CanvasÊý¾Ýй¶²¨¼°¹þ·ðÅ£½òµÈ½ü9000Ëù»ú¹¹

°ä²¼¹¦·ò 2026-05-12

1. CanvasÊý¾Ýй¶²¨¼°¹þ·ðÅ£½òµÈ½ü9000Ëù»ú¹¹


5ÔÂ6ÈÕ£¬£¬ºÚ¿Í×éÖ¯ShinyHunters½üÈÕ°ä²¼ÁËÒ»·ÝÔ̺¬½ü9000Ëù½ÌÓý»ú¹¹µÄÃûµ¥£¬£¬Ðû³ÆÕâЩ»ú¹¹¾íÈëÁ˲»ÐÝÀ©´óµÄCanvasѧϰÖÎÀíϵͳÊý¾Ýй¶ÊÂÎñ£¬£¬ÊÜÓ°ÏìÕß¿ÉÄܶà´ï2.75ÒÚÈË£¬£¬Ô̺¬Ñ§Éú¡¢ÀÏʦºÍ¹¤×÷ÈËÔ±¡£ ¡£¡£¸Ã×éÖ¯»¹Ðû³Æ»ñµÃÁËÆ½Ì¨ÄÚ»¥»»µÄ¡°ÊýÊ®ÒÚÌõ¡±¸öÈËÐÅÏ¢£¬£¬¿ÉÄÜй¶ѧÉú¡¢½ÌÓý¹¤×÷ÕߺÍÖÎÀíÈËÔ±Ö®¼äµÄÃô¸Ð¶Ô»°¡£ ¡£¡£°ä²¼µÄÃûµ¥º­¸ÇÖÁÉÙ10¸ö·ÖÆç¹ú¶ÈµÄ¸ßµµ½ÌÓý»ú¹¹ºÍ¸ßÖУ¬£¬´ó²¿ÃÅÀ´×ÔÃÀ¹ú£¬£¬Æä´ÎÊǰĴóÀûÑÇ¡¢Ó¢¹úºÍÈðµä¡£ ¡£¡£Êܺ¦ÕßÖÐÔ̺¬¹þ·ð´óѧ¡¢Ë¹Ì¹¸£´óѧ¡¢ÂéÊ¡Àí¹¤Ñ§Ôº¡¢Å£½ò´óѧ¡¢ÆÕÁÖ˹¶Ù´óѧ¡¢¸çÂ×±ÈÑÇ´óѧ¡¢½£ÇÅ´óѧ¡¢¿µÄζû´óѧ¡¢¼ÓÖÝ´óѧ²®¿ËÀû·ÖУºÍÇÇÖγǴóѧµÈÊÀ½ç×î³ÛÃûµÄ½ÌÓý»ú¹¹¡£ ¡£¡£Ãûµ¥Öл¹³öÏÖÁËÑÇÂíÑ·¡¢Æ»¹ûºÍ˼¿ÆµÈÆóÒµ¿Í»§£¬£¬Åú×¢ÕâЩ¹«Ë¾¿ÉÄÜʹÓÃCanvas½øÐÐÔ±¹¤Åàѵ¡£ ¡£¡£Èç´Ë´ó¹æÄ£µÄÊý¾Ýй¶¼«ÆäΣÏÕ£¬£¬¹¥»÷ÕßÄܹ»ÀûÓÃÕâЩÐÅÏ¢¾«ÐIJ߶¯Õë¶ÔÐÔµÄÉç½»¹¤³Ì¹¥»÷£¬£¬¼ø±ð¸ß¼ÛÖµÖ¸±ê¡£ ¡£¡£


