CanvasÊý¾Ýй¶²¨¼°¹þ·ðÅ£½òµÈ½ü9000Ëù»ú¹¹
°ä²¼¹¦·ò 2026-05-121. CanvasÊý¾Ýй¶²¨¼°¹þ·ðÅ£½òµÈ½ü9000Ëù»ú¹¹
5ÔÂ6ÈÕ£¬£¬ºÚ¿Í×éÖ¯ShinyHunters½üÈÕ°ä²¼ÁËÒ»·ÝÔ̺¬½ü9000Ëù½ÌÓý»ú¹¹µÄÃûµ¥£¬£¬Ðû³ÆÕâЩ»ú¹¹¾íÈëÁ˲»ÐÝÀ©´óµÄCanvasѧϰÖÎÀíϵͳÊý¾Ýй¶ÊÂÎñ£¬£¬ÊÜÓ°ÏìÕß¿ÉÄܶà´ï2.75ÒÚÈË£¬£¬Ô̺¬Ñ§Éú¡¢ÀÏʦºÍ¹¤×÷ÈËÔ±¡£¡£¡£¸Ã×éÖ¯»¹Ðû³Æ»ñµÃÁËÆ½Ì¨ÄÚ»¥»»µÄ¡°ÊýÊ®ÒÚÌõ¡±¸öÈËÐÅÏ¢£¬£¬¿ÉÄÜй¶ѧÉú¡¢½ÌÓý¹¤×÷ÕߺÍÖÎÀíÈËÔ±Ö®¼äµÄÃô¸Ð¶Ô»°¡£¡£¡£°ä²¼µÄÃûµ¥º¸ÇÖÁÉÙ10¸ö·ÖÆç¹ú¶ÈµÄ¸ßµµ½ÌÓý»ú¹¹ºÍ¸ßÖУ¬£¬´ó²¿ÃÅÀ´×ÔÃÀ¹ú£¬£¬Æä´ÎÊǰĴóÀûÑÇ¡¢Ó¢¹úºÍÈðµä¡£¡£¡£Êܺ¦ÕßÖÐÔ̺¬¹þ·ð´óѧ¡¢Ë¹Ì¹¸£´óѧ¡¢ÂéÊ¡Àí¹¤Ñ§Ôº¡¢Å£½ò´óѧ¡¢ÆÕÁÖ˹¶Ù´óѧ¡¢¸çÂ×±ÈÑÇ´óѧ¡¢½£ÇÅ´óѧ¡¢¿µÄζû´óѧ¡¢¼ÓÖÝ´óѧ²®¿ËÀû·ÖУºÍÇÇÖγǴóѧµÈÊÀ½ç×î³ÛÃûµÄ½ÌÓý»ú¹¹¡£¡£¡£Ãûµ¥Öл¹³öÏÖÁËÑÇÂíÑ·¡¢Æ»¹ûºÍ˼¿ÆµÈÆóÒµ¿Í»§£¬£¬Åú×¢ÕâЩ¹«Ë¾¿ÉÄÜʹÓÃCanvas½øÐÐÔ±¹¤Åàѵ¡£¡£¡£Èç´Ë´ó¹æÄ£µÄÊý¾Ýй¶¼«ÆäΣÏÕ£¬£¬¹¥»÷ÕßÄܹ»ÀûÓÃÕâЩÐÅÏ¢¾«ÐIJ߶¯Õë¶ÔÐÔµÄÉç½»¹¤³Ì¹¥»÷£¬£¬¼ø±ð¸ß¼ÛÖµÖ¸±ê¡£¡£¡£
https://cybernews.com/security/anvas-lms-breach-universities-data-leak/
2. CheckmarxÔâTeamPCPÁ¬»·¹©¸øÁ´¹¥»÷
5ÔÂ11ÈÕ£¬£¬CheckmarxÓÚÉÏÖÜÄ©·¢³öÖҸ棬£¬ÆäÔÚJenkins MarketplaceÉϰ䲼µÄÀûÓ÷¨Ê½°²È«²âÊÔ£¨AST£©²å¼þÖгöÏÖÁËÒ»¸ö¶ñÒâ°æ±¾¡£¡£¡£Õâ´ÎÈëÇÖÓÉÃûΪTeamPCPµÄºÚ¿Í×éÖ¯Ðû³ÆÕƹܡ£¡£¡£Jenkins×÷Ϊ×î¿í·ºÊ¹ÓõijÖÐø¼¯³É/³ÖÐø²¿Êð£¨CI/CD£©×Ô¶¯»¯½â¾ö¹æ»®£¬£¬±»ÓÃÓÚÈí¼þ¹¹½¨¡¢²âÊÔ¡¢´úÂëɨÃè¡¢´ò°ü¼°ÀûÓò¿Ê𡣡£¡£CheckmarxµÄAST²å¼þÕýÊǽ«°²È«É¨Ã輯³Éµ½JenkinsµÄ×Ô¶¯»¯¹ÜµÀÖС£¡£¡£¾Ý°²È«¹¤³ÌʦAdnand