ºÚ¿ÍʹÓÃÇå¾²²âÊÔÓ¦ÓóÌÐòÈëÇֲƲú500Ç¿ÆóÒµ
Ðû²¼Ê±¼ä 2026-01-231. ºÚ¿ÍʹÓÃÇå¾²²âÊÔÓ¦ÓóÌÐòÈëÇֲƲú500Ç¿ÆóÒµ
1ÔÂ21ÈÕ£¬×Ô¶¯»¯ÉøÍ¸²âÊÔ¹«Ë¾Pentera×îÐÂÊÓ²ìÏÔʾ£¬ÍþвÐÐΪÕßÕýʹÓþÓÐÄÉèÖÃÎó²îµÄÇå¾²Åàѵ¼°ÉøÍ¸²âÊÔWebÓ¦Óã¨ÈçDVWA¡¢OWASP Juice ShopµÈ£©£¬¶Ô²Æ²ú500Ç¿ÆóÒµ¼°Çå¾²³§É̵ÄÔÆÇéÐÎʵÑéÈëÇÖ¡£ÕâЩӦÓÃÒòÉèÖùýʧ̻¶ÓÚ¹«¹²»¥ÁªÍø£¬²¢ÓëȨÏÞ¹ý¸ßµÄIAM½ÇÉ«¹ØÁª£¬°²ÅÅÔÚAWS¡¢GCP¡¢AzureµÈÔÆÆ½Ì¨£¬ÐγÉÑÏÖØÇ徲Σº¦¡£Ñо¿ÍŶÓÔÚ¹«¹²ÍøÂç·¢Ã÷1926¸ö±£´æÎó²îµÄ»îÔ¾Ó¦ÓÃʵÀý£¬²¿·ÖÊôÓÚCloudflare¡¢F5¡¢Palo Alto NetworksµÈ×ÅÃûÆóÒµ¡£ÕâЩʵÀýÖУ¬³¬°ëÊýÈÔʹÓÃĬÈÏÆ¾Ö¤£¬Î´×ñÕÕ"×îСȨÏÞ"ÔÔò£¬µ¼Ö¹¥»÷Õß¿ÉÈÝÒ×»ñÈ¡S3´æ´¢Í°¡¢Secrets Manager¶ÁдȨÏÞ£¬ÉõÖÁ»ñµÃÔÆÇéÐÎÖÎÀíÔ±»á¼ûȨ¡£Pentera֤ʵ£¬ºÚ¿ÍÒÑʹÓÃÕâЩÈë¿Úµã°²ÅżÓÃÜÇ®±ÒÍÚ¿ó³ÌÐò£¨ÈçXMRig£©¡¢webshell¼°³¤ÆÚ»¯»úÖÆ¡£±ðµÄ£¬Ñо¿Ö°Ô±·¢Ã÷ÃûΪ"filemanager.php"µÄwebshellÖ§³ÖÎļþ²Ù×÷ÓëÏÂÁîÖ´ÐУ¬ÆäÊ±ÇøÉèÖÃΪŷÖÞ/Ã÷˹¿Ë£¨UTC+3£©£¬¿ÉÄÜÌåÏÖ¹¥»÷ÕßȪԴ¡£ÕâЩ¶ñÒâ³ÌÐòÔÚPentera֪ͨÏà¹Ø¹«Ë¾ºóÈÔÒ»Á¬Ô˶¯£¬Ö±ÖÁÆóÒµÐÞ¸´ÎÊÌâ¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-security-testing-apps-to-breach-fortune-500-firms/
2. LastPass´¹ÂÚ¹¥»÷ʹÓÃά»¤Í¨ÖªÓÕÆÓû§±¸·Ý