https://cybernews.com/security/anvas-lms-breach-universities-data-leak/


2. CheckmarxÔâTeamPCPÁ¬»·¹©¸øÁ´¹¥»÷


5ÔÂ11ÈÕ£¬£¬CheckmarxÓÚÉÏÖÜÄ©·¢³öÖҸ棬£¬ÆäÔÚJenkins MarketplaceÉϰ䲼µÄÀûÓ÷¨Ê½°²È«²âÊÔ£¨AST£©²å¼þÖгöÏÖÁËÒ»¸ö¶ñÒâ°æ±¾¡£ ¡£¡£Õâ´ÎÈëÇÖÓÉÃûΪTeamPCPµÄºÚ¿Í×éÖ¯Ðû³ÆÕƹÜ¡£ ¡£¡£Jenkins×÷Ϊ×î¿í·ºÊ¹ÓõijÖÐø¼¯³É/³ÖÐø²¿Êð£¨CI/CD£©×Ô¶¯»¯½â¾ö¹æ»®£¬£¬±»ÓÃÓÚÈí¼þ¹¹½¨¡¢²âÊÔ¡¢´úÂëɨÃè¡¢´ò°ü¼°ÀûÓò¿Êð¡£ ¡£¡£CheckmarxµÄAST²å¼þÕýÊǽ«°²È«É¨Ã輯³Éµ½JenkinsµÄ×Ô¶¯»¯¹ÜµÀÖС£ ¡£¡£¾Ý°²È«¹¤³ÌʦAdnand Khanй©£¬£¬TeamPCPÉè·¨»ñÈ¡ÁËCheckmarxµÄGitHub²Ö¿â½Ó¼ûȨÏÞ£¬£¬²¢ÔÚJenkins AST²å¼þÖÐÖ²ÈëºóÃÅ¡£ ¡£¡£¹¥»÷ÕßÕýÊÇÀûÓÃÁË3Ô·ÝTrivy¹©¸øÁ´¹¥»÷ÖÐÇÔÈ¡µÄ²Ö¿âƾ֤£¬£¬Æ¾½èÕâЩƾ֤£¬£¬¹¥»÷ÕßÔÚÒ»¸ö¶àÔÂÄÚ³ÖÐøÎ¬³Ö½Ó¼ûȨÏÞ£¬£¬²¢ÔÚGitHub¡¢Docker¡¢VSCode¼°Open VSXµÈ¶à¸öƽ̨°ä²¼ÁËÔ̺¬ÇÔÊØÐÅÏ¢´úÂëµÄ¿ª·¢Õß¹¤¾ß¶ñÒâ°æ±¾£¬£¬Ô̺¬¸Ã¹«Ë¾KICS·ÖÎö¹¤¾ßµÄ´Û¸Ä°æ±¾¡£ ¡£¡£5ÔÂ9ÈÕÐÇÆÚÁù£¬£¬°æ±¾ºÅΪ2026.5.09µÄ¶ñÒâJenkins AST²å¼þ±»ÉÏ´«ÖÁrepo.jenkins-ci.org¡£ ¡£¡£¸Ã°æ±¾Î´¾­¹ý¹Ù·½°ä²¼Á÷³Ì£¬£¬¶Ìȱgit±êÇ©ºÍGitHub°ä²¼°æ±¾£¬£¬ÇÒÈÕÆÚÌåʽÓë¹Ù·½¹æ»®²»·û¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/official-checkmarx-jenkins-package-compromised-with-infostealer/


