Attacks & Vulnerabilities | Google Chrome Fixes Browser History Leaks by Purple "Visited" Links (2 minute read) Historically, bad actors have been able to track users' browsing history by utilizing the ":visited" CSS selector, which turns links purple. Google is aiming to address this leak by changing the way that the ":visited" selector is applied to only display if the user has visited the site from the current top-level site and frame origin. Effectively, the browser will now display purple links based on the combination of the current site and visited sites. | Govtech Giant Conduent Confirms Client Data Stolen in January Cyberattack (2 minute read) Conduent, which provides business services to over 600 government agencies, confirmed that client data was stolen following a January cyberattack. Its investigators have discovered that the stolen data contains extensive details on its clients' end-users but have not provided additional details. Per Conduent, the data has not been posted on the dark web or elsewhere. | | A Not So Comprehensive Guide to Securing Your Salesforce Organization (12 minute read) This article discusses Salesforce security vulnerabilities. Insecure SOQL queries in Apex can bypass sharing models, risking sensitive data exposure without enforcing object-level security. It warns against storing credentials in cleartext in Custom Metadata Types, Settings, Objects, and Apex comments. It also explains managed packages with namespaces, authorization, and Apex Actions via REST API, setting the stage for real-world exploitation scenarios. | | dAWShund (GitHub Repo) dAWShund is a suite of tools for managing and visualizing AWS permissions, assisting in identifying and organizing access conditions between resources. It includes tools like sAWSage for policy enumeration and Gerakina for simulating IAM policies. Gerakina outputs can also be imported into a Neo4j database for further analysis using Cypher queries. | Cybermonit (Website) Cybermonit tracks key cybersecurity metrics and statistics from the last 30 days, such as News, Leaks, CVEs, Ransomware, and Software Releases. | Witness (GitHub Repo) Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact provenance. | | Threat Modeling GitHub - How Vulnerable-by-Design is GitHub? (7 minute read) GitHub was built around the principles of openness and collaboration to facilitate open-source development. As the platform has matured, it has become an enterprise standard, and trade-offs between openness and security have revealed its inherent security flaws. This post looks at access control, GitHub Actions and CI/CD, Secrets Management, and Repository security design issues, as well as supply chain and SHA1 collision attacks. | Microsoft Starts Final Windows Recall Testing Before Rollout (2 minute read) Microsoft has begun to roll Windows Recall out to Insiders in the Release Preview channel. Following community outrage, Microsoft initially delayed the feature, made it an opt-in feature, and required Windows Hello to access the stored screenshots. Microsoft has also stated that it has added anti-hammering and rate-limiting protections to Recall. | | Love TLDR? Tell your friends and get rewards! | Share your referral link below with friends to get free TLDR swag! | | Track your referrals here. | Want to advertise in TLDR? 📰 If your company is interested in reaching an audience of cybersecurity professionals and decision makers, you may want to advertise with us. Want to work at TLDR? 💼 Apply here or send a friend's resume to jobs@tldr.tech and get $1k if we hire them! If you have any comments or feedback, just respond to this email! Thanks for reading, Prasanna Gautam, Eric Fernandez & Sammy Tbeile | | | |
0 Comments