Latest

6/recent/ticker-posts

Header Ads Widget

PolyShell Hits Stores πŸ›’, iOS 26 vs. Coruna & DarkSword πŸ“±, MCP Docs Poisoned via PR Merge 🐍

A novel Magecart-style skimmer deployed via PolyShell, an unauthenticated RCE vulnerability in Magento Open Source and Adobe Commerce ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌  ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 

TLDR

Together With Sysdig

TLDR Information Security 2026-03-27

Forrester's evaluated 14 CNAPP providers - see why Sysdig was named a Leader (Sponsor)

Cloud attacks can unfold in under 10 minutes, and posture-only security tools weren't built for that pace. Forrester's latest CNAPP evaluation is proof that leading solutions have adapted.

In The Forrester Wave™: Cloud Native Application Protection Solutions, Q1 2026, Sysdig earned Leader status out of 14 vendors evaluated. 

πŸ‘€ The report noted Sysdig's runtime-powered foundation, its approach to connecting posture with vulnerability and runtime telemetry, and "state-of-the-art AI copilots for staff augmentation."

Choosing (or consolidating) your CNAPP? See how the 14 vendors stack up.

πŸ‘‰ Get a copy of the Forrester Wave CNAPP report

πŸ”“

Attacks & Vulnerabilities

WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites (2 minute read)

A novel Magecart-style skimmer deployed via PolyShell, an unauthenticated RCE vulnerability in Magento Open Source and Adobe Commerce (patched in 2.4.9-beta1 on March 10 but not yet in production), established WebRTC peer connections to 202.181.177[.]177 over DTLS-encrypted UDP port 3479 to retrieve and inject payment-harvesting JavaScript. WebRTC DataChannels operate outside HTTP, so strict CSP directives and HTTP-layer network inspection tools are blind to both payload delivery and exfiltration. PolyShell has been under mass exploitation since March 19 across 56.7% of vulnerable stores. Defenders should immediately block access to pub/media/custom_options/, scan for web shells, and prioritize upgrading to the patched release when it reaches production.
Hightower Holding Data Breach Impacts 130,000 (2 minute read)

Hightower Holding, the parent of financial advisory firm Hightower Advisors, disclosed that hackers accessed its systems on January 8–9, and exfiltrated names, Social Security numbers, and driver's license numbers for 131,483 people. The breach stemmed from compromised user credentials.
Ajax Football Club Hack Exposed Fan Data, Enabled Ticket Hijacking (2 minute read)

Dutch football club Ajax Amsterdam revealed that a hacker exploited system vulnerabilities to access data of a few hundred individuals. The hacker alerted the club about journalists' access. These journalists independently verified the vulnerabilities, confirming they could transfer season tickets, modify stadium ban records, and access extensive fan data through the API.
🧠

Strategies & Tactics

Toast Notifications (4 minute read)

Attackers with an established foothold can abuse Windows Toast Notifications (MITRE T1204.001) by enumerating registered AUMIDs via PowerShell or registry queries, then crafting spoofed notifications under trusted app identities like Microsoft Edge or Teams to deliver malicious links, trigger credential prompts, or simulate fake incoming calls with deepfake-ready impersonation. The .NET assembly ToastNotify supports in-memory execution from C2 frameworks, and version 1.82.8-style `.pth` escalation patterns highlight how notification abuse pairs naturally with post-exploitation persistence. Defenders should alert on unexpected processes loading `wpnapps.dll` or `msxml6.dll` via Sysmon Event ID 7, monitor ETW PushNotifications-Platform event IDs 2416, 2418, 3052, and 3153, and enforce group policy to disable toast notifications on endpoints where they are not operationally required.
Debugging - WinDBG & WinDBGX Fundamentals (30 minute read)

Corelan's corelanc0d3r published a comprehensive WinDBG and WinDBGX fundamentals guide covering installation, process attachment, breakpoint mechanics, memory inspection, and mona.py integration. Attaching to a running process rather than launching through the debugger avoids changes to NtGlobalFlag heap validation (0x70 in Classic, 0x10 in WinDBGX) that shift allocation layouts and invalidate exploit calculations. Defenders and researchers should anchor breakpoints to symbol names or module-relative offsets rather than absolute addresses to stay ASLR-resilient, and leverage breakpoint command chains with `gc` to build silent dynamic loggers without halting execution.
Stop Enabling Every AWS Security Service (7 minute read)

AWS offers a myriad of managed security services, which can be overwhelming for new users. Security teams should begin by threat modeling their environment, addressing specific threats with solutions, and keeping in mind existing security tools and costs. However, teams should always embrace automation and enable IAM Center.
πŸ§‘‍πŸ’»

Launches & Tools

Black Duck Signal: Agentic AppSec built for AI-native development (Sponsor)