3. GhostLock¹¤¾ßÀÄÓÃAPIÖ´ÐÐÎļþËø¶¨µÄ»Ø¾ø·þÎñ¹¥»÷


5ÔÂ11ÈÕ£¬£¬Ò»Î»°²È«×êÑÐÈËÔ±½üÈÕ°ä²¼ÁËÒ»¿îÃûΪGhostLockµÄ¸ÅÄîÑéÖ¤¹¤¾ß£¬£¬¸Ã¹¤¾ßÑÝʾÁËÈôºÎÀÄÓúϷ¨µÄWindowsÎļþAPIº¯Êý½øÐй¥»÷£¬£¬´Ó¶ø×èÖ¹Óû§»òÀûÓ÷¨Ê½½Ó¼û´æ´¢ÔÚ±¾µØ»òSMBÍøÂç¹²ÏíÉϵÄÎļþ¡£ ¡£¡£ÕâÏî¼¼ÊõÓÉÒÔÉ«Áк½¿Õº½Ì칤ҵ¹«Ë¾µÄKim DvashÑз¢£¬£¬ÆäÖ÷ÌâÔÚÓÚÀÄÓÃWindowsµÄ¡°CreateFileW¡±API¼°ÆäÎļþ¹²Ïíģʽ²ÎÊý£¬£¬ÊµÏÖ¶ÔÆäËû¹ý³ÌµÄÎļþ½Ó¼û×è¶Ï¡£ ¡£¡£Îª½«ÕâÒ»¼¼Êõ×Ô¶¯»¯£¬£¬DvashÔÚGitHubÉϰ䲼ÁËGhostLock¹¤¾ß¡£ ¡£¡£¸Ã¹¤¾ß¿ÉÄÜµÝ¹éµØ´ò¿ªSMB¹²ÏíÉϵĴóÁ¿Îļþ£¬£¬ÔÚά³ÖÎļþ¾ä±ú»îÔ¾µÄ״̬Ï£¬£¬Ê¹ÈκÎеÄÎļþ½Ó¼û³¢ÊÔ¶¼±»ÏµÍ³»Ø¾ø¡£ ¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬¸Ã¹¤¾ßÄܹ»Óɳ߶ÈÓòÓû§ÔËÐУ¬£¬ÎÞÐèÈκÎÌáÉýµÄȨÏÞ¡£ ¡£¡£¹¥»÷ÕßÉõÖÁÄܹ»´Ó¶ą̀ÊÜϰȾµÄÉ豸ͬʱÌáÒé¹¥»÷£¬£¬²¢ÔÚÏÈǰ¹ý³ÌÖÕÖ¹ºó²»ÐÝÖØÐ»ñÈ¡Îļþ¾ä±ú£¬£¬´Ó¶øµ¢¸é×è¶Ï¹¦·ò¡£ ¡£¡£²»Í⣬£¬Ò»µ©¹ØÁªµÄSMB»á»°ÊµÏÖ¡¢GhostLock¹ý³Ì±»ÖÕÖ¹£¬£¬»òÕßÊÜÓ°ÏìµÄÏµÍ³ÖØÆô£¬£¬Windows»á×Ô¶¯¹Ø±ÕËùÓÐÎļþ¾ä±ú£¬£¬¸´Ô­Õý³£µÄÎļþ½Ó¼û¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/new-ghostlock-tool-abuses-windows-api-to-block-file-access/


4. SailPointÅû¶GitHub´úÂë¿âÔâδ¾­ÊÚȨ½Ó¼û


5ÔÂ11ÈÕ£¬£¬SailPointÊÇÒ»¼ÒרһÓÚÆóÒµÉí·Ý°²È«ÓëÉí·ÝÖÎÀí½â¾ö¹æ»®µÄÍøÂ簲ȫ¹«Ë¾£¬£¬Æä²úÆ·Ö¼ÔÚÔ®ÊÖ¸÷Àà×éÖ¯ÓÐЧÖÎÀíºÍ½ÚÖÆÓû§¶Ôϵͳ¡¢ÀûÓ÷¨Ê½¼°Ãô¸ÐÊý¾ÝµÄ½Ó¼ûȨÏÞ¡£ ¡£¡£2026Äê4ÔÂ20ÈÕ£¬£¬¸Ã¹«Ë¾Åû¶ÁËÒ»Â·Éæ¼°ÆäGitHub´úÂë¿âµÄÍøÂ簲ȫÊÂÎñ¡£ ¡£¡£Æ¾¾ÝSailPointÏòÃÀ¹ú֤ȯÂòÂôίԱ»á£¨SEC£©Ìá½»µÄ8-K±í¸ñÏÔʾ£¬£¬¹«Ë¾ÔÚµ±Ìì¼ì²âµ½²¿ÃÅGitHub´úÂë¿âÔâµ½ÁËδ¾­ÊÚȨµÄ½Ó¼û¡£ ¡£¡£ÊÂÎñ²úÉúºó£¬£¬SailPointѸËÙÆô¶¯ÁËÄÚ²¿ÊÂÎñÏìÓ¦»úÖÆ£¬£¬²¢ÔÚµÚÈý·½ÍøÂ簲ȫ¹«Ë¾µÄЭÖúÏÂÁ¢¼´ÖÕÖ¹ÁËδ¾­ÊÚȨµÄ»î¶¯£¬£¬³É¹¦½ÚÖÆÁ˰²È«·ì϶µÄÓ°ÏìÁìÓò¡£ ¡£¡£SailPointÔÚÌá½»µÄÎļþÖÐÃ÷È·°µÊ¾£¬£¬Õâ´ÎÊÂÎñµÄµ××ÓÔ­ÒòÊÇijµÚÈý·½ÀûÓ÷¨Ê½´æÔÚ°²È«·ì϶£¬£¬Ä¿Ç°¸Ã·ì϶ÒѾ­µÃµ½ÐÞ¸´¡£ ¡£¡£¾­¹ýÓëµÚÈý·½ÍøÂ簲ȫÏìÓ¦¹«Ë¾µÄ½áºÏµ÷²é£¬£¬SailPointÈ·ÈÏûÓз¢ÏÖÈκÎÖ¤¾ÝÅú×¢Æä³ö²ú»·¾³»ò²âÊÔ»·¾³ÖеĿͻ§Êý¾ÝÔâµ½·¸·¨½Ó¼û£¬£¬Ò²Ã»Óз¢ÏÖ¹«Ë¾µÄÕý³£·þÎñ³öÏÖÖжÏ¡£ ¡£¡£ÕâÒâζ×Å£¬£¬Ö»¹Ü¹¥»÷Õ߳ɹ¦ÇÖÈëÁËSailPointµÄGitHub´úÂë¿â£¬£¬µ«¿Í»§µÄÏÖʵʹÓÃÂÄÀúºÍÊý¾Ý°²È«ÐÔ²¢Î´Êܵ½Ö±½ÓÍþв¡£ ¡£¡£


