#thn

共收录 23 条相关安全情报。

← 返回所有主题

Google has addressed a maximum severity security flaw in Gemini CLI -- the "@google/gemini-cli" npm package and the "google-github-actions/run-gemini-cli" GitHub Actions workflow -- that could have allowed attackers to execute arbitrary commands on host systems. "The vulnerability allowed an unprivileged external attacker to force their own malicious content to load as Gemini configuration,"

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)

Cybersecurity researchers are sounding the alarm about a new supply chain attack campaign targeting SAP-related npm Packages with credential-stealing malware. According to reports from Aikido Security, Onapsis, OX Security, SafeDep, Socket, StepSecurity, and Google-owned Wiz, the campaign – calling itself the mini Shai-Hulud – has affected the following packages associated with SAP's

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | 涉及供应链攻击 (+4) | 涉及云/身份/边界网关 (+4) | LLM 评分加成 (+0.4)

Cybersecurity researchers have discovered malicious code in an npm package after a malicious package as a dependency to the project by Anthropic's Claude Opus large language model (LLM). The package in question is "@validate-sdk/v2," which is listed on npm as a utility software development kit (SDK) for hashing, validation, encoding/decoding, and secure random generation. However, its real

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)

In February 2026, researchers uncovered a shift that completely changed the game: threat actors are now using custom AI setups to automate attacks directly into the kill chain. We aren't just talking about AI writing better phishing emails anymore. We’re talking about autonomous agents mapping Active Directory and seizing Domain Admin credentials in minutes. The problem? Most defensive workflows

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)

Every security team has a version of the same story. The quarter ends with hundreds of vulnerabilities closed. The dashboards are bursting with green. Then someone in a leadership meeting asks: "So, are we actually safer now?" Crickets. The room goes quiet because an honest answer requires context – which is something that patch counts and CVSS scores were never designed to provide. Exposure

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)

cPanel has released security updates to address a security issue impacting various authentication paths that could allow an attacker to obtain access to the control panel software. The problem affects all currently supported versions of cPanel and WebHost Manager (WHM), according to an alert published by WebPros on Tuesday. It does not have an official identifier. The issue has been addressed in

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
推荐 4.4
Conf: 50%
CVE-2024-1708

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting ConnectWise ScreenConnect and Microsoft Windows to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerabilities are listed below - CVE-2024-1708 (CVSS score: 8.4) - A path traversal vulnerability in  ConnectWise ScreenConnect

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | 包含 CVE (+2) | LLM 评分加成 (+0.4)
推荐 16.4
Conf: 60%
CVE-2026-42208

2026年4月29日,安全媒体报道了BerriAI的LiteLLM Python包中存在一个严重SQL注入漏洞(CVE-2026-42208,CVSS评分9.3)。该漏洞在公开披露后仅36小时内即被攻击者利用进行野外攻击。LiteLLM是一个用于管理大型语言模型(LLM)API调用和代理的流行开源库。漏洞允许未经授权的攻击者通过特制的SQL注入请求,操纵底层数据库,可能导致数据泄露、权限提升或服务中断。攻击者能够快速武器化并自动扫描利用,表明威胁行为者对新兴漏洞的响应速度极快。目前尚未有特定的攻击组织或恶意软件被归因。安全团队应优先修补该漏洞,并监控内部网络中对LiteLLM服务的异常查询。

💡 影响/原因: CVE-2026-42208是LiteLLM的严重SQL注入漏洞,披露后36小时内即被利用,表明攻击者快速武器化已知漏洞。影响使用LiteLLM管理LLM服务的组织,可能导致数据泄露和服务受损。

🎯 建议动作: 立即将LiteLLM升级到包含该漏洞补丁的最新版本;检查数据库日志中是否有可疑SQL查询;部署Web应用防火墙(WAF)以拦截SQL注入尝试;监控对LiteLLM API的异常访问行为。

排序因子: 有可用补丁/修复方案 (+3) | 影响边界/网络设备 (+5) | Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | 包含 CVE (+2) | 涉及云/身份/边界网关 (+4) | LLM 评分加成 (+0.4)
CVE-2026-3854

Cybersecurity researchers have disclosed details of a critical security vulnerability impacting GitHub.com and GitHub Enterprise Server that could allow an authenticated user to obtain remote code execution with a single "git push" command. The flaw, tracked as CVE-2026-3854 (CVSS score: 8.7), is a case of command injection that could allow an attacker with push access to a repository to achieve

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | 包含 CVE (+2) | LLM 评分加成 (+0.4)

A cybercrime group of Brazilian origin has resurfaced after more than three years to orchestrate a campaign that targets Minecraft players with a new stealer called LofyStealer (aka GrabBot). "The malware disguises itself as a Minecraft hack called 'Slinky,'" Brazil-based cybersecurity company ZenoX said in a technical report. "It uses the official game icon to induce voluntary execution,

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)

Threat hunters are warning that the cybercriminal operation known as VECT 2.0 acts more like a wiper than a ransomware due to a critical flaw in its encryption implementation across Windows, Linux, and ESXi variants that renders recovery impossible even for the threat actors. The fact that VECT's locker permanently destroys large files rather than encrypting them means even victims who opt to

