GoBrute½©Ê¬ÍøÂç½èAIÈõµã¹¥»÷¼ÓÃÜÇ®±ÒÏîÄ¿

Ðû²¼Ê±¼ä 2026-01-08

1. GoBrute½©Ê¬ÍøÂç½èAIÈõµã¹¥»÷¼ÓÃÜÇ®±ÒÏîÄ¿


1ÔÂ7ÈÕ£¬£¬£¬ £¬£¬£¬½üÆÚ£¬£¬£¬ £¬£¬£¬GoBruteforcer£¨ÓÖ³ÆGoBrut£©½©Ê¬ÍøÂçÕë¶Ô̻¶ЧÀÍÆ÷ÉϵļÓÃÜÇ®±Ò¼°Çø¿éÁ´ÏîÄ¿Êý¾Ý¿âÌᳫÐÂÒ»ÂÖ¹¥»÷£¬£¬£¬ £¬£¬£¬Æä½¹µãÌØÕ÷ΪʹÓÃÈ˹¤ÖÇÄÜÌìÉúµÄЧÀÍÆ÷ÉèÖÃʾÀýµ¼ÖµÄÈõÃÜÂëÎó²î£¬£¬£¬ £¬£¬£¬ÒÔ¼°¹ýʱ¼Ü¹¹ÈçXAMPPµÄĬÈÏÆ¾Ö¤Î£º¦¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»ùÓÚGolang¿ª·¢£¬£¬£¬ £¬£¬£¬Ö÷ÒªÃé×¼FTP¡¢MySQL¡¢PostgreSQL¼°phpMyAdminЧÀÍ£¬£¬£¬ £¬£¬£¬Í¨¹ý±»ÈëÇÖµÄLinuxЧÀÍÆ÷ɨÃèËæ»ú¹«¹²IPµØµã£¬£¬£¬ £¬£¬£¬Ö´Ðб©Á¦ÆÆ½âµÇ¼¹¥»÷¡£¡£¡£¡£¡£¡£¡£Check PointÑо¿ÏÔʾ£¬£¬£¬ £¬£¬£¬³¬50,000Ì¨ÃæÏò»¥ÁªÍøµÄЧÀÍÆ÷Ò×Êܹ¥»÷£¬£¬£¬ £¬£¬£¬³õʼÈëÇÖ¶àͨ¹ýXAMPPЧÀÍÆ÷µÄFTPʵÏÖ£¬£¬£¬ £¬£¬£¬ÒòÖÎÀíÔ±³£±£´æÄ¬ÈÏÈõÃÜÂë¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß»ñÈ¡»á¼ûȨÏ޺󣬣¬£¬ £¬£¬£¬Í¨³£½«Web shellÉÏ´«ÖÁWeb¸ùĿ¼£¬£¬£¬ £¬£¬£¬»òͨ¹ýÉèÖùýʧµÄMySQL/phpMyAdminÉÏ´«£¬£¬£¬ £¬£¬£¬ÐγÉѬȾÁ´£ºÏÂÔØÆ÷»ñÈ¡IRC»úеÈË£¬£¬£¬ £¬£¬£¬×îÖÕ¼ÓÔØ±©Á¦ÆÆ½âÄ£¿£¿£¿£¿ £¿£¿£¿é¡£¡£¡£¡£¡£¡£¡£¹¥»÷Æô¶¯ºó£¬£¬£¬ £¬£¬£¬ÔÚx86_64¼Ü¹¹ÉÏ¿ÉÆô¶¯¶à´ï95¸öỊ̈߳¬£¬£¬ £¬£¬£¬ÑÓ³Ù10-400ÃëºóɨÃèËæ»úIP¹æÄ££¬£¬£¬ £¬£¬£¬Ìø¹ý˽ÓÐÍøÂç¡¢AWSÔÆ¼°ÃÀ¹úÕþ¸®ÍøÂç¡£¡£¡£¡£¡£¡£¡£Ã¿¸öÊÂÇéÀú³ÌÌìÉúËæ»úIPv4µØµã£¬£¬£¬ £¬£¬£¬Ì½²âЧÀͶ˿ڲ¢±éÀúƾ֤Áбí£¬£¬£¬ £¬£¬£¬Î¬³ÖÉ趨²¢·¢¼¶±ð¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-gobruteforcer-attack-wave-targets-crypto-blockchain-projects/


