Latest

6/recent/ticker-posts

Header Ads Widget

Mythos AI Tests 🤖, GitHub Actions Security 🔒, Post Quantum Cryptography Timeline Accelerates ⚛️

Anthropic’s Mythos Preview model faced UK AI Security Institute tests on capture-the-flag tasks and a 32-step “The Last Ones” network data ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌  ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ 

TLDR

Together With Bitwarden

TLDR Information Security 2026-04-16

60% of data breaches involve human error (Sponsor)

Organizations invest millions in security infrastructure, yet the greatest vulnerability remains the human element. The Verizon Data Breach Investigations Report identifies credential abuse as the single most common initial access vector.

AI is accelerating the problem. AI-assisted phishing emails have doubled over the past three years and are increasingly difficult to detect.

Bitwarden Access Intelligence protects organizations with:

  • Proactive visibility into employee credential health
  • Identification of exposed, weak, and reused passwords
  • Prioritized remediation guidance pushed directly to end users

See how Bitwarden Access Intelligence identifies credential risks before they become breaches.

🔓

Attacks & Vulnerabilities

GraphQL RCE: The Kill Chain to Cloud Identity…! (5 minute read)

A missing __builtins__: {} restriction in a SaaS platform's Python exec() sandbox allowed a researcher to inject arbitrary code via a GraphQL createUserDefinedFunction mutation, achieving RCE inside a Google App Engine container running Python 3.13. From there, SSRF to the GCP metadata service at 169.254.169[.]254 yielded a signed OIDC JWT for the production service account, resulting in full cloud identity takeover. Defenders should sandbox user-executed code with {'__builtins__': {}}, block metadata endpoint access from user-code environments at the network layer, and isolate execution in zero-trust micro-VMs such as Firecracker or gVisor.
$10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov Networks (3 minute read)

A cheap browser plugin infected Windows machines and ran PowerShell to shut down antivirus, stop updates, and stay hidden using scheduled tasks and WMI. It stored future malware in folders that Microsoft Defender ignores by default. A single unregistered update domain could have let an attacker silently push code to about 25,000 computers in 124 countries, including OT, government, healthcare, and big-company networks.
McGraw-Hill Confirms Data Breach Following Extortion Threat (2 minute read)

Following an extortion demand by the Shiny Hunters ransomware group, McGraw-Hill has confirmed that its Salesforce instance was compromised. McGraw-Hill claims that the stolen data was only a limited amount of non-sensitive data that did not include SSNs, financial information, or student data. In contrast, Shiny Hunters claim that the data includes 45M records which include PII.
🧠

Strategies & Tactics

Primer on GitHub Actions Security - Threat Model, Attacks and Defenses (Part 1/2) (5 minute read)

Wiz maps the GitHub Actions threat model across three primary attack classes: pull_request_target misconfigurations (the “Pwn Request” class, exploited in the Trivy supply chain compromise), where fork PR authors manipulate checked-out artifacts to gain execution with base-branch secrets, script injection via unsanitized user-controlled context values like github.event.issue.title or github.head_ref injected into run blocks (the Ultralytics/YOLO XMRig incident root cause), and compromised third-party actions, illustrated by the tj-actions attack, which chained four sequential action compromises to target Coinbase across 22,000 affected repositories. Defenses include avoiding pull_request_target where possible, binding all user-controlled inputs to intermediate environment variables before shell execution, and pinning third-party actions to commit SHAs rather than mutable tags.
We Dumped a Live Kimsuky C2 and Recovered Every Stage of the Kill Chain: CHM Dropper, VBScript Stager, PowerShell Keylogger (15 minute read)

Breakglass Intelligence recovered the complete three-stage Kimsuky (APT43) kill chain after the C2 at check[.]nid-log[.]com was found with directory listing enabled, exposing a CHM dropper that chains hh.exe → PowerShell → certutil → wscript into a fileless VBScript recon payload (bootservice.php), a PowerShell bridge (checkservice.php), and a full keylogger with clipboard monitoring and randomized 100-140 minute exfil via multipart POST to finalservice.php. Two novel endpoints (checkservice.php, finalservice.php), the Global\AlreadyRunning19122345 mutex, typo'd User-Agents (Chremo, Edgo), and a 79-domain infrastructure map across 5 IPs spanning DAOU Technology and LightNode were published for the first time, with cross-campaign links to the previously documented udalyonka/uncork[.]biz cluster. Defenders can hunt for HTTP requests to /bootservice.php?tag=&query=*, responses containing “Million OK !!!!”, scheduled tasks named “Edge Updater” at PT60M intervals, and Office_Config.xml writes under %APPDATA%\Microsoft\Windows\Templates.
UK Gov's Mythos AI Tests Help Separate Cybersecurity Threat From Hype (4 minute read)