https://securityaffairs.com/191997/data-breach/identity-security-firm-sailpoint-discloses-github-repository-breach.html


5. ¹È¸è×êÑÐÈËÔ±·¢ÏÖÊ׸öÒÉËÆAIÌìÉúµÄÁãÈÕ·ì϶


5ÔÂ11ÈÕ£¬£¬¹È¸èÍþвµý±¨Ð¡×飨GTIG£©µÄ×êÑÐÈËÔ±½üÈÕ°ä²¼»ã±¨Ö¸³ö£¬£¬Õë¶ÔÒ»¿îÊ¢ÐеĿªÔ´ÍøÂçÖÎÀí¹¤¾ßµÄÁãÈÕ·ì϶£¬£¬¼«ÓпÉÄÜÊÇÀûÓÃÈËΪÖÇÄÜÌìÉúµÄ¡£ ¡£¡£¸Ã·ì϶¿ÉÄÜÈÆ¹ý¸Ã¹¤¾ßÖеÄË«³É·ÖÉí·ÝÑéÖ¤£¨2FA£©±£»£»£»¤»úÖÆ¡£ ¡£¡£¹È¸èÖ®ËùÒԸ߶ÈÈ·ÐŹ¥»÷ÕßʹÓÃÁËÈËΪÖÇÄÜÄ£ÐÍ£¬£¬ÖØÒª»ùÓÚPython·ì϶ÀûÓôúÂëµÄ½á¹¹ºÍÄÚÈÝÌØµã¡£ ¡£¡£×êÑÐÈËÔ±·¢ÏÖ£¬£¬¸Ã¾ç±¾Ô̺¬´óÁ¿½ÌÓýÐÔµÄÎĵµ×Ö·û´®£¬£¬ÉõÖÁÔ̺¬Ò»¸öÐé¹¹µÄCVSSÆÀ·Ö£¬£¬²¢ÇÒѡȡÁ˽ṹ»¯¡¢½Ì¿ÆÊéʽµÄPythonÌåʽ£¬£¬ÕâЩÕýÊÇ´ó˵»°Ä£ÐÍ£¨LLM£©ÑµÁ·Êý¾ÝµÄµäÐÍÌØµã¡£ ¡£¡£ÓÃÓÚÕâ´Î¶ñÒ⹤×÷µÄLLM¾ßÌåÊÇÄÄÒ»¿îÉв»Ã÷ÏÔ£¬£¬µ«¹È¸èÒÑÅųýÁËÆä×Ô¼ÒGeminiÄ£ÐͲμӵĿÉÄÜÐÔ¡£ ¡£¡£½øÒ»²½Ö¤¾ÝÅú×¢£¬£¬LLM»¹±»ÀûÓÃÔÚ·ì϶·¢Ïֽ׶Ρ£ ¡£¡£¸Ã·ì϶ÐÔÖÊÉÏÊÇÒ»¸ö¸ß¼¶ÓïÒåÂß¼­ÃýÎ󣬣¬ÕâÀàȱµã¸ÕºÃÊÇÈËΪÖÇÄÜϵͳÉÃÓÚʶ´ËÍâÀàÐÍ£¬£¬¶ø·Çͨ³£Í¨¹ýÄ£ºý²âÊÔ»ò¾²Ì¬·ÖÎö¾ÍÄÜ·¢ÏÖµÄÄÚ´æ°Ü»µ»òÊäÈëËãÕÊÎÊÌâ¡£ ¡£¡£GTIG×êÑÐÈËÔ±°µÊ¾£¬£¬ÕâÊÇËûÃdzõ´Î·¢ÏÖÒ»¸öʹÓÃÁãÈÕ·ì϶µÄÍþвÐÐΪÕߣ¬£¬ÇҸ÷ì϶±»ÒÔΪÊÇͨ¹ýÈËΪÖÇÄÜ¿ª·¢µÄ¡£ ¡£¡£


https://www.bleepingcomputer.com/news/security/google-hackers-used-ai-to-develop-zero-day-exploit-for-web-admin-tool/