2. jsPDF¿âÏÖ¸ßΣÎó²îÍþвJavaScriptÓ¦ÓÃÇå¾²


1ÔÂ7ÈÕ£¬£¬£¬ £¬£¬£¬ÆÕ±éÓÃÓÚJavaScriptÓ¦ÓóÌÐòÌìÉúPDFµÄjsPDF¿â¿ËÈÕÆØ³öÑÏÖØÇå¾²Îó²î£¨±àºÅCVE-2025-68428£©£¬£¬£¬ £¬£¬£¬ÑÏÖØÐÔÆÀ·Ö´ï9.2¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚ4.0°æ±¾Ç°jsPDFµÄNode.js¹¹½¨°æ±¾Öб£´æµÄÍâµØÎļþ°üÀ¨Óë·¾¶±éÀúΣº¦£¬£¬£¬ £¬£¬£¬µ±Óû§¿É¿ØÊäÈëδÂÄÀúÖ¤¼´×÷ΪÎļþ·¾¶×ª´ï¸øloadFileº¯Êýʱ£¬£¬£¬ £¬£¬£¬¹¥»÷Õ߿ɽè´Ë¶ÁÈ¡ÍâµØÎļþϵͳÃô¸ÐÊý¾Ý²¢Ç¶ÈëÌìÉúµÄPDFÎļþ£¬£¬£¬ £¬£¬£¬ÊµÏÖÊý¾ÝÇÔÈ¡¡£¡£¡£¡£¡£¡£¡£Îó²îÓ°Ïì¹æÄ£Ã÷È·Ö¸ÏòjsPDFµÄNode.js°æ±¾Îļþ£¬£¬£¬ £¬£¬£¬Éæ¼°loadFileº¯Êý¼°Å²Óøú¯ÊýµÄÆäËûÒªÁì¡£¡£¡£¡£¡£¡£¡£Ó¦ÓÃÇå¾²¹«Ë¾Endor LabsÆÊÎöÖ¸³ö£¬£¬£¬ £¬£¬£¬ÈôÎļþ·¾¶ÎªÓ²±àÂë¡¢Ô´×Ô¿ÉÐÅÉèÖûò½ÓÄÉÑÏ¿áÔÊÐíÁбíÑéÖ¤£¬£¬£¬ £¬£¬£¬ÔòʹÓÃÄѶÈÏÔÖø½µµÍ£»£»£»£»£»£»£»µ«¼øÓÚjsPDFÔÚnpm×¢²á±íÿÖܳ¬350Íò´ÎÏÂÔØµÄÆÕ±éʹÓÃÁ¿£¬£¬£¬ £¬£¬£¬¸ÃÎó²îÈÔ±»ÆÀ¹ÀΪÒ×±»Æð¾¢Ê¹ÓõĸßΣº¦È±ÏÝ¡£¡£¡£¡£¡£¡£¡£ÐÞ¸´¼Æ»®ÒÑÔÚjsPDF 4.0.0°æ±¾ÖÐʵÑ飬£¬£¬ £¬£¬£¬Í¨¹ýĬÈÏÏÞÖÆÎļþϵͳ»á¼û²¢ÒÀÀµNode.jsȨÏÞģʽ×è¶ÏÎó²î·¾¶¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/critical-jspdf-flaw-lets-hackers-steal-secrets-via-generated-pdfs/