Khanй©£¬£¬TeamPCPÉè·¨»ñÈ¡ÁËCheckmarxµÄGitHub²Ö¿â½Ó¼ûȨÏÞ£¬£¬²¢ÔÚJenkins AST²å¼þÖÐÖ²ÈëºóÃÅ¡£¡£¡£¹¥»÷ÕßÕýÊÇÀûÓÃÁË3Ô·ÝTrivy¹©¸øÁ´¹¥»÷ÖÐÇÔÈ¡µÄ²Ö¿âƾ֤£¬£¬Æ¾½èÕâЩƾ֤£¬£¬¹¥»÷ÕßÔÚÒ»¸ö¶àÔÂÄÚ³ÖÐøÎ¬³Ö½Ó¼ûȨÏÞ£¬£¬²¢ÔÚGitHub¡¢Docker¡¢VSCode¼°Open VSXµÈ¶à¸öƽ̨°ä²¼ÁËÔ̺¬ÇÔÊØÐÅÏ¢´úÂëµÄ¿ª·¢Õß¹¤¾ß¶ñÒâ°æ±¾£¬£¬Ô̺¬¸Ã¹«Ë¾KICS·ÖÎö¹¤¾ßµÄ´Û¸Ä°æ±¾¡£¡£¡£5ÔÂ9ÈÕÐÇÆÚÁù£¬£¬°æ±¾ºÅΪ2026.5.09µÄ¶ñÒâJenkins AST²å¼þ±»ÉÏ´«ÖÁrepo.jenkins-ci.org¡£¡£¡£¸Ã°æ±¾Î´¾¹ý¹Ù·½°ä²¼Á÷³Ì£¬£¬¶Ìȱgit±êÇ©ºÍGitHub°ä²¼°æ±¾£¬£¬ÇÒÈÕÆÚÌåʽÓë¹Ù·½¹æ»®²»·û¡£¡£¡£
https://www.bleepingcomputer.com/news/security/official-checkmarx-jenkins-package-compromised-with-infostealer/
3. GhostLock¹¤¾ßÀÄÓÃAPIÖ´ÐÐÎļþËø¶¨µÄ»Ø¾ø·þÎñ¹¥»÷
5ÔÂ11ÈÕ£¬£¬Ò»Î»°²È«×êÑÐÈËÔ±½üÈÕ°ä²¼ÁËÒ»¿îÃûΪGhostLockµÄ¸ÅÄîÑéÖ¤¹¤¾ß£¬£¬¸Ã¹¤¾ßÑÝʾÁËÈôºÎÀÄÓúϷ¨µÄWindowsÎļþAPIº¯Êý½øÐй¥»÷£¬£¬´Ó¶ø×èÖ¹Óû§»òÀûÓ÷¨Ê½½Ó¼û´æ´¢ÔÚ±¾µØ»òSMBÍøÂç¹²ÏíÉϵÄÎļþ¡£¡£¡£ÕâÏî¼¼ÊõÓÉÒÔÉ«Áк½¿Õº½Ì칤ҵ¹«Ë¾µÄKim