Latest

6/recent/ticker-posts

Header Ads Widget

Amazon Finds APT Via Honeypot 🍯, Google Private AI Compute 🤖, Authoritarian state sabotage 💥

Amazon's threat intelligence team discovered an APT exploiting zero-day vulnerabilities CVE-2025-20337 in Cisco Identity Service Engine ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌  ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 

TLDR

Together With Beech Street Digital

TLDR Information Security 2025-11-13

This AI-powered DNS filter is G2's Momentum Leader right now. See why (Sponsor)

Want to block threats 10 days earlier? DNSFilter uses AI to prevent 200 million threats from reaching protected systems every day.  

43,000 organizations rely on DNSFilter to block malware, phishing, and botnets before they hit. Key features include:

🔎 Granular policy controls so you can customize protections for your use case

🚀 Easy setup for Roaming Clients — rated Most Implementable by G2 for Fall 2025

🛡️ Defense against zero-day attacks so your team is free from the 2 a.m. scramble

Schedule a personalized demo for free, with no strings attached. 

🔓

Attacks & Vulnerabilities

SAP fixed a maximum severity flaw in SQL Anywhere Monitor (3 minute read)

SAP patched 19 vulnerabilities in November, including CVE-2025-42890 (CVSS 10/10), a critical hardcoded credentials flaw in SQL Anywhere Monitor (Non-GUI) that enabled arbitrary code execution with complete system compromise. Additional critical fixes include CVE-2025-42887 (CVSS 9.9) in SAP Solution Manager, which addresses code injection via missing input sanitization, and an update to CVE-2025-42944 that addresses insecure deserialization in SAP NetWeaver AS Java. Organizations should immediately discontinue SQL Anywhere Monitor usage, delete all monitor database instances, and apply patches across affected SAP products. No evidence of active exploitation has been reported.
Amazon discovers APT exploiting Cisco and Citrix zero-days (2 minute read)

Amazon's threat intelligence team discovered an APT exploiting zero-day vulnerabilities CVE-2025-20337 in Cisco Identity Service Engine (pre-authentication RCE via deserialization) and CVE-2025-5777 in Citrix systems. The attacks were detected via MadPot honeypots before public disclosure. The threat actor deployed a custom Java web shell named IdentityAuditAction, which features in-memory operation, Java reflection for thread injection, DES encryption with non-standard Base64 encoding, and HTTP header-based authentication requiring specific knowledge to access. Organizations should immediately patch affected Cisco ISE and Citrix NetScaler systems, implement firewall restrictions on management portal access, deploy defense-in-depth strategies for identity infrastructure, and monitor for anomalous behavior patterns in authentication systems even when properly configured.
Synology Fixes BeeStation Zero-Days Demoed at Pwn2Own Ireland (2 minute read)

Synology has fixed a critical vulnerability in its BeeStation OS, which powers Synology NAS devices, discovered by researchers at Pwn2Own Ireland. A buffer overflow causes the vulnerability and can result in remote code execution.
🧠

Strategies & Tactics

No Leak, No Problem - Bypassing ASLR with a ROP Chain to Gain RCE (10 minute read)

A showcase on how to exploit a modern ARM-based IoT device, specifically a network camera, by bypassing Address Space Layout Randomization (ASLR) to achieve unauthenticated remote code execution (RCE) using a Return-Oriented Programming (ROP) chain. This approach cleverly bypasses ASLR, a memory protection mechanism designed to block exploit attempts, allowing remote code execution without requiring the leakage of addresses. By manipulating writable memory and leveraging known offsets, the attacker can execute commands on the device, illustrating how gaps in embedded device security can be exploited even with mitigations in place.
Active Directory Under Siege: Why Critical Infrastructure Needs Stronger Security (3 minute read)