1ÔÂ21ÈÕ£¬¿ËÈÕ£¬ÃÜÂëÖÎÀíÆ½Ì¨LastPassÐû²¼Çå¾²ÖÒÑÔ£¬½ÒÆÆÒ»ÖÖαװ³É·þÎñά»¤Í¨ÖªµÄÐÂÐÍÍøÂç´¹ÂÚ¹¥»÷¡£¹¥»÷Õß×Ô1ÔÂ19ÈÕÆð£¬Í¨¹ý·¢ËÍÖ÷ÌâΪ"LastPass»ù´¡¼Ü¹¹¸üУºÁ¬Ã¦±£»¤ÄúµÄ°ü¹Ü¿â""ά»¤Ç°±¸·ÝÄúµÄ°ü¹Ü¿â£¨24Сʱ´°¿ÚÆÚ£©"µÈÓʼþ£¬ÓÕµ¼Óû§ÔÚ24СʱÄÚ±¸·ÝÊý¾Ý°ü¹Ü¿â¡£ÕâЩÓʼþαװ³É¹Ù·½Í¨Ñ¶£¬Éù³ÆÒò»ù´¡Éèʩά»¤Ð轨ÉèÍâµØ±¸·ÝÒÔÈ·±£Êý¾ÝÇå¾²£¬²¢Ç¿µ÷"ÍòÒ»·ºÆðÊÖÒÕÄÑÌ⣬±¸·Ý¿É°ü¹ÜÐÅÏ¢Çå¾²¿É»Ö¸´"£¬¿ÌÒâÖÆÔì½ôÆÈ¸ÐÒÔʵÑéÉç»á¹¤³Ì¹¥»÷¡£¾ÝLastPassÍþвÇ鱨ÍŶÓÅû¶£¬¶ñÒâÓʼþȪԴ°üÀ¨"support@lastpass[.]server8""support@sr22vegas[.]com"µÈ·ÂðµØµã¡£Óû§µã»÷ÓʼþÖеÄ"Á¬Ã¦½¨×°±¸·Ý"°´Å¥ºó£¬½«±»Öض¨ÏòÖÁ"mail-lastpass[.]com"´¹ÂÚÍøÕ¾¡£¸ÃÍøÕ¾ËäÏÖÔÚÒÑÀëÏߣ¬µ«¹¥»÷ÕßÒâͼͨ¹ýÓÕµ¼Óû§ÊäÈëÖ÷ÃÜÂë»òÖ´ÐжñÒâ²Ù×÷£¬ÊµÏÖÕË»§Ð®ÖÆ»òƾ֤ÇÔÈ¡¡£LastPassÇ¿µ÷£¬¹«Ë¾¾ø²»»áÒªÇóÓû§Í¨¹ýÓʼþ±¸·Ý°ü¹Ü¿â£¬¸ü²»»áË÷ÒªÖ÷ÃÜÂ룬Óû§Ó¦Ö±½Óͨ¹ý¹Ù·½ÇþµÀ±¨¸æ¿ÉÒÉÊÂÎñÖÁ"mailto:abuse@lastpass.com"¡£
https://www.bleepingcomputer.com/news/security/fake-lastpass-emails-pose-as-password-vault-backup-alerts/
3. Chainlit AI¿ò¼ÜÎó²îµ¼ÖºڿÍÈëÇÖÔÆÇéÐÎ
1ÔÂ21ÈÕ£¬¿ªÔ´¶Ô»°Ê½AI¿ò¼ÜChainlit±»ÆØ±£´æÁ½¸ö¸ßΣÎó²î"ChainLeak"£¨CVE-2026-22218¡¢CVE-2026-22219£©£¬ÎÞÐèÓû§½»»¥¼´¿É±»Ê¹Óã¬Ó°ÏìÈ«Çò¶à¸öÐÐÒµ°²ÅŵĻ¥ÁªÍøAIϵͳ¡£¸Ã¿ò¼ÜÔÚPyPIÔ¾ùÏÂÔØÁ¿´ï70Íò´Î£¬ÄêÏÂÔØÁ¿³¬500Íò´Î£¬ÆÕ±éÓÃÓÚÆóÒµ¡¢Ñ§