Attacks & Vulnerabilities | 4M Affected by VeriSource Data Breach (2 minute read) VeriSource Services, which provides employee benefit administrative services, is notifying 4 million individuals that it experienced a data breach in February 2024. The compromised data includes names, addresses, dates of birth, gender information, and Social Security numbers. | Banking Passwords Stolen from Australians are Being Traded Online by Cybercriminals (3 minute read) Threat intelligence researchers from Australian firm Dvuln say that 31k passwords belonging to Australian customers of the Big Four banks are being shared on Telegram and dark web sites. The researchers stated that the passwords are coming directly from infostealers installed on victims' devices, not a vulnerability or breach from the banks. Dvuln has stated that these bank accounts can be used to transfer funds or for money laundering. | Millions of Apple Airplay-Enabled Devices Can Be Hacked via Wi-Fi (4 minute read) Researchers have discovered "AirBorne" security flaws in Apple's AirPlay protocol that allow hackers on the same Wi-Fi network to hijack AirPlay-enabled devices. While Apple has patched vulnerabilities in its products, millions of third-party devices remain at risk, potentially creating persistent network access points for attackers. | | How to survive as a CISO aka 'chief scapegoat officer (3 minute read) A panel in RSA discussed the role of the CISO, highlighting how CISOs should secure personal liability insurance and golden parachutes when starting new jobs as protection against becoming scapegoats. They advised documenting everything, avoiding lawsuits against employers after whistleblowing to prevent industry blacklisting, and not trusting HR departments, which ultimately protect the company, not employees. | Shadow Roles: AWS Defaults Can Open the Door to Service Takeover (10 minute read) AWS default roles, such as AWSGlueServiceRole, often have overly broad access, like AmazonS3FullAccess, making service takeover easier for attackers. They can exploit these roles to manipulate various AWS services beyond S3 buckets, risking the entire environment. To mitigate risks, audit AWS roles and restrict excessive access, especially to S3 buckets. | | OpenAIPot (GitHub Repo) OpenAIPot is a deceptive OpenAI API gateway that acts as a honeypot for detecting unauthorized API usage. | AuthMind (Product Launch) AuthMind monitors the flow of activities for both human and non-human identities, aiming to provide organizations with a consolidated identity security posture management (ISPM) and threat detection and response (ITDR) solution. | | Take It Down Act Heads to Trump's Desk (2 minute read) The bipartisan Take It Down Act, which will require social media companies to take down content flagged as nonconsensual (including AI-generated) sexual images, is heading to Trump's desk for signature. Some privacy activists are concerned that the takedown will be selectively enforced by the FTC and does not provide enough time for smaller sites to verify the claims correctly, which could be abused to hinder platforms' ability to operate effectively. The bill does not contain exemptions for end-to-end encrypted services such as private messaging and cloud storage. | | Love TLDR? Tell your friends and get rewards! | Share your referral link below with friends to get free TLDR swag! | | Track your referrals here. | Want to advertise in TLDR? 📰 If your company is interested in reaching an audience of cybersecurity professionals and decision makers, you may want to advertise with us. Want to work at TLDR? 💼 Apply here or send a friend's resume to jobs@tldr.tech and get $1k if we hire them! If you have any comments or feedback, just respond to this email! Thanks for reading, Prasanna Gautam, Eric Fernandez & Sammy Tbeile | | | |
0 Comments