Active Directory remains the authentication backbone for 90% of Fortune 1000 companies, with attackers exploiting golden ticket attacks, DCSync privilege escalation, Kerberoasting, and compromised credentials (involved in 88% of breaches per Verizon DBIR) to gain network-wide control, as demonstrated by the 2024 Change Healthcare breach, where MFA absence enabled full AD compromise. Critical vulnerabilities include weak passwords, service accounts with excessive permissions and non-expiring credentials, cached admin credentials in memory, legacy NTLM protocol exploitation, and hybrid environment complexity, creating visibility gaps between on-premises and cloud security teams. Implement layered defenses, including continuous credential monitoring against breach databases (blocking 4B+ compromised passwords), privileged access management with just-in-time elevation, zero-trust conditional access with MFA for all privileged accounts, continuous AD change monitoring for suspicious patterns, and aggressive patching of domain controllers within days of security updates.
Two Scenario Threat Modeling (5 minute read)

Many people feel intimidated by the number of potential scenarios and never perform threat modeling. Instead, many of the insights of a threat modeling exercise can be garnered by considering only a worst case scenario and a likely but impactful scenario. Security teams should devise detailed story-driven scenarios for these exercises and then proceed in either an informal or formal threat modeling exercise.
🧑‍💻

Launches & Tools

Tenzai (Product Launch)

Tenzai is an AI-driven penetration testing platform that continuously identifies and addresses software vulnerabilities, aiming to automate manual and infrequent pentesting.
Mailgoose (GitHub Repo)

Mailgoose is a web application that allows users to check whether their SPF, DMARC, and DKIM configurations are set up correctly.
Private AI Compute: our next step in building private and helpful AI (2 minute read)

Private AI Compute is a Google platform that enhances AI privacy by combining the power of advanced Gemini cloud models with on-device security standards. This approach ensures users' data is kept private while unlocking fast, intelligent features like smarter suggestions. The system uses encrypted, hardware-secured spaces and multi-layered safeguards, allowing advanced AI without compromising personal data privacy.
🎁

Miscellaneous

Australia's spy boss says authoritarian nations ready to commit 'high-impact sabotage' (2 minute read)

Australia's intelligence chief warns that authoritarian states are increasingly willing and able to sabotage critical infrastructure via cyber-attacks. He cites Chinese hacker groups probing Australian networks, and highlights a shift from espionage to disruptive actions that could cripple essential services.
AWS Backup Now Supports Amazon EKS (1 minute read)

AWS Backup now allows for creating fully managed backups of EKS clusters. It supports scheduled backups, data retention, immutable vaults, and cross-region and cross-account copies for application data and cluster state.

Quick Links

How to get more from your Microsoft 365 licenses — without moving to E5 (Sponsor)

Enterprise-grade security at an SMB-ready price point? Not impossible anymore: Microsoft's new Defender and Purview add-ons work at a scale and cost that fits any business. Download the guide by US Signal
Microsoft Patch Tuesday security updates for November 2025 fixed an actively exploited Windows Kernel bug (2 minute read)

Microsoft's November 2025 Patch Tuesday addressed 63 vulnerabilities, including CVE-2025-62215, an actively exploited Windows Kernel race condition enabling local privilege escalation to SYSTEM, and CVE-2025-62199, a use-after-free RCE in Microsoft Office.
Malicious npm package sneaks into GitHub Actions builds (2 minute read)

A typosquatted npm package named "@acitons/artifact," with 260K downloads, targeted GitHub Actions CI/CD pipelines through a post-install hook that ran obfuscated shell scripts to steal tokens and impersonate GitHub by publishing malicious artifacts.
@facebookmail.com Invites Exploited to Phish Facebook Business Users (2 minute read)

Attackers sent 40,000 phishing emails to 5,000 Facebook Business users by exploiting Meta's invitation feature to send credential-harvesting links from @facebookmail.com, targeting SMBs in various sectors with fake invites that redirected to phishing pages which mimicked Meta branding.

Love TLDR? Tell your friends and get rewards!

Share your referral link below with friends to get free TLDR swag!
Track your referrals here.

Want to advertise in TLDR? 📰

If your company is interested in reaching an audience of cybersecurity professionals and decision makers, you may want to advertise with us.

Want to work at TLDR? 💼

Apply here or send a friend's resume to jobs@tldr.tech and get $1k if we hire them!

If you have any comments or feedback, just respond to this email!

Thanks for reading,
Prasanna Gautam, Eric Fernandez & Sammy Tbeile


Manage your subscriptions to our other newsletters on tech, startups, and programming. Or if TLDR Information Security isn't for you, please unsubscribe.

Post a Comment

0 Comments