GoBrute½©Ê¬ÍøÂç½èAIÈõµã¹¥»÷¼ÓÃÜÇ®±ÒÏîÄ¿
Ðû²¼Ê±¼ä 2026-01-081. GoBrute½©Ê¬ÍøÂç½èAIÈõµã¹¥»÷¼ÓÃÜÇ®±ÒÏîÄ¿
1ÔÂ7ÈÕ£¬½üÆÚ£¬GoBruteforcer£¨ÓÖ³ÆGoBrut£©½©Ê¬ÍøÂçÕë¶Ô̻¶·þÎñÆ÷ÉϵļÓÃÜÇ®±Ò¼°Çø¿éÁ´ÏîÄ¿Êý¾Ý¿âÌᳫÐÂÒ»ÂÖ¹¥»÷£¬Æä½¹µãÌØÕ÷ΪʹÓÃÈ˹¤ÖÇÄÜÌìÉúµÄ·þÎñÆ÷ÉèÖÃʾÀýµ¼ÖµÄÈõÃÜÂëÎó²î£¬ÒÔ¼°¹ýʱ¼Ü¹¹ÈçXAMPPµÄĬÈÏÆ¾Ö¤Î£º¦¡£¸Ã¶ñÒâÈí¼þ»ùÓÚGolang¿ª·¢£¬Ö÷ÒªÃé×¼FTP¡¢MySQL¡¢PostgreSQL¼°phpMyAdmin·þÎñ£¬Í¨¹ý±»ÈëÇÖµÄLinux·þÎñÆ÷ɨÃèËæ»ú¹«¹²IPµØµã£¬Ö´Ðб©Á¦ÆÆ½âµÇ¼¹¥»÷¡£Check PointÑо¿ÏÔʾ£¬³¬50,000Ì¨ÃæÏò»¥ÁªÍøµÄ·þÎñÆ÷Ò×Êܹ¥»÷£¬³õʼÈëÇÖ¶àͨ¹ýXAMPP·þÎñÆ÷µÄFTPʵÏÖ£¬ÒòÖÎÀíÔ±³£±£´æÄ¬ÈÏÈõÃÜÂë¡£¹¥»÷Õß»ñÈ¡»á¼ûȨÏÞºó£¬Í¨³£½«Web shellÉÏ´«ÖÁWeb¸ùĿ¼£¬»òͨ¹ýÉèÖùýʧµÄMySQL/phpMyAdminÉÏ´«£¬ÐγÉѬȾÁ´£ºÏÂÔØÆ÷»ñÈ¡IRC»úеÈË£¬×îÖÕ¼ÓÔØ±©Á¦ÆÆ½âÄ£¿é¡£¹¥»÷Æô¶¯ºó£¬ÔÚx86_64¼Ü¹¹ÉÏ¿ÉÆô¶¯¶à´ï95¸öỊ̈߳¬ÑÓ³Ù10-400ÃëºóɨÃèËæ»úIP¹æÄ££¬Ìø¹ý˽ÓÐÍøÂç¡¢AWSÔÆ¼°ÃÀ¹úÕþ¸®ÍøÂ硣ÿ¸öÊÂÇéÀú³ÌÌìÉúËæ»úIPv4µØµã£¬Ì½²â·þÎñ¶Ë¿Ú²¢±éÀúƾ֤ÁÐ±í£¬Î¬³ÖÉ趨²¢·¢¼¶±ð¡£
https://www.bleepingcomputer.com/news/security/new-gobruteforcer-attack-wave-targets-crypto-blockchain-projects/
2. jsPDF¿âÏÖ¸ßΣÎó²îÍþвJavaScriptÓ¦ÓÃÇå¾²
1ÔÂ7ÈÕ£¬ÆÕ±éÓÃÓÚJavaScriptÓ¦ÓóÌÐòÌìÉúPDFµÄjsPDF¿â¿ËÈÕÆØ³öÑÏÖØÇå¾²Îó²î£¨±àºÅCVE-2025-68428£©£¬ÑÏÖØÐÔÆÀ·Ö´ï9.2¡£¸ÃÎó²îÔ´ÓÚ4.0°æ±¾Ç°jsPDFµÄNode.js¹¹½¨°æ±¾Öб£´æµÄÍâµØÎļþ°üÀ¨Óë·¾¶±éÀúΣº¦£¬µ±Óû§¿É¿ØÊäÈëδÂÄÀúÖ¤¼´×÷ΪÎļþ·¾¶×ª´ï¸øloadFileº¯Êýʱ£¬¹¥»÷Õ߿ɽè´Ë¶ÁÈ¡ÍâµØÎļþϵͳÃô¸ÐÊý¾Ý²¢Ç¶ÈëÌìÉúµÄPDFÎļþ£¬ÊµÏÖÊý¾ÝÇÔÈ¡¡£Îó²îÓ°Ïì¹æÄ£Ã÷È·Ö¸ÏòjsPDFµÄNode.js°æ±¾Îļþ£¬Éæ¼°loadFileº¯Êý¼°Å²Óøú¯ÊýµÄÆäËûÒªÁì¡£Ó¦ÓÃÇå¾²¹«Ë¾Endor