Attacks & Vulnerabilities | New Lenovo UEFI Firmware Updates Fix Secure Boot Bypass Flaws (2 minute read) Lenovo is warning users about new high-severity BIOS flaws that could allow attackers to bypass Secure Boot on some IdeaCentre AIO and Yoga AIO models. The vulnerabilities may enable local attackers to execute arbitrary code in System Management Mode (SMM), a CPU mode that operates independently from the OS and hypervisor, allowing them to plant "undetectable" malware that bypasses OS-level defenses. | Hackers Actively Exploit Critical RCE in WordPress Alone Theme (2 minute read) WordPress security firm Wordfence has reported an actively exploited, critical unauthenticated arbitrary file upload vulnerability in the premium WordPress theme 'Alone.' The vulnerability stems from the theme's `alone_import_pack_install_plugin()` function, which lacks nonce checks, is exposed via a `wp_ajax_nopriv_hook`, and permits plugin installation via AJAX. Attackers exploit the flaw by sending a POST request with a remote source URL pointing to an attacker-controlled file with webshells or other payloads. | | Cost of a Data Breach Report 2025 (20 minute read) IBM's 2025 breach report shows that global breach costs fell to $4.44 million while US breach costs reached a record high of $10.22 million. AI is emerging as both an attack vector and a defense mechanism, with 13% of breaches involving AI models due to inadequate access controls. Phishing has overtaken stolen credentials as the most common initial attack vector. | DreamWalkers (8 minute read) Reflectively loading modules is a technique to hide malware payloads injected via shellcode. Traditionally, the call stack cannot be convincingly spoofed due to missing unwind information. This post introduces a technique called DreamWalkers, which parses the PE structure to register unwind information via `RtlAddFunctionTable`, creating clean and convincing call stacks. | | shade (GitHub Repo) shade is a system for detecting shadow SaaS and securely recording the credentials involved. It consists of a browser extension that reports SaaS logins to a backend server, enabling security teams to monitor and manage shadow SaaS. | SockTail (GitHub Repo) SockTail is a lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. | Prophet AI (Product Launch) Prophet AI for Security Operations filters incoming alerts and, for each one, gathers, correlates, and analyzes data from multiple sources to provide a decision and a detailed investigation summary. | | Google Project Zero to Publicly Announce Bugs Within a Week of Reporting Them (2 minute read) Google's Project Zero vulnerability research team has announced that they will publicly disclose when they have discovered a vulnerability within a week of notifying vendors. This breaks from the longstanding norm of waiting 90 days for a fix and an additional 30 days post-patch before publishing technical details. Project Zero emphasized that it won't release technical details early, only broad information to help downstream dependents prepare for patching. | | Love TLDR? Tell your friends and get rewards! | Share your referral link below with friends to get free TLDR swag! | | Track your referrals here. | Want to advertise in TLDR? 📰 If your company is interested in reaching an audience of cybersecurity professionals and decision makers, you may want to advertise with us. Want to work at TLDR? 💼 Apply here or send a friend's resume to jobs@tldr.tech and get $1k if we hire them! If you have any comments or feedback, just respond to this email! Thanks for reading, Prasanna Gautam, Eric Fernandez & Sammy Tbeile | | | |
0 Comments