Attacks & Vulnerabilities | AI Image Site GenNomis Exposed 47GB of Underage Deepfakes (2 minute read) A data leak at GenNomis, an AI image site, exposed explicit deepfake material, including images of minors and celebrities. This incident raises concerns about unmonitored AI-generated content and underlines the need for improved security measures and responsible AI development. Cybersecurity researcher Jeremiah Fowler emphasized the importance of detecting and preventing harmful deepfakes. | Security Flaw Found in Unitree Go1 Robot Dogs (2 minute read) Researchers at the Berlin-based security startup thinkAwesome GmbH discovered a vulnerability in Unitree Go1 robot dogs. The robots include a service called CloudSail, which is a remote access tunnel service that was preinstalled on the devices. The researchers discovered that anyone with the default credentials and a specific API key could remotely control the robots and access their cameras. | | Surge in Palo Alto Networks Scanner Activity Indicates Possible Upcoming Threats (3 minute read) There has been a surge in login scanning for Palo Alto Networks PAN-OS GlobalProtect portals, with about 24,000 unique IPs attempting access in the last 30 days. This coordinated effort may indicate a plan to discover and exploit vulnerabilities. Organizations should secure their login portals. The primary sources are the United States and Canada, reflecting patterns from a past espionage campaign targeting network devices and highlighting the need to monitor and secure critical systems. | Understanding RCPs and SCPs in AWS: Choosing the Right Policy for your Security Needs (5 minute read) Resource Control Policies (RCPs) were introduced by AWS in late 2024 to restrict access to resources within your AWS organization. RCPs should be used when trying to enforce consistent security standards in supported services, you're running out of SCPs, or you want to use the NotResource condition. SCPs should be used when you want to apply a policy to services that are not supported by RCPs or use the NotAction condition. | | secureCodeBox (GitHub Repo) secureCodeBox is a Kubernetes-based, modularized toolchain for continuous security scans of your software projects. | | Microsoft's AI tool catches critical GRUB2, U-boot bootloader flaws (4 minute read) Microsoft's AI tool has detected critical vulnerabilities in bootloaders like GRUB2 and U-boot that enable attackers to bypass Secure Boot and deploy persistent malware. These flaws significantly threaten enterprises, allowing malware to survive OS reinstallation. Organizations must prioritize patching affected systems and improving firmware and bootloader updates. | | Reviewing the Cryptography Used by Signal (Blog Series) This blog series provides an explanation of how to conduct cryptographic reviews, a mapping of Signal, and an in depth look at Signal's symmetric-key authenticated encryption, Signal's use of double ratcheting protocols, key transparency, and other cryptographic features such as group messaging. | | | Love TLDR? Tell your friends and get rewards! | | Share your referral link below with friends to get free TLDR swag! | | | | Track your referrals here. | | Want to advertise in TLDR? 📰 If your company is interested in reaching an audience of cybersecurity professionals and decision makers, you may want to advertise with us. Want to work at TLDR? 💼 Apply here or send a friend's resume to jobs@tldr.tech and get $1k if we hire them! If you have any comments or feedback, just respond to this email! Thanks for reading, Prasanna Gautam, Eric Fernandez & Sammy Tbeile | | | |
0 Comments