Anthropic's Mythos Preview model faced UK AI Security Institute tests on capture-the-flag tasks and a 32-step “The Last Ones” network data exfiltration range, where it became the first AI system to complete the full chain in some runs and averaged 22 steps versus Claude 4.6's 16, while still failing a tougher “Cooling Tower” power-plant scenario and operating in ranges without active defenders or realistic detection penalties.
🧑‍💻

Launches & Tools

What's driving the AI security confidence paradox? (Sponsor)

Delinea surveyed +2,000 IT decision-makers and uncovered a disconnect: Confidence in AI security readiness is high - but security teams are struggling to govern AI-related identities. Read the report to understand which processes and controls need to catch up with AI realities. Read the full 2026 Identity Security Report by Delinea
How Exposed Is Your Code? Find Out in Minutes—for Free (4 minute read)

GitHub's Code Security Risk Assessment is a free, no-configuration CodeQL scan covering up to 20 active repositories that surfaces vulnerabilities by severity, language, and rule class alongside Copilot Autofix eligibility. Paired with the existing Secret Risk Assessment, org admins and security managers on Enterprise Cloud and Team plans now get a unified secrets-and-code exposure dashboard from a single entry point, with Actions minutes excluded from quota.
Capsule Security (Product Launch)

Capsule Security monitors AI agents in real time to detect manipulation, abnormal behavior, and data exfiltration, blocking risky commands and exposures across tools and environments while fitting into existing workflows and agent frameworks.
Trusted Access for the Next Era of Cyber Defense (3 minute read)

OpenAI is expanding its Trusted Access for Cyber program to thousands of verified defenders and introducing GPT‑5.4‑Cyber, a permissive model tuned for defensive tasks like reverse engineering binaries.
🎁

Miscellaneous

Fixing Encryption Isn't Enough. Quantum Developments Put Focus on Authentication (5 minute read)

Google research has revised the quantum threat timeline, finding elliptic curve cryptography could be broken with as few as 1,200 logical qubits, prompting both Google and Cloudflare to move their Q-day estimates to 2029. The industry's focus on encrypting data in transit has obscured a more urgent risk: authentication and certificates, where a single compromised quantum-vulnerable key enables full system access and turns software update pipelines into RCE vectors. Enterprises are advised to begin crypto-agility inventories now and treat PQC migration as a dedicated workstream outside normal security operations, given that large-scale migrations can take years.
n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails (4 minute read)

Attackers register free n8n cloud accounts, create webhook URLs on *.app.n8n.cloud, and embed those links in phishing emails that pose as shared documents. When victims click, JavaScript-driven workflows serve CAPTCHAs, drop malware installers, and deploy modified RMM tools like Datto or ITarian for persistence and C2 access.
New Research Claims Google, Microsoft, and Meta Track Users Even After Opt-Out (2 minute read)

A new independent audit by privacy firm webXray found that Google, Microsoft, and Meta continue to track users even after explicit opt-out under privacy laws such as CCPA. The audit examined over 4,000 popular US websites and found that 55% still set advertising cookies despite visitors activating privacy protections.

Quick Links

RPPairing Protocol Specification (7 minute read)

This author reverse-engineered Apple's RPPairing protocol, which is used to establish a secure tunnel to an iOS 17+ device over the network using Remote Pairing.
Musk's Grok AI Chatbot Still Making Sexual Deepfakes, Despite X's Promise to Stop It (3 minute read)

An investigation by NBC News discovered that Grok is still creating sexualized deepfakes of celebrities and other people without their consent, despite X committing to combat this behavior after public backlash and government investigations.

Love TLDR? Tell your friends and get rewards!

Share your referral link below with friends to get free TLDR swag!
Track your referrals here.

Want to advertise in TLDR? 📰

If your company is interested in reaching an audience of cybersecurity professionals and decision makers, you may want to advertise with us.

Want to work at TLDR? 💼

Apply here, create your own role or send a friend's resume to jobs@tldr.tech and get $1k if we hire them! TLDR is one of Inc.'s Best Bootstrapped businesses of 2025.

If you have any comments or feedback, just respond to this email!

Thanks for reading,
Prasanna Gautam, Eric Fernandez & Sammy Tbeile


Manage your subscriptions to our other newsletters on tech, startups, and programming. Or if TLDR Information Security isn't for you, please unsubscribe.

Post a Comment

0 Comments