇ¿µ÷£¬£¬£¬£¬£¬£¬¹«Ë¾¾ø²»»áÒªÇóÓû§Í¨¹ýÓʼþ±¸·Ý°ü¹Ü¿â£¬£¬£¬£¬£¬£¬¸ü²»»áË÷ÒªÖ÷ÃÜÂ룬£¬£¬£¬£¬£¬Óû§Ó¦Ö±½Óͨ¹ý¹Ù·½ÇþµÀ±¨¸æ¿ÉÒÉÊÂÎñÖÁ"mailto:abuse@lastpass.com"¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fake-lastpass-emails-pose-as-password-vault-backup-alerts/
3. Chainlit AI¿ò¼ÜÎó²îµ¼ÖºڿÍÈëÇÖÔÆÇéÐÎ
1ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬¿ªÔ´¶Ô»°Ê½AI¿ò¼ÜChainlit±»ÆØ±£´æÁ½¸ö¸ßΣÎó²î"ChainLeak"£¨CVE-2026-22218¡¢CVE-2026-22219£©£¬£¬£¬£¬£¬£¬ÎÞÐèÓû§½»»¥¼´¿É±»Ê¹Ó㬣¬£¬£¬£¬£¬Ó°ÏìÈ«Çò¶à¸öÐÐÒµ°²ÅŵĻ¥ÁªÍøAIϵͳ¡£¡£¡£¡£¡£¡£¡£¸Ã¿ò¼ÜÔÚPyPIÔ¾ùÏÂÔØÁ¿´ï70Íò´Î£¬£¬£¬£¬£¬£¬ÄêÏÂÔØÁ¿³¬500Íò´Î£¬£¬£¬£¬£¬£¬ÆÕ±éÓÃÓÚÆóÒµ¡¢Ñ§Êõ»ú¹¹µÄAIÓ¦Óù¹½¨£¬£¬£¬£¬£¬£¬ÌṩÏÖ³É̸Ìì½çÃæ¡¢Éí·ÝÑéÖ¤¼°Ôư²ÅÅÖ§³Ö¡£¡£¡£¡£¡£¡£¡£Îó²îϸ½ÚÏÔʾ£¬£¬£¬£¬£¬£¬CVE-2026-22218Ϊí§ÒâÎļþ¶ÁÈ¡Îó²î£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃ/project/element¶ËµãÌá½»¶ñÒâ"path"²ÎÊý£¬£¬£¬£¬£¬£¬Ç¿ÖÆÐ§ÀÍÆ÷½«Ö¸¶¨Â·¾¶Îļþ¸´ÖÆÖÁ¹¥»÷Õ߻Ự£¬£¬£¬£¬£¬£¬´Ó¶øÇÔÈ¡APIÃÜÔ¿¡¢ÔÆÆ¾Ö¤¡¢Ô´´úÂë¡¢SQLiteÊý¾Ý¿âµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£CVE-2026-22219ΪЧÀÍÆ÷¶ËÇëÇóαÔ죨SSRF£©Îó²î£¬£¬£¬£¬£¬£¬Ó°ÏìʹÓÃSQLAlchemyÊý¾Ý²ãµÄ°²ÅÅ£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý"url"×Ö¶ÎÓÕµ¼Ð§ÀÍÆ÷ÌᳫÍⲿGETÇëÇó²¢´æ´¢ÏìÓ¦£¬£¬£¬£¬£¬£¬½ø¶øÍ¨¹ýÔªËØÏÂÔØ¶Ëµã»ñÈ¡Êý¾Ý£¬£¬£¬£¬£¬£¬ÊµÏÖÄÚ²¿Ð§ÀÍ̽²â¼°REST API»á¼û¡£¡£¡£¡£¡£¡£¡£Zafran LabsÑо¿Ö°Ô±Ö¤Êµ£¬£¬£¬£¬£¬£¬Á½Îó²î¿É×éºÏ³É¹¥»÷Á´£¬£¬£¬£¬£¬£¬µ¼ÖÂϵͳÍêÈ«ÈëÇÖ¼°ÔÆÇéÐκáÏòÒÆ¶¯¡£¡£¡£¡£¡£¡£¡£Îó²îÓÚ2025Äê11ÔÂ23ÈÕÊ״α¨¸æ£¬£¬£¬£¬£¬£¬12ÔÂ9ÈÕ»ñά»¤ÕßÈ·ÈÏ£¬£¬£¬£¬£¬£¬12ÔÂ24ÈÕͨ¹ýChainlit 2.9.4°æ±¾ÐÞ¸´£¬£¬£¬£¬£¬£¬×îа汾Ϊ2.9.6¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/chainlit-ai-framework-bugs-let-hackers-breach-cloud-environments/
4. ÐÂÐÍOsirisÀÕË÷Èí¼þÏÖÉí£¬£¬£¬£¬£¬£¬POORTRYÇý¶¯ÊµÑéBYOVD¹¥»÷
1ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬¶«ÄÏÑÇÒ»¼Ò´óÐÍʳÎïЧÀÍÌØÐíı»®ÉÌ2025Äê11ÔÂÔâÓöÐÂÐÍÀÕË÷Èí¼þOsiris¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÈüÃÅÌú¿ËÓëCarbon BlackÍŶÓÅû¶£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷ʹÓÃÃûΪPOORTRYµÄ¶ñÒâÇý¶¯³ÌÐò£¬£¬£¬£¬£¬£¬Í¨¹ý"×Ô´øÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐò£¨BYOVD£©"ÊÖÒÕ½ûÓÃÇå¾²Èí¼þ£¬£¬£¬£¬£¬£¬Óë2016ÄêLocky±äÖÖÎ޹ء£¡£¡£¡£¡£¡£¡£Osiris½ÓÄÉ»ìÏý¼ÓÃܼƻ®£¬£¬£¬£¬£¬£¬ÎªÃ¿¸öÎļþÌìÉúΨһÃÜÔ¿£¬£¬£¬£¬£¬£¬¾ß±¸×èֹЧÀÍ¡¢Ö¸¶¨¼ÓÃܹæÄ£¡¢ÖÕÖ¹Àú³Ì¼°Í¶·ÅÀÕË÷ÐŵÈÄÜÁ¦£¬£¬£¬£¬£¬£¬Ä¬ÈÏÖÕÖ¹Office¡¢Exchange¡¢VeeamµÈÀú³Ì£¬£¬£¬£¬£¬£¬±»ÆÀ¹ÀΪÂÄÀú¸»ºñ¹¥»÷ÕߵĸßЧ¹¤¾ß¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ýRclone½«Ãô¸ÐÊý¾ÝÇÔÈ¡ÖÁWasabiÔÆ´æ´¢£¬£¬£¬£¬£¬£¬Ê¹ÓÃNetscan¡¢Netexec¡¢MeshAgent¼°¶¨ÖÆRustdeskµÈË«ÓÃ;¹¤¾ß£¬£¬£¬£¬£¬£¬²¢°²ÅÅKillAV¹¤¾ßÌáÉýȨÏÞ¡£¡£¡£¡£¡£¡£¡£ÏßË÷ÏÔʾÆä¿ÉÄÜÓëINCÀÕË÷Èí¼þ£¨ÓÖÃûWarble£©±£´æ¹ØÁª£¬£¬£¬£¬£¬£¬ÒòʹÓÃÁËÏàͬ°æ±¾µÄMimikatz¹¤¾ß£¨kaz.exe£©¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2026/01/new-osiris-ransomware-emerges-as-new.html
5. SmarterMailÖÎÀíÔ±ÃÜÂëÖØÖÃÎó²îÔâºÚ²úÄæÏòʹÓÃ
1ÔÂ22ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾watchTowr 1ÔÂ8ÈÕÅû¶SmarterToolsÆìÏÂSmarterMailÓʼþЧÀÍÆ÷±£´æ¸ßΣÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îλÓÚ"force-reset-password"API¶Ëµã£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÎÞÐèÈÏÖ¤¼´¿Éͨ¹ý·¢ËͰüÀ¨"IsSysAdmin":trueµÄJSONÊý¾Ý£¬£¬£¬£¬£¬£¬Ç¿ÖÆÖØÖÃϵͳÖÎÀíÔ±ÃÜÂë²¢»ñµÃÍêÈ«¿ØÖÆÈ¨ÏÞ¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜSmarterMailÔÚ1ÔÂ15ÈÕ½ôÆÈÐû²¼Build 9511°æ±¾ÐÞ¸´´ËÎó²î£¬£¬£¬£¬£¬£¬µ«Ñо¿Ö°Ô±·¢Ã÷¹¥»÷Õß½öÓÃÁ½Ìì±ãÄæÏò²¹¶¡²¢ÊµÑéʹÓ㬣¬£¬£¬£¬£¬Ó¡Ö¤ºÚ²ú¶Ô²¹¶¡µÄ¸ßÐ§ÄæÏòÄÜÁ¦¡£¡£¡£¡£¡£¡£¡£ÊÖÒÕÆÊÎöÏÔʾ£¬£¬£¬£¬£¬£¬¸ÃAPI¶ËµãδÑéÖ¤¾ÉÃÜÂë×ֶΣ¬£¬£¬£¬£¬£¬¹¥»÷ÕßÖ»ÐèÖªÏþÖÎÀíÔ±Óû§Ãû¼´¿ÉÍê³ÉÃÜÂëÐ®ÖÆ¡£¡£¡£¡£¡£¡£¡£ÀÖ³ÉÈëÇֺ󣬣¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÖ´ÐвÙ×÷ϵͳÏÂÁîʵÏÖÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£¡£¡£watchTowrͨ¹ý¿´·¨ÑéÖ¤ÑÝʾÁËϵͳ¼¶shell»á¼û£¬£¬£¬£¬£¬£¬²¢´ÓÄäÃûÏßÈË´¦»ñÖªÏÖʵ¹¥»÷°¸Àý£¬£¬£¬£¬£¬£¬ÂÛ̳Ìû×ÓÏÔʾÓй¥»÷ÕßÕýÔÚÅúÁ¿ÖØÖÃÖÎÀíÔ±ÃÜÂ룬£¬£¬£¬£¬£¬ÈÕÖ¾ÆÊÎö֤ʵ¹¥»÷ĿȷʵΪ"force-reset-password"¶Ëµã¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/smartermail-auth-bypass-flaw-now-exploited-to-hijack-admin-accounts/
6. Á¢Ñ¶Ï¸ÃÜÔâÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬Æ»¹ûµÈÆóÒµ½¹µãÉñÃØÃæÁÙй¶Σº¦
1ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬Æ»¹û½¹µã´ú¹¤³§Á¢Ñ¶Ï¸ÃÜ2025Äê12ÔÂ15ÈÕÔâÓöÒÉËÆÓÉRansomHubºÚ¿Í×éÖ¯ÌᳫµÄÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÔÚ°µÍøÂÛ̳Ðû³ÆÒѼÓÃÜÁ¢Ñ¶Ï¸ÃÜÊý¾Ý£¬£¬£¬£¬£¬£¬²¢ÍþвÈô²»Ö§¸¶Êê½ð½«Ð¹Â¶Æ»¹û¡¢Ó¢Î°´ï¡¢LGµÈÆóÒµÉñÃØÊý¾Ý¡£¡£¡£¡£¡£¡£¡£Á¢Ñ¶Ï¸ÃÜ×÷Ϊƻ¹ûÖ÷ÒªÏàÖúͬ°é£¬£¬£¬£¬£¬£¬ÈÏÕæiPhone¡¢AirPods¡¢Apple Watch¼°Í·ÏÔ×°±¸×é×°£¬£¬£¬£¬£¬£¬ÕÆÎÕ´ó×Ú½¹µãÉñÃØÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£Ñо¿ÍŶӯÊÎöºÚ¿ÍÅû¶µÄÊý¾ÝÑù±¾·¢Ã÷£¬£¬£¬£¬£¬£¬Ð¹Â¶ÄÚÈݺ¸Ç2019-2025Äê¼äÆ»¹ûÓëÁ¢Ñ¶Ï¸ÃÜÏàÖúµÄ×°±¸Î¬ÐÞ¡¢ÎïÁ÷ÔËÊäµÈÏîĿϸ½Ú£¬£¬£¬£¬£¬£¬°üÀ¨Ê±¼äÍýÏë¡¢ÏêϸÁ÷³Ì¼°¿Í»§×ÊÁÏ¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Êý¾ÝÖаüÀ¨Ô±¹¤ÐÕÃû¡¢Ö°Î»¡¢ÊÂÇéÓÊÏäµÈÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬ÒÔ¼°.dwg¡¢GerberµÈÉè¼ÆÎļþ£¬£¬£¬£¬£¬£¬Éæ¼°3D CADÄ£×Ó¡¢µç·°åÖÆÔìÊý¾Ý¡¢µçÆø¼Ü¹¹µÈ¸ß¶ÈÃô¸ÐÉÌÒµÔËÓªÄÚÈÝ¡£¡£¡£¡£¡£¡£¡£RansomHubÉù³ÆÒÑ»ñȡƻ¹û¡¢Ó¢Î°´ï¡¢LG¡¢¼ªÏé¡¢ÌØË¹ÀµÈ¶à¼ÒÆóÒµµÄ3D¹¤³ÌÉè¼Æ¡¢2D×é¼þͼֽ¡¢PDF¹¤³Ìͼ¼°Ó¡Ë¢µç·°åÖÆÔìÊý¾Ý£¬£¬£¬£¬£¬£¬ÕâЩÊܱ£ÃÜÐÒé±£»£»£»£»£»¤µÄÉú²úÑз¢ÐÅÏ¢Èô±»Ð¹Â¶£¬£¬£¬£¬£¬£¬¿ÉÄܱ»¾ºÕùµÐÊÖÓÃÓÚ·´ÏòÑз¢»òÖÆÔì·Âð²úÆ·£¬£¬£¬£¬£¬£¬½ÚÔ¼ÊýÄêÑз¢±¾Ç®¡£¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/luxshare-apple-iphone-assembler-breach/


¾©¹«Íø°²±¸11010802024551ºÅ