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | 涉及勒索软件 (+4) | LLM 评分加成 (+0.4)
推荐 7.4
Conf: 50%

Every security program is betting on the same assumption: once a system is connected, the problem is solved. Open a ticket, stand up a gateway, push the data through. Done. That assumption is wrong. It is also a major reason Zero Trust programs stall. New research my team just published puts numbers on it. The Cyber360: Defending the Digital Battlespace report, based on a survey of 500 security

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 影响边界/网络设备 (+5) | Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
CVE-2026-25874

Cybersecurity researchers have disclosed details of a critical security flaw impacting LeRobot, Hugging Face's open-source robotics platform with nearly 24,000 GitHub stars, that could be exploited to achieve remote code execution. The vulnerability in question is CVE-2026-25874 (CVSS score: 9.3), which has been described as a case of untrusted data deserialization stemming from the use of the

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | 包含 CVE (+2) | LLM 评分加成 (+0.4)
推荐 2.4
Conf: 50%

When patching isn’t fast enough, NDR helps contain the next era of threats. If you’ve been tracking advancements in AI, you know the exploit window, the short buffer that organizations relied on to patch and protect after a vulnerability disclosure, is closing fast. Anthropic’s new model, Claude Mythos, and its Project Glasswing, showed that finding exploitable vulnerabilities and subtle cracks

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)

A Chinese national accused of being a member of the Silk Typhoon hacking group has been extradited to the U.S. from Italy.  Xu Zewei, 34, was arrested in July 2025 by Italian authorities for his alleged links to the Chinese state-sponsored threat group and for orchestrating cyber attacks against American organizations and government agencies between February 2020 and June 2021, including

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | 涉及 APT/国家级攻击 (+4) | LLM 评分加成 (+0.4)

An administrative role meant for artificial intelligence (AI) agents within Microsoft Entra ID could enable privilege escalation and identity takeover attacks, according to new findings from Silverfort. Agent ID Administrator is a privileged built-in role introduced by Microsoft as part of its agent identity platform to handle all aspects of an AI agent's identity lifecycle operations in a

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | 涉及云/身份/边界网关 (+4) | LLM 评分加成 (+0.4)
推荐 13.4
Conf: 50%
CVE-2026-32202

Microsoft on Monday revised its advisory for a now-patched, high-severity security flaw impacting Windows Shell to acknowledge that it has been actively exploited in the wild. The vulnerability in question is CVE-2026-32202 (CVSS score: 4.3), a spoofing vulnerability that could allow an attacker to access sensitive information. It was addressed as part of its Patch Tuesday update for this

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: 影响边界/网络设备 (+5) | Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | 包含 CVE (+2) | 涉及云/身份/边界网关 (+4) | LLM 评分加成 (+0.4)

Checkmarx has disclosed that its ongoing investigation tied to the supply chain security incident has revealed that a cybercriminal group published data related to the company on the dark web. "Based on current evidence, we believe this data originated from Checkmarx's GitHub repository, and that access to that repository was facilitated through the initial supply chain attack of March 23, 2026,

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | 涉及供应链攻击 (+4) | LLM 评分加成 (+0.4)

Everything is dumb again. This week feels broken in a very familiar way. Old tricks are back. New tools are doing shady crap. Supply chains got hit. Fake help desks worked. Weird research showed how easy some attacks still are. Most of it feels like stuff we should have fixed years ago. Bad extensions. Stolen creds. Remote tools are getting abused. Malware hides in places people trust. Same

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | 涉及供应链攻击 (+4) | LLM 评分加成 (+0.4)

Anthropic’s Claude Mythos Preview has dominated security discussions since its April 7 announcement. Early reporting describes a powerful cybersecurity-focused AI system capable of identifying vulnerabilities at scale and raising serious questions about how quickly organizations can validate, prioritize, and remediate what it finds. The debate that followed has mostly focused on the right

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)
推荐 2.4
Conf: 50%

A pro-Ukrainian hacktivist group called PhantomCore has been attributed to attacks actively targeting servers running TrueConf video conferencing software in Russia since September 2025. That's according to a report published by Positive Technologies, which found the threat actors to be leveraging an exploit chain comprising three vulnerabilities to execute commands remotely on susceptible

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)

Cybersecurity researchers have flagged dozens of Microsoft Visual Studio Code (VS Code) extensions on the Open VSX repository that are linked to a persistent information-stealing campaign dubbed GlassWorm. The cluster of 73 extensions has been identified as cloned versions of their legitimate counterparts. Of these, six have been confirmed to be malicious, with the remaining acting as seemingly

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | LLM 评分加成 (+0.4)

Cybersecurity researchers have disclosed details of a telecommunications fraud campaign that uses fake CAPTCHA verification tricks to dupe unsuspecting users into sending international text messages that incur charges on their mobile bills, generating illicit revenue for the threat actors who lease the phone numbers. According to a new report published by Infoblox, the operation is believed to

💡 影响/原因: 原文内容(由于配额限制,未进行深度 LLM 分析)

🎯 建议动作: 建议根据原文自行评估

排序因子: Community 数据源 (+1) | 官方/一手情报来源 (+1 叠加到 Primary) | 涉及 APT/国家级攻击 (+4) | LLM 评分加成 (+0.4)