3. n8nƽ̨"Ni8mare"¸ßΣ©¶¼òª¶³Ì´úÂëÖ´ÐÐΣº¦


1ÔÂ7ÈÕ£¬£¬£¬ £¬£¬£¬¿ËÈÕ£¬£¬£¬ £¬£¬£¬¿ªÔ´ÊÂÇéÁ÷×Ô¶¯»¯Æ½Ì¨n8n±»ÆØ³ö±àºÅΪCVE-2026-21858µÄ"Ni8mare"¸ßΣÎó²î£¬£¬£¬ £¬£¬£¬ÑÏÖØË®Æ½ÆÀ·Ö´ïÂú·Ö10·Ö¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÈ«Çò³¬10Íǫ̀n8nЧÀÍÆ÷ʵÀý£¬£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉÎÞÐèÉí·ÝÑéÖ¤Ô¶³Ì¿ØÖÆÍâµØ°²ÅŵÄn8nƽ̨£¬£¬£¬ £¬£¬£¬ÇÔÈ¡Ãô¸ÐÊý¾Ý»òÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£¡£n8n×÷ΪAIÁìÓòÈÈÃŹ¤¾ß£¬£¬£¬ £¬£¬£¬Ã¿ÖÜnpmÏÂÔØÁ¿³¬5Íò´Î£¬£¬£¬ £¬£¬£¬Docker HubÀ­È¡Á¿ÆÆÒڴΣ¬£¬£¬ £¬£¬£¬Ö÷ÒªÓÃÓÚÅþÁ¬Ó¦Óá¢API¼°Ð§À͹¹½¨×Ô¶¯»¯ÊÂÇéÁ÷£¬£¬£¬ £¬£¬£¬²¢Ö§³ÖÓëLLMЧÀͼ¯³É¡£¡£¡£¡£¡£¡£¡£Îó²îȪԴÔÚÓÚn8n´¦Öóͷ£webhookÇëÇóʱµÄÄÚÈÝÀàÐÍ»ìÏý»úÖÆ£¬£¬£¬ £¬£¬£¬µ±ÇëÇóµÄContent-Type±»Î±ÔìΪ·Çmultipart/form-data£¨Èçapplication/json£©Ê±£¬£¬£¬ £¬£¬£¬ÏµÍ³»áÈÆ¹ýÎļþÉÏ´«ÆÊÎöÆ÷µÄÇå¾²·À»¤£¬£¬£¬ £¬£¬£¬Ö±½Ó´¦Öóͷ£Îļþ×ֶζøÎ´ÑéÖ¤ÊÇ·ñΪÓÐÓÃÉÏ´«¡£¡£¡£¡£¡£¡£¡£Õâʹ¹¥»÷Õß¿Éͨ¹ý²Ù¿Øreq.body.files¹¤¾ßµÄfilepath²ÎÊý£¬£¬£¬ £¬£¬£¬¶ÁÈ¡n8nʵÀýÉϵÄí§ÒâÍâµØÎļþ£¬£¬£¬ £¬£¬£¬°üÀ¨´æ´¢APIÃÜÔ¿¡¢OAuthÁîÅÆ¡¢Êý¾Ý¿âƾ֤¡¢ÔÆ´æ´¢»á¼ûȨÏÞµÈÃô¸ÐÐÅÏ¢µÄÉèÖÃÎļþ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬ £¬£¬£¬n8nÒÑÐû²¼1.121.0¼°ÒÔÉÏÐÞ¸´°æ±¾£¬£¬£¬ £¬£¬£¬½¨ÒéÓû§Á¬Ã¦Éý¼¶¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/max-severity-ni8mare-flaw-lets-hackers-hijack-n8n-servers/


4. °²×¿¶ñÒâÈí¼þʹÓÃNFCÊÖÒÕʵÏַǽӴ¥Ê½Ö§¸¶Ú²Æ­


1ÔÂ8ÈÕ£¬£¬£¬ £¬£¬£¬Group-IB×îб¨¸æÕ¹ÏÖ£¬£¬£¬ £¬£¬£¬Ò»ÖÖÐÂÐͰ²×¿¶ñÒâÈí¼þÕýͨ¹ýTelegramÖÐÎÄÍøÂç·¸·¨ÉçÇøÈö²¥£¬£¬£¬ £¬£¬£¬Ê¹¹¥»÷ÕßÎÞÐèÎïÀí½Ó´¥Êܺ¦ÕßÒøÐп¨¼´¿ÉÍê³É·Ç½Ó´¥Ê½Ö§¸¶Ú²Æ­¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚÒÑ·¢Ã÷54¸ö¶ñÒâAPKÑù±¾£¬£¬£¬ £¬£¬£¬¶àαװ³ÉÕýµ±½ðÈÚ»òÖ§¸¶Ó¦Ó㬣¬£¬ £¬£¬£¬Í¨¹ý¶ÌÐÅ/ÓïÒô´¹ÂÚÓÕÆ­Óû§×°Ö㬣¬£¬ £¬£¬£¬²¢ÒªÇó½«Ö§¸¶¿¨Ìù½üÊÖ»úÒÔ¼¤»îNFCÊý¾Ý²¶»ñ¹¦Ð§¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ½ÓÄÉ¡°Ë«Ó¦ÓÃЭ×÷¡±Ä£Ê½£ºÊܺ¦ÕßÊÖ»úÖеġ°¶ÁÈ¡Æ÷¡±Ó¦Óò¶»ñNFC¿¨Êý¾Ýºó£¬£¬£¬ £¬£¬£¬Í¨¹ýC2ЧÀÍÆ÷´«ÊäÖÁ·¸·¨·Ö×Ó¿ØÖƵÄ×°±¸£»£»£»£»£»£»£»¹¥»÷ÕßʹÓá°Çû÷Æ÷¡±Ó¦ÓÃÔÚ²»·¨POSÖÕ¶ËÍê³ÉÉúÒ⣬£¬£¬ £¬£¬£¬»òͨ¹ýÒÆ¶¯Ç®°üÏ´Ç®ÍøÂçÔÚ¶à¹úʵÌåµê¹ºÎ£¬£¬ £¬£¬£¬ÊµÏÖ×ʽð͵ȡ¡£¡£¡£¡£¡£¡£¡£²¿·Ö°¸ÀýÏÔʾ£¬£¬£¬ £¬£¬£¬·¸·¨·Ö×Ó¿ÉÍêÈ«ÈÆ¹ýÓëÊܺ¦ÕßÖ±½Ó½Ó´¥£¬£¬£¬ £¬£¬£¬½öͨ¹ýÔ¤¼ÓÔØ±»µÁ¿¨Êý¾ÝµÄÒÆ¶¯Ç®°ü¼´¿ÉÍê³ÉÉúÒâ¡£¡£¡£¡£¡£¡£¡£TelegramÉϵÄTX-NFC¡¢X-NFC¡¢NFU PayµÈ¹©Ó¦É̹ûÕæÏúÊÛ´ËÀà¶ñÒâÈí¼þ£¬£¬£¬ £¬£¬£¬½ÓÄÉ¶ÌÆÚÊÔÓÃÖÁ¶àÔ¶©ÔĵÄÊÕ·Ñģʽ¡£¡£¡£¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/ghost-tap-malware-remote-nfc-fraud/