LabsÆÊÎöÖ¸³ö£¬ÈôÎļþ·¾¶ÎªÓ²±àÂë¡¢Ô´×Ô¿ÉÐÅÉèÖûò½ÓÄÉÑÏ¿áÔÊÐíÁбíÑéÖ¤£¬ÔòʹÓÃÄѶÈÏÔÖø½µµÍ£»µ«¼øÓÚjsPDFÔÚnpm×¢²á±íÿÖܳ¬350Íò´ÎÏÂÔØµÄÆÕ±éʹÓÃÁ¿£¬¸ÃÎó²îÈÔ±»ÆÀ¹ÀΪÒ×±»Æð¾¢Ê¹ÓõĸßΣº¦È±ÏÝ¡£ÐÞ¸´¼Æ»®ÒÑÔÚjsPDF 4.0.0°æ±¾ÖÐʵÑ飬ͨ¹ýĬÈÏÏÞÖÆÎļþϵͳ»á¼û²¢ÒÀÀµNode.jsȨÏÞģʽ×è¶ÏÎó²î·¾¶¡£
https://www.bleepingcomputer.com/news/security/critical-jspdf-flaw-lets-hackers-steal-secrets-via-generated-pdfs/
3. n8nƽ̨"Ni8mare"¸ßΣ©¶¼òª¶³Ì´úÂëÖ´ÐÐΣº¦
1ÔÂ7ÈÕ£¬¿ËÈÕ£¬¿ªÔ´ÊÂÇéÁ÷×Ô¶¯»¯Æ½Ì¨n8n±»ÆØ³ö±àºÅΪCVE-2026-21858µÄ"Ni8mare"¸ßΣÎó²î£¬ÑÏÖØË®Æ½ÆÀ·Ö´ïÂú·Ö10·Ö¡£¸ÃÎó²îÓ°ÏìÈ«Çò³¬10Íǫ̀n8n·þÎñÆ÷ʵÀý£¬¹¥»÷Õß¿ÉÎÞÐèÉí·ÝÑéÖ¤Ô¶³Ì¿ØÖÆÍâµØ°²ÅŵÄn8nƽ̨£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý»òÖ´ÐÐí§ÒâÏÂÁî¡£n8n×÷ΪAIÁìÓòÈÈÃŹ¤¾ß£¬Ã¿ÖÜnpmÏÂÔØÁ¿³¬5Íò´Î£¬Docker HubÀÈ¡Á¿ÆÆÒڴΣ¬Ö÷ÒªÓÃÓÚÅþÁ¬Ó¦Óá¢API¼°·þÎñ¹¹½¨×Ô¶¯»¯ÊÂÇéÁ÷£¬²¢Ö§³ÖÓëLLM·þÎñ¼¯³É¡£Îó²îȪԴÔÚÓÚn8n´¦Öóͷ£webhookÇëÇóʱµÄÄÚÈÝÀàÐÍ»ìÏý»úÖÆ£¬µ±ÇëÇóµÄContent-Type±»Î±ÔìΪ·Çmultipart/form-data£¨Èçapplication/json£©Ê±£¬ÏµÍ³»áÈÆ¹ýÎļþÉÏ´«ÆÊÎöÆ÷µÄÇå¾²·À»¤£¬Ö±½Ó´¦Öóͷ£Îļþ×ֶζøÎ´ÑéÖ¤ÊÇ·ñΪÓÐÓÃÉÏ´«¡£Õâʹ¹¥»÷Õß¿Éͨ¹ý²Ù¿Øreq.body.files¹¤¾ßµÄfilepath²ÎÊý£¬¶ÁÈ¡n8nʵÀýÉϵÄí§ÒâÍâµØÎļþ£¬°üÀ¨´æ´¢APIÃÜÔ¿¡¢OAuthÁîÅÆ¡¢Êý¾Ý¿âƾ֤¡¢ÔÆ´æ´¢»á¼ûȨÏÞµÈÃô¸ÐÐÅÏ¢µÄÉèÖÃÎļþ¡£ÏÖÔÚ£¬n8nÒÑÐû²¼1.121.0¼°ÒÔÉÏÐÞ¸´°æ±¾£¬½¨ÒéÓû§Á¬Ã¦Éý¼¶¡£