AI‑native development demands a new approach to application security. Signal combines LLM-powered code analysis with 20+ years of human‑vetted security intelligence to autonomously identify, prioritize, and fix vulnerabilities in AI‑generated code. See it in action and request a demo
elastic/agent-skills (GitHub Repo)

Elastic's official Agent Skills library delivers 33 curated, self-contained skill packages for Elasticsearch, Kibana, Elastic Observability, and Elastic Security — each a SKILL.md file with instructions and context that drops into agentic IDEs, including Claude Code, Cursor, Copilot, Windsurf, and Gemini CLI. Security-relevant skills cover alert triage, SOC case management, detection rule tuning, and audit log configuration, while the install script handles per-agent directory placement with lock-file tracking for drift detection on updates.
Onit Security (Product Launch)

Onit Security is an exposure management platform that uses agents to analyze business context, link vulnerabilities to specific decisions, identify asset owners from fragmented data, and apply remediation policies across similar issues to cut remediation time.
CISO Assistant Community (GitHub Repo)

CISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance & Audit, TPRM, Privacy, and Reporting. It supports 100+ global frameworks with automatic control mapping, including ISO 27001, NIST CSF, SOC 2, CIS, PCI DSS, NIS2, DORA, GDPR, HIPAA, CMMC, and more.
🎁

Miscellaneous

Dangerous by Default: What OpenClaw CVE Record Tells Us About Agentic AI (4 minute read)

OpenClaw, an autonomous local AI agent with default shell execution, file system access, and runtime code generation, accumulated 104 CVEs in 18 days spanning CWE-78 OS command injection, CWE-22 path traversal, CWE-918 SSRF, prompt injection, and auth bypass, a rate 200x higher than LangChain or Ollama across their entire lifetimes. CVE-2026-27001 illustrates the root cause: the working directory path was embedded as a plain string in the LLM system prompt, enabling prompt injection via Unicode bidirectional markers and newlines. The patch strips control characters but leaves untrusted data in the instruction context. Defenders building agentic systems should enforce least-privilege capability scoping, treat all untrusted inputs as structured data kept outside the prompt context, and sandbox runtime-generated code with no host-credential or network-egress access by default.
AI supply chain attacks don't even require malware…just post poisoned documentation (3 minute read)

Andrew Ng's Context Hub is a service that feeds API docs to coding agents via an MCP server. Researcher Mickey Shmueli found that the pipeline has zero content sanitization, anyone can submit a pull request with malicious instructions, and 58 of 97 closed PRs were merged. His PoC planted fake PyPI package names in Plaid and Stripe docs.
Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks (3 minute read)

Two hacking tools, Coruna and DarkSword, documented by Google, iVerify, and Lookout, have been widely targeting iPhones that do not have the latest iOS updates. Both exploit memory corruption bugs. iOS 26 on iPhone 17 models prevents these exploits through Memory Integrity Enforcement, but older iPhones are still vulnerable. These tools have now become publicly available, making it easier for attackers to use them.

Quick Links

Indian government probes CCTV espionage operation linked to Pakistan (1 minute read)

Indian police arrested suspects in Ghaziabad after discovering solar-powered CCTV cameras aimed at railway stations and critical infrastructure that streamed footage over cellular networks to recipients in Pakistan, prompting the Ministry of Home Affairs to order a nationwide audit of all CCTV installations.
Reddit will require "fishy" accounts to verify they are run by a human (3 minute read)

Reddit announced that accounts showing "automated or otherwise fishy behavior" must prove a human runs them or face restrictions.
Critical NVIDIA Vulnerabilities Risk Remote Code Execution and Denial-of-Service Attacks (2 minute read)

NVIDIA has patched vulnerabilities across its AI/ML stack, including CVE-2025-33244 (Critical, bulletin 5782) in NVIDIA Apex, and high-severity CVEs in Triton Inference Server, Model Optimizer, NeMo Framework, and Megatron LM.

Love TLDR? Tell your friends and get rewards!

Share your referral link below with friends to get free TLDR swag!
Track your referrals here.

Want to advertise in TLDR? πŸ“°

If your company is interested in reaching an audience of cybersecurity professionals and decision makers, you may want to advertise with us.

Want to work at TLDR? πŸ’Ό

Apply here, create your own role or send a friend's resume to jobs@tldr.tech and get $1k if we hire them! TLDR is one of Inc.'s Best Bootstrapped businesses of 2025.

If you have any comments or feedback, just respond to this email!

Thanks for reading,
Prasanna Gautam, Eric Fernandez & Sammy Tbeile


Manage your subscriptions to our other newsletters on tech, startups, and programming. Or if TLDR Information Security isn't for you, please unsubscribe.

Post a Comment

0 Comments