Êõ»ú¹¹µÄAIÓ¦Óù¹½¨£¬ÌṩÏÖ³É̸Ìì½çÃæ¡¢Éí·ÝÑéÖ¤¼°Ôư²ÅÅÖ§³Ö¡£Îó²îϸ½ÚÏÔʾ£¬CVE-2026-22218Ϊí§ÒâÎļþ¶ÁÈ¡Îó²î£¬¹¥»÷Õß¿ÉʹÓÃ/project/element¶ËµãÌá½»¶ñÒâ"path"²ÎÊý£¬Ç¿ÖÆ·þÎñÆ÷½«Ö¸¶¨Â·¾¶Îļþ¸´ÖÆÖÁ¹¥»÷Õ߻Ự£¬´Ó¶øÇÔÈ¡APIÃÜÔ¿¡¢ÔÆÆ¾Ö¤¡¢Ô´´úÂë¡¢SQLiteÊý¾Ý¿âµÈÃô¸ÐÐÅÏ¢¡£CVE-2026-22219Ϊ·þÎñÆ÷¶ËÇëÇóαÔ죨SSRF£©Îó²î£¬Ó°ÏìʹÓÃSQLAlchemyÊý¾Ý²ãµÄ°²ÅÅ£¬¹¥»÷Õßͨ¹ý"url"×Ö¶ÎÓÕµ¼·þÎñÆ÷ÌᳫÍⲿGETÇëÇó²¢´æ´¢ÏìÓ¦£¬½ø¶øÍ¨¹ýÔªËØÏÂÔØ¶Ëµã»ñÈ¡Êý¾Ý£¬ÊµÏÖÄÚ²¿·þÎñ̽²â¼°REST API»á¼û¡£Zafran LabsÑо¿Ö°Ô±Ö¤Êµ£¬Á½Îó²î¿É×éºÏ³É¹¥»÷Á´£¬µ¼ÖÂϵͳÍêÈ«ÈëÇÖ¼°ÔÆÇéÐκáÏòÒÆ¶¯¡£Îó²îÓÚ2025Äê11ÔÂ23ÈÕÊ״α¨¸æ£¬12ÔÂ9ÈÕ»ñά»¤ÕßÈ·ÈÏ£¬12ÔÂ24ÈÕͨ¹ýChainlit 2.9.4°æ±¾ÐÞ¸´£¬×îа汾Ϊ2.9.6¡£
https://www.bleepingcomputer.com/news/security/chainlit-ai-framework-bugs-let-hackers-breach-cloud-environments/
4. ÐÂÐÍOsirisÀÕË÷Èí¼þÏÖÉí£¬POORTRYÇý¶¯ÊµÑéBYOVD¹¥»÷
1ÔÂ22ÈÕ£¬¶«ÄÏÑÇÒ»¼Ò´óÐÍʳÎï·þÎñÌØÐíı»®ÉÌ2025Äê11ÔÂÔâÓöÐÂÐÍÀÕË÷Èí¼þOsiris¹¥»÷¡£ÈüÃÅÌú¿ËÓëCarbon BlackÍŶÓÅû¶£¬¸Ã¹¥»÷ʹÓÃÃûΪPOORTRYµÄ¶ñÒâÇý¶¯³ÌÐò£¬Í¨¹ý"×Ô´øÒ×Êܹ¥»÷µÄÇý¶¯³ÌÐò£¨BYOVD£©"ÊÖÒÕ½ûÓÃÇå¾²Èí¼þ£¬Óë2016ÄêLocky±äÖÖÎ޹ء£Osiris½ÓÄÉ»ìÏý¼ÓÃܼƻ®£¬ÎªÃ¿¸öÎļþÌìÉúΨһÃÜÔ¿£¬¾ß±¸×èÖ¹·þÎñ¡¢Ö¸¶¨¼ÓÃܹæÄ£¡¢ÖÕÖ¹Àú³Ì¼°Í¶·ÅÀÕË÷ÐŵÈÄÜÁ¦£¬Ä¬ÈÏÖÕÖ¹Office¡¢Exchange¡¢VeeamµÈÀú³Ì£¬±»ÆÀ¹ÀΪÂÄÀú¸»ºñ¹¥»÷ÕߵĸßЧ¹¤¾ß¡£¹¥»÷Õßͨ¹ýRclone½«Ãô¸ÐÊý¾ÝÇÔÈ¡ÖÁWasabiÔÆ´æ´¢£¬Ê¹ÓÃNetscan¡¢Netexec¡¢MeshAgent¼°¶¨ÖÆRustdeskµÈË«ÓÃ;¹¤¾ß£¬²¢°²ÅÅKillAV¹¤¾ßÌáÉýȨÏÞ¡£ÏßË÷ÏÔʾÆä¿ÉÄÜÓëINCÀÕË÷Èí¼þ£¨ÓÖÃûWarble£©±£´æ¹ØÁª£¬ÒòʹÓÃÁËÏàͬ°æ±¾µÄMimikatz¹¤¾ß£¨kaz.exe£©¡£
https://thehackernews.com/2026/01/new-osiris-ransomware-emerges-as-new.html
5. SmarterMailÖÎÀíÔ±ÃÜÂëÖØÖÃÎó²îÔâºÚ²úÄæÏòʹÓÃ
1ÔÂ22ÈÕ£¬ÍøÂçÇå¾²¹«Ë¾watchTowr 1ÔÂ8ÈÕÅû¶SmarterToolsÆìÏÂSmarterMailÓʼþ·þÎñÆ÷±£´æ¸ßΣÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î¡£¸ÃÎó²îλÓÚ"force-reset-password"API¶Ëµã£¬¹¥»÷ÕßÎÞÐèÈÏÖ¤¼´¿Éͨ¹ý·¢ËͰüÀ¨"IsSysAdmin":trueµÄJSONÊý¾Ý£¬Ç¿ÖÆÖØÖÃϵͳÖÎÀíÔ±ÃÜÂë²¢»ñµÃÍêÈ«¿ØÖÆÈ¨ÏÞ¡£Ö»¹ÜSmarterMailÔÚ1ÔÂ15ÈÕ½ôÆÈÐû²¼Build 9511°æ±¾ÐÞ¸´´ËÎó²î£¬µ«Ñо¿Ö°Ô±·¢Ã÷¹¥»÷Õß½öÓÃÁ½Ìì±ãÄæÏò²¹¶¡²¢ÊµÑéʹÓã¬Ó¡Ö¤ºÚ²ú¶Ô²¹¶¡µÄ¸ßÐ§ÄæÏòÄÜÁ¦¡£ÊÖÒÕÆÊÎöÏÔʾ£¬¸ÃAPI¶ËµãδÑéÖ¤¾ÉÃÜÂë×ֶΣ¬¹¥»÷ÕßÖ»ÐèÖªÏþÖÎÀíÔ±Óû§Ãû¼´¿ÉÍê³ÉÃÜÂëÐ®ÖÆ¡£ÀÖ³ÉÈëÇֺ󣬹¥»÷Õß¿ÉÖ´ÐвÙ×÷ϵͳÏÂÁîʵÏÖÔ¶³Ì´úÂëÖ´ÐС£watchTowrͨ¹ý¿´·¨ÑéÖ¤ÑÝʾÁËϵͳ¼¶shell»á¼û£¬²¢´ÓÄäÃûÏßÈË´¦»ñÖªÏÖʵ¹¥»÷°¸Àý£¬ÂÛ̳Ìû×ÓÏÔʾÓй¥»÷ÕßÕýÔÚÅúÁ¿ÖØÖÃÖÎÀíÔ±ÃÜÂ룬ÈÕÖ¾ÆÊÎö֤ʵ¹¥»÷ĿȷʵΪ"force-reset-password"¶Ëµã¡£