DvashÑз¢£¬£¬ÆäÖ÷ÌâÔÚÓÚÀÄÓÃWindowsµÄ¡°CreateFileW¡±API¼°ÆäÎļþ¹²Ïíģʽ²ÎÊý£¬£¬ÊµÏÖ¶ÔÆäËû¹ý³ÌµÄÎļþ½Ó¼û×è¶Ï¡£¡£¡£Îª½«ÕâÒ»¼¼Êõ×Ô¶¯»¯£¬£¬DvashÔÚGitHubÉϰ䲼ÁËGhostLock¹¤¾ß¡£¡£¡£¸Ã¹¤¾ß¿ÉÄÜµÝ¹éµØ´ò¿ªSMB¹²ÏíÉϵĴóÁ¿Îļþ£¬£¬ÔÚά³ÖÎļþ¾ä±ú»îÔ¾µÄ״̬Ï£¬£¬Ê¹ÈκÎеÄÎļþ½Ó¼û³¢ÊÔ¶¼±»ÏµÍ³»Ø¾ø¡£¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬£¬¸Ã¹¤¾ßÄܹ»Óɳ߶ÈÓòÓû§ÔËÐУ¬£¬ÎÞÐèÈκÎÌáÉýµÄȨÏÞ¡£¡£¡£¹¥»÷ÕßÉõÖÁÄܹ»´Ó¶ą̀ÊÜϰȾµÄÉ豸ͬʱÌáÒé¹¥»÷£¬£¬²¢ÔÚÏÈǰ¹ý³ÌÖÕÖ¹ºó²»ÐÝÖØÐ»ñÈ¡Îļþ¾ä±ú£¬£¬´Ó¶øµ¢¸é×è¶Ï¹¦·ò¡£¡£¡£²»Í⣬£¬Ò»µ©¹ØÁªµÄSMB»á»°ÊµÏÖ¡¢GhostLock¹ý³Ì±»ÖÕÖ¹£¬£¬»òÕßÊÜÓ°ÏìµÄÏµÍ³ÖØÆô£¬£¬Windows»á×Ô¶¯¹Ø±ÕËùÓÐÎļþ¾ä±ú£¬£¬¸´ÔÕý³£µÄÎļþ½Ó¼û¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-ghostlock-tool-abuses-windows-api-to-block-file-access/
4. SailPointÅû¶GitHub´úÂë¿âÔâδ¾ÊÚȨ½Ó¼û
5ÔÂ11ÈÕ£¬£¬SailPointÊÇÒ»¼ÒרһÓÚÆóÒµÉí·Ý°²È«ÓëÉí·ÝÖÎÀí½â¾ö¹æ»®µÄÍøÂ簲ȫ¹«Ë¾£¬£¬Æä²úÆ·Ö¼ÔÚÔ®ÊÖ¸÷Àà×éÖ¯ÓÐЧÖÎÀíºÍ½ÚÖÆÓû§¶Ôϵͳ¡¢ÀûÓ÷¨Ê½¼°Ãô¸ÐÊý¾ÝµÄ½Ó¼ûȨÏÞ¡£¡£¡£2026Äê4ÔÂ20ÈÕ£¬£¬¸Ã¹«Ë¾Åû¶ÁËÒ»Â·Éæ¼°ÆäGitHub´úÂë¿âµÄÍøÂ簲ȫÊÂÎñ¡£¡£¡£Æ¾¾ÝSailPointÏòÃÀ¹ú֤ȯÂòÂôίԱ»á£¨SEC£©Ìá½»µÄ8-K±í¸ñÏÔʾ£¬£¬¹«Ë¾ÔÚµ±Ìì¼ì²âµ½²¿ÃÅGitHub´úÂë¿âÔâµ½ÁËδ¾ÊÚȨµÄ½Ó¼û¡£¡£¡£ÊÂÎñ²úÉúºó£¬£¬SailPointѸËÙÆô¶¯ÁËÄÚ²¿ÊÂÎñÏìÓ¦»úÖÆ£¬£¬²¢ÔÚµÚÈý·½ÍøÂ簲ȫ¹«Ë¾µÄÐÖúÏÂÁ¢¼´ÖÕÖ¹ÁËδ¾ÊÚȨµÄ»î¶¯£¬£¬³É¹¦½ÚÖÆÁ˰²È«·ì϶µÄÓ°ÏìÁìÓò¡£¡£¡£SailPointÔÚÌá½»µÄÎļþÖÐÃ÷È·°µÊ¾£¬£¬Õâ´ÎÊÂÎñµÄµ××ÓÔÒòÊÇijµÚÈý·½ÀûÓ÷¨Ê½´æÔÚ°²È«·ì϶£¬£¬Ä¿Ç°¸Ã·ì϶ÒѾµÃµ½ÐÞ¸´¡£¡£¡£¾¹ýÓëµÚÈý·½