5. µÂÖÝGulshan¹«Ë¾37.7Íò¿Í»§Êý¾ÝÔâй¶


1ÔÂ7ÈÕ£¬£¬£¬ £¬£¬£¬×ܲ¿Î»Óڵ¿ËÈøË¹ÖݵÄGulshan Management Services, Inc.¹«Ë¾¿ËÈÕ֤ʵ±¬·¢´ó¹æÄ£Êý¾Ýй¶ÊÂÎñ£¬£¬£¬ £¬£¬£¬Ó°ÏìÁè¼Ý377,000Ãû¿Í»§¼°Ô±¹¤¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔËÓª×ÅÈ«ÃÀ150Óà¼ÒHandi PlusºÍHandi StopÆ·ÅÆ¼ÓÓÍÕ¾Óë±ãµ±µê£¬£¬£¬ £¬£¬£¬ÒòÉæ¼°ÏûºÄÕßÖ§¸¶¡¢Ô±¹¤µµ°¸¼°¹©Ó¦Á´Êý¾Ý£¬£¬£¬ £¬£¬£¬³ÉΪ¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£¡£¡£¾ÝÏòÃåÒòÖÝ×ÜÉó²é³¤Ìá½»µÄÎļþÅû¶£¬£¬£¬ £¬£¬£¬2025Äê9ÔÂ17ÈÕÖÁ27ÈÕʱ´ú£¬£¬£¬ £¬£¬£¬¹¥»÷Õß²»·¨»á¼ûÁ˸ù«Ë¾Íⲿϵͳ£¬£¬£¬ £¬£¬£¬Îó²îÖ±ÖÁ27Èղű»·¢Ã÷¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬ £¬£¬£¬ÊÜÓ°ÏìСÎÒ˽¼ÒÖ±ÖÁ2026Äê1ÔÂ5ÈÕ²ÅÊÕµ½ÊéÃæÍ¨Öª£¬£¬£¬ £¬£¬£¬¾àÀëÊÂÎñ¿¢ÊÂÒѳ¬Èý¸öÔ£¬£¬£¬ £¬£¬£¬Ô¶³¬Ö´·¨»®¶¨µÄת´ïʱÏÞ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÐ¹Â¶Éæ¼°Ãô¸ÐÐÅÏ¢°üÀ¨ÐÕÃû¡¢µØµã¡¢Éç»áÇå¾²ºÅÂë¡¢¼Ýʻ֤ºÅ¡¢Õþ¸®ID£¨È绤ÕÕ/ÖÝÉí·ÝÖ¤£©¡¢ÒøÐÐÕ˺ż°ÐÅÓÿ¨/½è¼Ç¿¨ºÅÂëµÈ£¬£¬£¬ £¬£¬£¬ÏÔÖøÔöÌíÉí·Ý͵ÇÔΣº¦¡£¡£¡£¡£¡£¡£¡£µÂ¿ËÈøË¹ÖÝ×ÜÉó²éÓŵãµÄ×ÔÁ¦±¨¸æ½øÒ»²½Ö¤Êµ£¬£¬£¬ £¬£¬£¬²ÆÎñÐÅÏ¢ÓëÉí·Ý±êʶÊý¾ÝµÄ̻¶ʹÊܺ¦ÕßÃæÁÙ½ðÈÚڲƭ¼°Éí·ÝðÓõÄË«ÖØÍþв¡£¡£¡£¡£¡£¡£¡£