6. ºÚ¿ÍÀûÓÃVercelÓëÌìÉúʽAI´ó¹æÄ£ÖÆ×÷´¹µöÍøÕ¾


5ÔÂ11ÈÕ£¬£¬ÍøÂ簲ȫ¹«Ë¾CofenseµÄ×êÑÐÈËÔ±½üÈÕ·¢ÏÖ£¬£¬ºÚ¿ÍÀûÓÃÍøÕ¾¿ª·¢Æ½Ì¨VercelÌáÒé¸ßÖÊÁ¿Ú¿Æ­µÄ»î¶¯¼±¾çÔö³¤¡£ ¡£¡£Ú¿Æ­·Ö×Ӵ˿̽èÖúÌìÉúʽÈËΪÖÇÄÜ£¨GenAI£©¹¹½¨³öÏÕЩÎÞ·¨ÓëÕæÊµÍøÕ¾·Ö±æµÄÐéÎ±Ò³Ãæ¡£ ¡£¡£³ö¸ñÊÇͨ¹ýVercelÆìϵÄÌìÉúʽUIϵͳv0.dev£¬£¬¼´±ãÊǼ¼ÊõÄÜÁ¦ºÜÈõµÄÚ¿Æ­Õߣ¬£¬Ò²ÄÜÇáËÉ´´½¨·ÂÕÕ³ÛÃûÆ·ÅÆÍâ¹Û΢·ç¸ñµÄ´¹µöÍøÕ¾¡£ ¡£¡£ÕâÒ»¹ý³Ì²»½ö¼±¾ç£¬£¬²¢Çҳɱ¾±ãÒË¡£ ¡£¡£Vercel×ÔÉíÊÇÒ»¸öÃæÏòÍøÕ¾¿ª·¢ÕߵĺϷ¨ÔÆÆ½Ì¨£¬£¬µ«ºÚ¿ÍÄܹ»µÈÏÐ×¢²áʹÓᣠ¡£¡£¸Ãƽ̨ÌṩÃâ·Ñ°æ±¾ÒÔ¼°Ã¿ÔÂ20ÃÀÔªµÄרҵ°æÕË»§£¬£¬¹¥»÷ÕßÎÞÐèÖÎÀí×Ô¼ºµÄ·þÎñÆ÷¼´¿ÉÔÚÏßÍйÜÍøÒ³¡£ ¡£¡£¸üΪ¹Ø¼üµÄÊÇ£¬£¬Ò»µ©Ä³¸ö´¹µöÒ³Ãæ±»²é·â£¬£¬ËûÃÇ¿ÉÄܼ±¾ç´î½¨ÐÂÒ³Ãæ£¬£¬ÓÉÓÚÈËΪÖÇÄÜÿ´Î³ÇÊÐÌìÉúÂÔÓÐ·ÖÆçµÄ°æ±¾£¬£¬Ê¹µÃ»ùÓÚÌØµãµÄ´«Í³·â¶ÂÕ½ÊõÄÑÒÔ¼ûЧ¡£ ¡£¡£ºÚ¿Í»¹½«ÕâЩÐéÎ±ÍøÕ¾ÓëTelegramƽ̨ÏÎ½ÓÆðÀ´¡£ ¡£¡£µ±Êܺ¦ÕßÔÚαÔìµÄµÇÂ¼Ò³ÃæÖÐÊäÈëСÎÒÐÅϢʱ£¬£¬Telegram»úеÈËAPI»á½«ÕâЩÊý¾Ýʵʱ·¢Ë͸ø¹¥»÷Õß¡£ ¡£¡£ÕâÖÖ×Ô¶¯»¯²¿Êð½Ó¿ÚʹڿƭÕßÎÞÐèÊØ»¤¸´Ôӵĺó¶Ë·þÎñÆ÷¼´¿ÉÇáËÉ¼à¿Ø²¢ÊÕÈ¡ÇÔÈ¡µ½µÄƾ֤¡£ ¡£¡£


https://hackread.com/hackers-exploit-vercel-genai-phishing-sites/