Latest

6/recent/ticker-posts

Header Ads Widget

React2Shell RCE 🗡️, Freedom Mobile Data Breach 📱, AI Exploit Smart Contracts 💸

A critical flaw in React 19 allows attackers to execute code remotely on applications that use newer server-side features and common frameworks ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌  ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 

TLDR

Together With ThreatLocker

TLDR Information Security 2025-12-05

Special offer for TLDR readers: $200 off Zero Trust World 2026 with code ZTWTLDR26 (Sponsor)

ThreatLocker's annual Zero Trust World is the most interactive, hands-on cybersecurity learning event. Join hacking labs, get Cyber Hero certified, and attend sessions with cybersecurity, IT, and business experts.

👀 TLDR readers get $200 off all-access registration. That's 33% less than the list price

🎓 Registration includes all sessions and labs (including CPE eligible sessions!) 

🍹At Zero Trust World, all access really means all access, so meals and the afterparty are included with each pass. 

Use code ZTWTLDR26 for $200 off your all-access pass

🔓

Attacks & Vulnerabilities

Fintech firm Marquis alerts dozens of US banks and credit unions of a data breach after ransomware attack (3 minute read)

Marquis, a Texas-based fintech that provides marketing and compliance services to over 700 US banks and credit unions, suffered a ransomware attack on August 14 that exploited a zero-day vulnerability in SonicWall. Attackers stole sensitive customer data, including names, contact details, financial account numbers, and Social Security numbers, impacting at least 400,000 people so far. The total is expected to grow as more state notifications are filed.
React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability (4 minute read)

A critical flaw in React 19, dubbed React2Shell, allows attackers to execute code remotely on applications that use newer server-side features and common frameworks. Many cloud environments are reportedly exposed. Vendors are already shipping detection and protection rules.
Freedom Mobile Discloses Data Breach Exposing Customer Data (2 minute read)

Freedom Mobile, Canada's fourth-largest wireless carrier, disclosed a data breach impacting an undisclosed number of customers. The breached data includes first and last names, home addresses, dates of birth, home and/or cell phone numbers, and Freedom Mobile account numbers. The data was breached via the account of a subcontractor. Ransomware was not involved.
🧠

Strategies & Tactics

Evaluating AI Agents in Security Operations (6 minute read)

Cotool tested an AI agent's ability to solve security operations tasks using the Splunk BOTSv3 dataset and frontier models from Claude, OpenAI, and Gemini. Cotool found that while GPT-5.1 and Opus 4.5 achieved the top accuracy at 63%, Opus was 3x more expensive than GPT-5.1 but also completed tasks in half the wall-clock time of any other model. The Gemini models performed notably poorly on the tasks and failed to complete several tasks.
The Exploitation of Legitimate Remote Access Tools in Modern Ransomware Campaigns (8 minute read)

Ransomware operators often use remote access tools such as AnyDesk and UltraViewer to maintain persistence, execute remote tasks, and transfer files while avoiding detection. Their typical attack involves using stolen credentials to compromise an employee, then either hijacking existing tools or installing legitimate remote access software, followed by establishing persistence, escalating privileges, and disabling security tools. Subsequently, they deploy payloads, move laterally within the network, and finally execute their ransomware attack.
Smile, You're on Camera: A Live Stream from Inside Lazarus Group's IT Workers Scheme (20 minute read)

Researchers trapped North Korean operatives from Lazarus Group's Famous Chollima division inside an extended ANY.RUN sandbox environments, documenting their full operational workflow for infiltrating Western companies as remote IT workers. The operators recruit developers via GitHub spam. They offer 20-35% salary cuts in exchange for using victims' identities and laptops for job applications, relying on AI interview tools, AstrillVPN, and remote access software rather than malware. Poor operational security allowed researchers to delay, monitor, and ultimately expose the scheme targeting the finance, crypto, and healthcare sectors.
🧑‍💻

Launches & Tools

7AI (Product Launch)

7AI builds an "agentic security" platform where autonomous AI agents investigate alerts, correlate data, and take or recommend actions to reduce alert fatigue.
TheOpenLane Core (GitHub Repo)

Open source compliance automation for SOC 2, GDPR, ISO27001, NIST 800-53, and more.
God's Eye (GitHub Repo)

God's Eye is an ultra-fast subdomain enumeration and reconnaissance tool with local LLM analysis via Ollama.
🎁

Miscellaneous

GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections (7 minute read)

GoldFactory is a cybercrime group targeting Android users in Indonesia, Thailand, and Vietnam with tampered banking apps that still appear legitimate while secretly installing remote-access malware. The malware abuses accessibility services and hooking frameworks to bypass security checks, hide its presence, control devices in real time, and steal banking data at scale. At least 11,000 infections have been identified so far.
Arizona Attorney General Sues Chinese Online Retailer Temu Over Data Theft Claims (2 minute read)

Arizona Attorney General Kris Mayes has joined several other states in suing Temu and its parent company over allegations that the online retailer is stealing customers' data. Mayes stated that the app collects a startling amount of data without users' consent, specifically citing GPS location and a list of other apps on users' phones. Mayes also expressed concerns over the quality of products sold on Temu and whether the retailer has "ripped off" other businesses.
Frontier AI Models Demonstrate Human-Level Capability in Smart Contract Exploits (4 minute read)

Anthropic evaluated ten frontier models on a dataset of 405 historical smart contract exploits and found that the agents produced working attacks against 207 of them, totaling $550M in simulated stolen funds. Anthropic measured the model's current capabilities by plotting each model's total exploit revenue against its release date. The models also discovered two previously undisclosed zero-days.

Quick Links

Blumira: AI-guided SecOps Platform that makes humans more effective (Sponsor)

Blumira's SOC Auto-Focus translates complex findings into plain language, giving teams instant clarity, clear priorities, and guided next steps, without replacing human judgment. Learn more about Blumira & SOC AF
Air fryer app caught asking for voice data (re-air) (Lock and Code S06E24) (2 minute read)

Malwarebytes' Lock and Code podcast revisits UK research revealing that air fryer companion apps requested precise location and audio recording permissions without explanation.
Proxyearth Tool Lets Anyone Trace Users in India with Just a Mobile Number (3 minute read)

A website called Proxyearth, launched in October, enables anyone to retrieve Indian citizens' full names, Aadhaar numbers, residential addresses, and live locations using only a mobile number.

Love TLDR? Tell your friends and get rewards!

Share your referral link below with friends to get free TLDR swag!
Track your referrals here.

Want to advertise in TLDR? 📰

If your company is interested in reaching an audience of cybersecurity professionals and decision makers, you may want to advertise with us.

Want to work at TLDR? 💼

Apply here or send a friend's resume to jobs@tldr.tech and get $1k if we hire them!

If you have any comments or feedback, just respond to this email!

Thanks for reading,
Prasanna Gautam, Eric Fernandez & Sammy Tbeile


Manage your subscriptions to our other newsletters on tech, startups, and programming. Or if TLDR Information Security isn't for you, please unsubscribe.

Post a Comment

0 Comments