https://www.bleepingcomputer.com/news/security/max-severity-ni8mare-flaw-lets-hackers-hijack-n8n-servers/
4. °²×¿¶ñÒâÈí¼þʹÓÃNFCÊÖÒÕʵÏַǽӴ¥Ê½Ö§¸¶Ú²Æ
1ÔÂ8ÈÕ£¬Group-IB×îб¨¸æÕ¹ÏÖ£¬Ò»ÖÖÐÂÐͰ²×¿¶ñÒâÈí¼þÕýͨ¹ýTelegramÖÐÎÄÍøÂç·¸·¨ÉçÇøÈö²¥£¬Ê¹¹¥»÷ÕßÎÞÐèÎïÀí½Ó´¥Êܺ¦ÕßÒøÐп¨¼´¿ÉÍê³É·Ç½Ó´¥Ê½Ö§¸¶Ú²Æ¡£ÏÖÔÚÒÑ·¢Ã÷54¸ö¶ñÒâAPKÑù±¾£¬¶àαװ³ÉÕýµ±½ðÈÚ»òÖ§¸¶Ó¦Óã¬Í¨¹ý¶ÌÐÅ/ÓïÒô´¹ÂÚÓÕÆÓû§×°Ö㬲¢ÒªÇó½«Ö§¸¶¿¨Ìù½üÊÖ»úÒÔ¼¤»îNFCÊý¾Ý²¶»ñ¹¦Ð§¡£¸Ã¶ñÒâÈí¼þ½ÓÄÉ¡°Ë«Ó¦ÓÃÐ×÷¡±Ä£Ê½£ºÊܺ¦ÕßÊÖ»úÖеġ°¶ÁÈ¡Æ÷¡±Ó¦Óò¶»ñNFC¿¨Êý¾Ýºó£¬Í¨¹ýC2·þÎñÆ÷´«ÊäÖÁ·¸·¨·Ö×Ó¿ØÖƵÄ×°±¸£»¹¥»÷ÕßʹÓá°Çû÷Æ÷¡±Ó¦ÓÃÔÚ²»·¨POSÖÕ¶ËÍê³ÉÉúÒ⣬»òͨ¹ýÒÆ¶¯Ç®°üÏ´Ç®ÍøÂçÔÚ¶à¹úʵÌåµê¹ºÎʵÏÖ×ʽð͵ȡ¡£²¿·Ö°¸ÀýÏÔʾ£¬·¸·¨·Ö×Ó¿ÉÍêÈ«ÈÆ¹ýÓëÊܺ¦ÕßÖ±½Ó½Ó´¥£¬½öͨ¹ýÔ¤¼ÓÔØ±»µÁ¿¨Êý¾ÝµÄÒÆ¶¯Ç®°ü¼´¿ÉÍê³ÉÉúÒâ¡£TelegramÉϵÄTX-NFC¡¢X-NFC¡¢NFU PayµÈ¹©Ó¦É̹ûÕæÏúÊÛ´ËÀà¶ñÒâÈí¼þ£¬½ÓÄÉ¶ÌÆÚÊÔÓÃÖÁ¶àÔ¶©ÔĵÄÊÕ·Ñģʽ¡£
https://www.infosecurity-magazine.com/news/ghost-tap-malware-remote-nfc-fraud/
5. µÂÖÝGulshan¹«Ë¾37.7Íò¿Í»§Êý¾ÝÔâй¶
1ÔÂ7ÈÕ£¬×ܲ¿Î»Óڵ¿ËÈøË¹ÖݵÄGulshan Management Services, Inc.¹«Ë¾¿ËÈÕ֤ʵ±¬·¢´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬Ó°ÏìÁè¼Ý377,000Ãû¿Í»§¼°Ô±¹¤¡£¸Ã¹«Ë¾ÔËÓª×ÅÈ«ÃÀ150Óà¼ÒHandi PlusºÍHandi