Attacks & Vulnerabilities | Healthcare SaaS Firm Says Data Breach Impacts 5.4M Patients (2 minute read) Episource, a healthcare services company that provides risk adjustment, medical coding, data analytics, and technology solutions to health plans and providers, is warning impacted patients of a data breach that it suffered in January. The breached data may have included full names, physical addresses, email addresses, phone numbers, insurance plan and Medicaid information, medical records, dates of birth, and SSNs. Episource has stated that no banking or payment card information was stolen. | North Korea Targeting Indian Crypto Job Applicants With Malware (2 minute read) Cisco Talos is warning potential crypto job seekers in India of a malware campaign by the North Korean Famous Chollima group. Fake employers are approaching software engineers, marketing employees, and designers with skill-testing pages to apply for positions at cryptocurrency companies like Coinbase, Archblock, and Robinhood. These pages feature ClickFix attacks, which prompt victims to run malicious code to fix errors. The code eventually downloads infostealer malware to steal browser credentials and session tokens. | | Dangerous By Default: Insecure GitHub Actions Found in MITRE, Splunk, and Other Open Source Repositories (5 minute read) The `pull_request_target` event is infamous because it opens up room for abuse by running in the context of the base repo with full secrets access and write permissions to the GITHUB_TOKEN. Sysdig found repositories belonging to MITRE, Splunk, and a popular open-source Spotify client that could be hijacked via `pull_request_target` abuse. Sysdig recommends using the `pull_request` event instead, along with workflow splitting and restricting GITHUB_TOKEN permissions to avoid these issues. | Digging Tunnels: Hunting Adversarial Cloudflared Instances (10 minute read) Cloudflared is a popular tunneling service offered by Cloudflare that legitimate organizations or adversaries can utilize to establish persistence. Cloudflared authenticates using tokens that contain the account ID, tunnel ID, and a secret. Ransomware groups often do not vary their Cloudflare accounts, so detecting anomalous tokens or renamed processes can be effective for threat hunting. | | From Audit Chaos to Continuous Compliance (Sponsor) As your business evolves, so do risk & compliance challenges. Drata's AI-Native Trust Management platform simplifies oversight, keeps you ahead of regulations, and ensures you never miss a requirement. Scale faster. Stay compliant. Sleep better. Get a personalized demo of Drata's Trust Management Platform today. Get started | Loris (GitHub Repo) Loris is a stateful fuzz testing framework designed to explore and analyze baseband firmware. | Frida 17.2.0 Released (3 minute read) Frida is a dynamic toolkit for reverse engineering, security research, and runtime analysis across various platforms and languages. Version 17.2.0 focuses on simplifying package discovery with the `frida-pm` CLI tool. The release features a streamlined package manager for easily searching and installing Frida-specific packages using `frida-pm search` and `frida-pm install`, even without Node.js. | pycti-mcp (GitHub Repo) This is an MCP (Model Context Protocol) server for pycti that provides a front-end interface to OpenCTI threat intelligence data. The server condenses and normalizes OpenCTI data into JSON format for LLMs, making field names more verbose and resolving GraphQL-linked entities to provide better response context. It includes three main tools for looking up observables, adversaries, and reports in OpenCTI, and can run either as a TCP server or STDIO server. | | 5 Lessons Learned as Incident Commander of the Biggest Security Incident of My Career (7 minute read) Ryan Cox shares lessons from leading the incident response for a high-stakes incident that stretched about a month. Cox stresses the importance of proactively establishing interdepartmental relationships so that during an incident, you have SMEs that you can rely upon. Cox also reminds incident commanders to avoid diving too deeply into tasks and losing the big picture. Lastly, Cox stresses the importance of having scalable processes around documentation and other often forgotten topics and conducting post-mortem root-cause analysis. | | Love TLDR? Tell your friends and get rewards! | Share your referral link below with friends to get free TLDR swag! | | Track your referrals here. | Want to advertise in TLDR? 📰 If your company is interested in reaching an audience of cybersecurity professionals and decision makers, you may want to advertise with us. Want to work at TLDR? 💼 Apply here or send a friend's resume to jobs@tldr.tech and get $1k if we hire them! If you have any comments or feedback, just respond to this email! Thanks for reading, Prasanna Gautam, Eric Fernandez & Sammy Tbeile | | | |
0 Comments