Attacks & Vulnerabilities | Windows 10 Users Urged to Upgrade to Avoid Security Fiasco (2 minute read) ESET is urging Windows 10 users to upgrade to Windows 11 before Oct 2025, which is when Windows 10 reaches EoL and stops receiving security updates. Almost 63% of Windows users are still running Windows 10. Adoption has been slow due to missing features and the TPM requirement. Microsoft will be offering Extended Security Update plans for businesses and individuals. | | How Attackers Abuse Serverless Services to Harvest Sensitive Data from Environment Variables (10 minute read) This post provides an overview of how attackers exploit environment variables from serverless devices post-exploitation. When secrets are stored directly in environment variables, they can be leaked by an attacker that can achieve code execution on the function. As permissions are generally provided to the serverless execution environment via environment variables, they can also be acquired by the attacker to pivot to other services in the account that the function can access. To mitigate these issues, utilize Secrets Manager services, audit functions, scope roles to least privilege, and alert on abuse. | How to Build an Offensive AI Security Agent (7 minute read) This post walks through the process of building a POC for an offensive AI security agent that was able to analyze a JavaScript file to discover API endpoints and detect a vulnerability. The author provided the AI agent with 4 "tools" to find endpoints, format an API request, execute the test, and analyze the results. The post also provides some lessons learned, such as the importance of effective prompting, the power of agentic workflows, and the strengths of Claude 3.5 Sonnet for code writing. | | Access (GitHub Repo) Access is a tool that utilizes the Okta API to provide a centralized portal for employees to discover, request, and manage their access to internal systems. | | From Remediation to Mitigation: Addressing Insecure-by-Design Flaws (6 minute read) Insecure-by-Design flaws are vulnerabilities inherent to the design of a system. They require a full redesign of the system remediate. These vulnerabilities should first be mitigated by implementing guardrails and monitoring tools. Once mitigations are in place, a slow sunsetting process can be started to reduce downstream impacts. | Nessus scanner agents went offline due to a faulty plugin update (2 minute read) Tenable disabled two Nessus scanner agent versions due to a faulty plugin update that caused agents to go offline. The company released Nessus Agent v10.8.2 to address the issue and has advised customers to upgrade to this version or downgrade to 10.7.3 to resolve offline agent problems. Plugin feed updates were temporarily paused to prevent further issues. | | | Love TLDR? Tell your friends and get rewards! | | Share your referral link below with friends to get free TLDR swag! | | | | Track your referrals here. | | Want to advertise in TLDR? 📰 If your company is interested in reaching an audience of cybersecurity professionals and decision makers, you may want to advertise with us. Want to work at TLDR? 💼 Apply here or send a friend's resume to jobs@tldr.tech and get $1k if we hire them! If you have any comments or feedback, just respond to this email! Thanks for reading, Prasanna Gautam, Eric Fernandez & Sammy Tbeile | | | |
0 Comments