https://www.bleepingcomputer.com/news/security/smartermail-auth-bypass-flaw-now-exploited-to-hijack-admin-accounts/
6. Á¢Ñ¶Ï¸ÃÜÔâÀÕË÷¹¥»÷£¬Æ»¹ûµÈÆóÒµ½¹µãÉñÃØÃæÁÙй¶Σº¦
1ÔÂ19ÈÕ£¬Æ»¹û½¹µã´ú¹¤³§Á¢Ñ¶Ï¸ÃÜ2025Äê12ÔÂ15ÈÕÔâÓöÒÉËÆÓÉRansomHubºÚ¿Í×éÖ¯ÌᳫµÄÀÕË÷Èí¼þ¹¥»÷¡£¸Ã×éÖ¯ÔÚ°µÍøÂÛ̳Ðû³ÆÒѼÓÃÜÁ¢Ñ¶Ï¸ÃÜÊý¾Ý£¬²¢ÍþвÈô²»Ö§¸¶Êê½ð½«Ð¹Â¶Æ»¹û¡¢Ó¢Î°´ï¡¢LGµÈÆóÒµÉñÃØÊý¾Ý¡£Á¢Ñ¶Ï¸ÃÜ×÷Ϊƻ¹ûÖ÷ÒªÏàÖúͬ°é£¬ÈÏÕæiPhone¡¢AirPods¡¢Apple Watch¼°Í·ÏÔ×°±¸×é×°£¬ÕÆÎÕ´ó×Ú½¹µãÉñÃØÐÅÏ¢¡£Ñо¿ÍŶӯÊÎöºÚ¿ÍÅû¶µÄÊý¾ÝÑù±¾·¢Ã÷£¬Ð¹Â¶ÄÚÈݺ¸Ç2019-2025Äê¼äÆ»¹ûÓëÁ¢Ñ¶Ï¸ÃÜÏàÖúµÄ×°±¸Î¬ÐÞ¡¢ÎïÁ÷ÔËÊäµÈÏîĿϸ½Ú£¬°üÀ¨Ê±¼äÍýÏë¡¢ÏêϸÁ÷³Ì¼°¿Í»§×ÊÁÏ¡£±ðµÄ£¬Êý¾ÝÖаüÀ¨Ô±¹¤ÐÕÃû¡¢Ö°Î»¡¢ÊÂÇéÓÊÏäµÈÃô¸ÐСÎÒ˽¼ÒÐÅÏ¢£¬ÒÔ¼°.dwg¡¢GerberµÈÉè¼ÆÎļþ£¬Éæ¼°3D CADÄ£×Ó¡¢µç·°åÖÆÔìÊý¾Ý¡¢µçÆø¼Ü¹¹µÈ¸ß¶ÈÃô¸ÐÉÌÒµÔËÓªÄÚÈÝ¡£RansomHubÉù³ÆÒÑ»ñȡƻ¹û¡¢Ó¢Î°´ï¡¢LG¡¢¼ªÏé¡¢ÌØË¹ÀµÈ¶à¼ÒÆóÒµµÄ3D¹¤³ÌÉè¼Æ¡¢2D×é¼þͼֽ¡¢PDF¹¤³Ìͼ¼°Ó¡Ë¢µç·°åÖÆÔìÊý¾Ý£¬ÕâЩÊܱ£ÃÜÐÒé±£»¤µÄÉú²úÑз¢ÐÅÏ¢Èô±»Ð¹Â¶£¬¿ÉÄܱ»¾ºÕùµÐÊÖÓÃÓÚ·´ÏòÑз¢»òÖÆÔì·Âð²úÆ·£¬½ÚÔ¼ÊýÄêÑз¢±¾Ç®¡£
https://cybernews.com/security/luxshare-apple-iphone-assembler-breach/


¾©¹«Íø°²±¸11010802024551ºÅ