ÍøÂ簲ȫÏìÓ¦¹«Ë¾µÄ½áºÏµ÷²é£¬£¬SailPointÈ·ÈÏûÓз¢ÏÖÈκÎÖ¤¾ÝÅú×¢Æä³ö²ú»·¾³»ò²âÊÔ»·¾³ÖеĿͻ§Êý¾ÝÔâµ½·¸·¨½Ó¼û£¬£¬Ò²Ã»Óз¢ÏÖ¹«Ë¾µÄÕý³£·þÎñ³öÏÖÖжϡ£¡£¡£ÕâÒâζ×Å£¬£¬Ö»¹Ü¹¥»÷Õ߳ɹ¦ÇÖÈëÁËSailPointµÄGitHub´úÂë¿â£¬£¬µ«¿Í»§µÄÏÖʵʹÓÃÂÄÀúºÍÊý¾Ý°²È«ÐÔ²¢Î´Êܵ½Ö±½ÓÍþв¡£¡£¡£
https://securityaffairs.com/191997/data-breach/identity-security-firm-sailpoint-discloses-github-repository-breach.html
5. ¹È¸è×êÑÐÈËÔ±·¢ÏÖÊ׸öÒÉËÆAIÌìÉúµÄÁãÈÕ·ì϶
5ÔÂ11ÈÕ£¬£¬¹È¸èÍþвµý±¨Ð¡×飨GTIG£©µÄ×êÑÐÈËÔ±½üÈÕ°ä²¼»ã±¨Ö¸³ö£¬£¬Õë¶ÔÒ»¿îÊ¢ÐеĿªÔ´ÍøÂçÖÎÀí¹¤¾ßµÄÁãÈÕ·ì϶£¬£¬¼«ÓпÉÄÜÊÇÀûÓÃÈËΪÖÇÄÜÌìÉúµÄ¡£¡£¡£¸Ã·ì϶¿ÉÄÜÈÆ¹ý¸Ã¹¤¾ßÖеÄË«³É·ÖÉí·ÝÑéÖ¤£¨2FA£©±£»£»£»¤»úÖÆ¡£¡£¡£¹È¸èÖ®ËùÒԸ߶ÈÈ·ÐŹ¥»÷ÕßʹÓÃÁËÈËΪÖÇÄÜÄ£ÐÍ£¬£¬ÖØÒª»ùÓÚPython·ì϶ÀûÓôúÂëµÄ½á¹¹ºÍÄÚÈÝÌØµã¡£¡£¡£×êÑÐÈËÔ±·¢ÏÖ£¬£¬¸Ã¾ç±¾Ô̺¬´óÁ¿½ÌÓýÐÔµÄÎĵµ×Ö·û´®£¬£¬ÉõÖÁÔ̺¬Ò»¸öÐé¹¹µÄCVSSÆÀ·Ö£¬£¬²¢ÇÒѡȡÁ˽ṹ»¯¡¢½Ì¿ÆÊéʽµÄPythonÌåʽ£¬£¬ÕâЩÕýÊÇ´ó˵»°Ä£ÐÍ£¨LLM£©ÑµÁ·Êý¾ÝµÄµäÐÍÌØµã¡£¡£¡£ÓÃÓÚÕâ´Î¶ñÒ⹤×÷µÄLLM¾ßÌåÊÇÄÄÒ»¿îÉв»Ã÷ÏÔ£¬£¬µ«¹È¸èÒÑÅųýÁËÆä×Ô¼ÒGeminiÄ£ÐͲμӵĿÉÄÜÐÔ¡£¡£¡£½øÒ»²½Ö¤¾ÝÅú×¢£¬£¬LLM»¹±»ÀûÓÃÔÚ·ì϶·¢Ïֽ׶Ρ£¡£¡£¸Ã·ì϶ÐÔÖÊÉÏÊÇÒ»¸ö¸ß¼¶ÓïÒåÂß¼ÃýÎ󣬣¬ÕâÀàȱµã¸ÕºÃÊÇÈËΪÖÇÄÜϵͳÉÃÓÚʶ´ËÍâÀàÐÍ£¬£¬¶ø·Çͨ³£Í¨¹ýÄ£ºý²âÊÔ»ò¾²Ì¬·ÖÎö¾ÍÄÜ·¢ÏÖµÄÄÚ´æ°Ü»µ»òÊäÈëËãÕÊÎÊÌâ¡£¡£¡£GTIG×êÑÐÈËÔ±°µÊ¾£¬£¬ÕâÊÇËûÃdzõ´Î·¢ÏÖÒ»¸öʹÓÃÁãÈÕ·ì϶µÄÍþвÐÐΪÕߣ¬£¬ÇҸ÷ì϶±»ÒÔΪÊÇͨ¹ýÈËΪÖÇÄÜ¿ª·¢µÄ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/google-hackers-used-ai-to-develop-zero-day-exploit-for-web-admin-tool/
6. ºÚ¿ÍÀûÓÃVercelÓëÌìÉúʽAI´ó¹æÄ£ÖÆ×÷´¹µöÍøÕ¾
5ÔÂ11ÈÕ£¬£¬ÍøÂ簲ȫ¹«Ë¾CofenseµÄ×êÑÐÈËÔ±½üÈÕ·¢ÏÖ£¬£¬ºÚ¿ÍÀûÓÃÍøÕ¾¿ª·¢Æ½Ì¨VercelÌáÒé¸ßÖÊÁ¿Ú¿ÆµÄ»î¶¯¼±¾çÔö³¤¡£¡£¡£Ú¿Æ·Ö×Ӵ˿̽èÖúÌìÉúʽÈËΪÖÇÄÜ£¨GenAI£©¹¹½¨³öÏÕЩÎÞ·¨ÓëÕæÊµÍøÕ¾·Ö±æµÄÐéÎ±Ò³Ãæ¡£¡£¡£³ö¸ñÊÇͨ¹ýVercelÆìϵÄÌìÉúʽUIϵͳv0.dev£¬£¬¼´±ãÊǼ¼ÊõÄÜÁ¦ºÜÈõµÄÚ¿ÆÕߣ¬£¬Ò²ÄÜÇáËÉ´´½¨·ÂÕÕ³ÛÃûÆ·ÅÆÍâ¹Û΢·ç¸ñµÄ´¹µöÍøÕ¾¡£¡£¡£ÕâÒ»¹ý³Ì²»½ö¼±¾ç£¬£¬²¢Çҳɱ¾±ãÒË¡£¡£¡£Vercel×ÔÉíÊÇÒ»¸öÃæÏòÍøÕ¾¿ª·¢ÕߵĺϷ¨ÔÆÆ½Ì¨£¬£¬µ«ºÚ¿ÍÄܹ»µÈÏÐ×¢²áʹÓᣡ£¡£¸Ãƽ̨ÌṩÃâ·Ñ°æ±¾ÒÔ¼°Ã¿ÔÂ20ÃÀÔªµÄרҵ°æÕË»§£¬£¬¹¥»÷ÕßÎÞÐèÖÎÀí×Ô¼ºµÄ·þÎñÆ÷¼´¿ÉÔÚÏßÍйÜÍøÒ³¡£¡£¡£¸üΪ¹Ø¼üµÄÊÇ£¬£¬Ò»µ©Ä³¸ö´¹µöÒ³Ãæ±»²é·â£¬£¬ËûÃÇ¿ÉÄܼ±¾ç´î½¨ÐÂÒ³Ãæ£¬£¬ÓÉÓÚÈËΪÖÇÄÜÿ´Î³ÇÊÐÌìÉúÂÔÓÐ·ÖÆçµÄ°æ±¾£¬£¬Ê¹µÃ»ùÓÚÌØµãµÄ´«Í³·â¶ÂÕ½ÊõÄÑÒÔ¼ûЧ¡£¡£¡£ºÚ¿Í»¹½«ÕâЩÐéÎ±ÍøÕ¾ÓëTelegramƽ̨ÏÎ½ÓÆðÀ´¡£¡£¡£µ±Êܺ¦ÕßÔÚαÔìµÄµÇÂ¼Ò³ÃæÖÐÊäÈëСÎÒÐÅϢʱ£¬£¬Telegram»úеÈËAPI»á½«ÕâЩÊý¾Ýʵʱ·¢Ë͸ø¹¥»÷Õß¡£¡£¡£ÕâÖÖ×Ô¶¯»¯²¿Êð½Ó¿ÚʹڿÆÕßÎÞÐèÊØ»¤¸´Ôӵĺó¶Ë·þÎñÆ÷¼´¿ÉÇáËÉ¼à¿Ø²¢ÊÕÈ¡ÇÔÈ¡µ½µÄƾ֤¡£¡£¡£
https://hackread.com/hackers-exploit-vercel-genai-phishing-sites/


¾©¹«Íø°²±¸11010802024551ºÅ