StopÆ·ÅÆ¼ÓÓÍÕ¾Óë±ãµ±µê£¬ÒòÉæ¼°ÏûºÄÕßÖ§¸¶¡¢Ô±¹¤µµ°¸¼°¹©Ó¦Á´Êý¾Ý£¬³ÉΪ¹¥»÷Ä¿µÄ¡£¾ÝÏòÃåÒòÖÝ×ÜÉó²é³¤Ìá½»µÄÎļþÅû¶£¬2025Äê9ÔÂ17ÈÕÖÁ27ÈÕʱ´ú£¬¹¥»÷Õß²»·¨»á¼ûÁ˸ù«Ë¾Íⲿϵͳ£¬Îó²îÖ±ÖÁ27Èղű»·¢Ã÷¡£È»¶ø£¬ÊÜÓ°ÏìСÎÒ˽¼ÒÖ±ÖÁ2026Äê1ÔÂ5ÈÕ²ÅÊÕµ½ÊéÃæÍ¨Öª£¬¾àÀëÊÂÎñ¿¢ÊÂÒѳ¬Èý¸öÔ£¬Ô¶³¬Ö´·¨»®¶¨µÄת´ïʱÏÞ¡£´Ë´ÎÐ¹Â¶Éæ¼°Ãô¸ÐÐÅÏ¢°üÀ¨ÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂë¡¢¼Ýʻ֤ºÅ¡¢Õþ¸®ID£¨È绤ÕÕ/ÖÝÉí·ÝÖ¤£©¡¢ÒøÐÐÕ˺ż°ÐÅÓÿ¨/½è¼Ç¿¨ºÅÂëµÈ£¬ÏÔÖøÔöÌíÉí·Ý͵ÇÔΣº¦¡£µÂ¿ËÈøË¹ÖÝ×ÜÉó²éÓŵãµÄ×ÔÁ¦±¨¸æ½øÒ»²½Ö¤Êµ£¬²ÆÎñÐÅÏ¢ÓëÉí·Ý±êʶÊý¾ÝµÄ̻¶ʹÊܺ¦ÕßÃæÁÙ½ðÈÚڲƼ°Éí·ÝðÓõÄË«ÖØÍþв¡£
https://hackread.com/data-breach-us-gas-stations-company/
6. Óʼþ·ÓÉÉèÖÃÎó²î³É´¹ÂÚ¹¥»÷ÐÂ;¾¶
1ÔÂ7ÈÕ£¬Î¢Èí×îб¨¸æÕ¹ÏÖ£¬×Ô2025Äê5ÔÂÆð£¬ÍøÂç´¹ÂÚ¹¥»÷ÕßÕýʹÓÃÉèÖùýʧµÄÓʼþ·ÓɺÍÓÕÆ±£»¤²½·¥£¬Î±Ôì×éÖ¯»ú¹¹ÓòÃû·¢ËÍ¿´ËÆÄÚ²¿ÓʼþµÄ´¹ÂÚÐÅÏ¢£¬²¢Í¨¹ýTycoon2FAµÈÉí·ÝÈÏÖ¤¼´·þÎñ£¨PhaaS£©Æ½Ì¨ÇÔȡƾ֤¡£´ËÀ๥»÷ͨ¹ýÖØºàáéÓɳ¡¾°ºÍ±¡Èõ·À»¤²½·¥£¬Ê¹ÓʼþÖ÷ÌâαװÕëÑÔÒôÓʼþ¡¢¹²ÏíÎĵµ¡¢ÈËÁ¦×ÊԴ֪ͨ¡¢ÃÜÂëÖØÖõȳ£¼û³¡¾°£¬ÓÕµ¼Êܺ¦Õßµã»÷Á´½Ó½øÈëÐéαÑéÖ¤ÂëÒ³Ãæ£¬×îÖÕÌø×ªÖÁTycoon2FA´¹ÂÚ½çÃæ£¬²»µ«ÇÔÈ¡Õ˺ÅÃÜÂ룬»¹¿ÉÈÆ¹ý¶àÒòËØÈÏÖ¤£¨MFA£©ÊµÑé½ðÈÚÕ©Æ¡£¹¥»÷ÀÖ³ÉÒªº¦ÔÚÓÚÄ¿µÄ×â»§µÄÓʼþϵͳ±£´æÉèÖÃȱÏÝ£ºMX¼Í¼δָÏòOffice 365¡¢DMARCÕ½ÂÔÉèΪ¡°ÎÞ¡±»ò¿íËÉģʽ¡¢SPFÑé֤δÆôÓÃӲʧ°Ü¡¢DKIMÊðÃûȱʧ»òµÚÈý·½ÅþÁ¬Æ÷ÉèÖùýʧ¡£ÕâЩÎó²îʹ¹¥»÷ÕßÄÜαÔì¡°·¢¼þÈË¡±Óë¡°ÊÕ¼þÈË¡±ÏàͬµØµãµÄÓʼþ£¬ÖÆÔì¡°ÄÚ²¿Í¨Ñ¶¡±¼ÙÏó¡£Ö»¹ÜÓʼþÍ·¿ÉÄÜÏÔʾSPF/DMARCÑé֤ʧ°Ü¡¢È±ÉÙDKIMÊðÃû»òÀ´×ÔÄäÃûÍⲿ·þÎñÆ÷£¬µ«ÔÚ·À»¤È±Ê§µÄÇéÐÎÖÐÈÔÄÜÖ±´ïÓû§ÊÕ¼þÏä¡£
https://securityaffairs.com/186638/hacking/misconfigured-email-routing-enables-internal-spoofed-phishing.html


¾©¹«Íø°²±¸11010802024551ºÅ