https://hackread.com/data-breach-us-gas-stations-company/


6. Óʼþ·ÓÉÉèÖÃÎó²î³É´¹ÂÚ¹¥»÷ÐÂ;¾¶


1ÔÂ7ÈÕ£¬£¬£¬ £¬£¬£¬Î¢Èí×îб¨¸æÕ¹ÏÖ£¬£¬£¬ £¬£¬£¬×Ô2025Äê5ÔÂÆð£¬£¬£¬ £¬£¬£¬ÍøÂç´¹ÂÚ¹¥»÷ÕßÕýʹÓÃÉèÖùýʧµÄÓʼþ·ÓɺÍÓÕÆ­±£»£»£»£»£»£»£»¤²½·¥£¬£¬£¬ £¬£¬£¬Î±Ôì×éÖ¯»ú¹¹ÓòÃû·¢ËÍ¿´ËÆÄÚ²¿ÓʼþµÄ´¹ÂÚÐÅÏ¢£¬£¬£¬ £¬£¬£¬²¢Í¨¹ýTycoon2FAµÈÉí·ÝÈÏÖ¤¼´Ð§ÀÍ£¨PhaaS£©Æ½Ì¨ÇÔȡƾ֤¡£¡£¡£¡£¡£¡£¡£´ËÀ๥»÷ͨ¹ýÖØºàáéÓɳ¡¾°ºÍ±¡Èõ·À»¤²½·¥£¬£¬£¬ £¬£¬£¬Ê¹ÓʼþÖ÷ÌâαװÕëÑÔÒôÓʼþ¡¢¹²ÏíÎĵµ¡¢ÈËÁ¦×ÊԴ֪ͨ¡¢ÃÜÂëÖØÖõȳ£¼û³¡¾°£¬£¬£¬ £¬£¬£¬ÓÕµ¼Êܺ¦Õßµã»÷Á´½Ó½øÈëÐéαÑéÖ¤ÂëÒ³Ãæ£¬£¬£¬ £¬£¬£¬×îÖÕÌø×ªÖÁTycoon2FA´¹ÂÚ½çÃæ£¬£¬£¬ £¬£¬£¬²»µ«ÇÔÈ¡Õ˺ÅÃÜÂ룬£¬£¬ £¬£¬£¬»¹¿ÉÈÆ¹ý¶àÒòËØÈÏÖ¤£¨MFA£©ÊµÑé½ðÈÚÕ©Æ­¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÀÖ³ÉÒªº¦ÔÚÓÚÄ¿µÄ×â»§µÄÓʼþϵͳ±£´æÉèÖÃȱÏÝ£ºMX¼Í¼δָÏòOffice 365¡¢DMARCÕ½ÂÔÉèΪ¡°ÎÞ¡±»ò¿íËÉģʽ¡¢SPFÑé֤δÆôÓÃӲʧ°Ü¡¢DKIMÊðÃûȱʧ»òµÚÈý·½ÅþÁ¬Æ÷ÉèÖùýʧ¡£¡£¡£¡£¡£¡£¡£ÕâЩÎó²îʹ¹¥»÷ÕßÄÜαÔì¡°·¢¼þÈË¡±Óë¡°ÊÕ¼þÈË¡±ÏàͬµØµãµÄÓʼþ£¬£¬£¬ £¬£¬£¬ÖÆÔì¡°ÄÚ²¿Í¨Ñ¶¡±¼ÙÏ󡣡£¡£¡£¡£¡£¡£Ö»¹ÜÓʼþÍ·¿ÉÄÜÏÔʾSPF/DMARCÑé֤ʧ°Ü¡¢È±ÉÙDKIMÊðÃû»òÀ´×ÔÄäÃûÍⲿЧÀÍÆ÷£¬£¬£¬ £¬£¬£¬µ«ÔÚ·À»¤È±Ê§µÄÇéÐÎÖÐÈÔÄÜÖ±´ïÓû§ÊÕ¼þÏä¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/186638/hacking/misconfigured-email-routing-enables-internal-spoofed-phishing.html