<!DOCTYPE html><html lang="en"><head><meta http-equiv="Content-Type" content="text/html charset=UTF-8"><meta charset="UTF-8"><meta name="viewport" content="width=device-width"><meta name="x-apple-disable-message-reformatting"><title>TLDR InfoSec</title><meta name="color-scheme" content="light dark"><meta name="supported-color-schemes" content="light dark"><style type="text/css">
:root {
color-scheme: light dark; supported-color-schemes: light dark;
}
*,
*:after,
*:before {
-webkit-box-sizing: border-box; -moz-box-sizing: border-box; box-sizing: border-box;
}
* {
-ms-text-size-adjust: 100%; -webkit-text-size-adjust: 100%;
}
html,
body,
.document {
width: 100% !important; height: 100% !important; margin: 0; padding: 0;
}
body {
-webkit-font-smoothing: antialiased; -moz-osx-font-smoothing: grayscale; text-rendering: optimizeLegibility;
}
div[style*="margin: 16px 0"] {
margin: 0 !important;
}
table,
td {
mso-table-lspace: 0pt; mso-table-rspace: 0pt;
}
table {
border-spacing: 0; border-collapse: collapse; table-layout: fixed; margin: 0 auto;
}
img {
-ms-interpolation-mode: bicubic; max-width: 100%; border: 0;
}
*[x-apple-data-detectors] {
color: inherit !important; text-decoration: none !important;
}
.x-gmail-data-detectors,
.x-gmail-data-detectors *,
.aBn {
border-bottom: 0 !important; cursor: default !important;
}
.btn {
-webkit-transition: all 200ms ease; transition: all 200ms ease;
}
.btn:hover {
background-color: #f67575; border-color: #f67575;
}
* {
font-family: Arial, Helvetica, sans-serif; font-size: 18px;
}
@media screen and (max-width: 600px) {
.container {
width: 100%; margin: auto;
}
.stack {
display: block!important; width: 100%!important; max-width: 100%!important;
}
.btn {
display: block; width: 100%; text-align: center;
}
}
body,
p,
td,
tr,
.body,
table,
h1,
h2,
h3,
h4,
h5,
h6,
div,
span {
background-color: #FEFEFE !important; color: #010101 !important;
}
@media (prefers-color-scheme: dark) {
body,
p,
td,
tr,
.body,
table,
h1,
h2,
h3,
h4,
h5,
h6,
div,
span {
background-color: #27292D !important; color: #FEFEFE !important;
}
}
a {
color: inherit !important; text-decoration: underline !important;
}
</style><!--[if mso | ie]>
<style type="text/css">
a {
background-color: #FEFEFE !important; color: #010101 !important;
}
@media (prefers-color-scheme: dark) {
a {
background-color: #27292D !important; color: #FEFEFE !important;
}
}
</style>
<![endif]--></head><body class="">
<div style="display: none; max-height: 0px; overflow: hidden;">CISA added CVE-2025-32463 to its Known Exploited Vulnerabilities catalog due to evidence of active exploitation in the wild β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β </div>
<div style="display: none; max-height: 0px; overflow: hidden;">
<br>
</div>
<table align="center" class="document"><tbody><tr><td valign="top">
<table align="center" border="0" cellpadding="0" cellspacing="0" class="container" width="600"><tbody><tr class="inner-body"><td>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr class="header"><td bgcolor="" class="container">
<table width="100%"><tbody><tr><td class="container">
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" style="margin-top: 0px;" width="100%"><tbody><tr><td style="padding: 0px;">
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div style="text-align: center;">
<span style="margin-right: 0px;"><a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Ftldr.tech%2Finfosec%3Futm_source=tldrinfosec/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/yGxquInlLdFgGCs_rjuS5Dnyp8MJ7jwLSFd0eUcwtS0=425" rel="noopener noreferrer" target="_blank"><span>Sign Up</span></a>
|<span style="margin-right: 2px; margin-left: 2px;"><a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fadvertise.tldr.tech%2F%3Futm_source=tldrinfosec%26utm_medium=newsletter%26utm_campaign=advertisetopnav/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/b20NRQu3d4rPU0hpzxZTddoFAG7XpUoqiSYNf9oFwO0=425" rel="noopener noreferrer" target="_blank"><span>Advertise</span></a></span>|<span style="margin-left: 2px;"><a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fa.tldrnewsletter.com%2Fweb-version%3Fep=1%26lc=156924ca-84b7-11f0-8d58-47c5c04ad337%26p=dfa3d4e2-9eb6-11f0-8051-072fd6b1a910%26pt=campaign%26t=1759324033%26s=79da1cdc2162d52b4cd35bb8bc5367f71d0e7de60313b99205f59a1135dccfe9/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/2x2uqtOdbaLZzCVqVbgLXtd_WV7sbJOzQnF7mQO1cu4=425"><span>View Online</span></a></span>
<br>
</span></div>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="text-align: center;"><span data-darkreader-inline-color="" style="--darkreader-inline-color:#3db3ff; color: rgb(51, 175, 255) !important; font-size: 30px;">T</span><span style="font-size: 30px;"><span data-darkreader-inline-color="" style="color: rgb(232, 192, 96) !important; --darkreader-inline-color:#e8c163; font-size:30px;">L</span><span data-darkreader-inline-color="" style="color: rgb(101, 195, 173) !important; --darkreader-inline-color:#6ec7b2; font-size:30px;">D</span></span><span data-darkreader-inline-color="" style="--darkreader-inline-color:#dd6e6e; color: rgb(220, 107, 107) !important; font-size: 30px;">R</span>
<br>
</td></tr></tbody></table>
<br>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr id="together-with"><td align="center" height="20" style="vertical-align:middle !important;" valign="middle" width="100%"><strong style="vertical-align:middle !important; height: 100%;">Together With </strong>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.adaptivesecurity.com%2Fdemo%2Fadaptive-security-awareness-training%3Futm_medium=newsletter%26utm_source=tldr-infosec%26utm_campaign=20251001/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/g3IPU1sMGHuM_xL9sL5f6a1BZ-PH1G_swaxoqqJaS1M=425"><img src="https://images.tldr.tech/adaptive.png" valign="middle" style="vertical-align: middle !important; height: 100%;" alt="Adaptive Security"></a></td></tr></tbody></table>
<table style="table-layout: fixed; width:100%;" width="100%"><tbody><tr><td style="padding:0;border-collapse:collapse;border-spacing:0;margin:0;">
<div style="text-align: center;">
<h1><strong>TLDR Information Security <span id="date">2025-10-01</span></strong></h1>
</div>
</td></tr></tbody></table>
<table style="table-layout: fixed; width:100%;" width="100%"><tbody><tr id="sponsy-copy"><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.adaptivesecurity.com%2Fdemo%2Fadaptive-security-awareness-training%3Futm_medium=newsletter%26utm_source=tldr-infosec%26utm_campaign=20251001/2/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/Lw9JT2kBMFSvgYl7857DHG9C8CfaZjwbX6TXF-TEyKQ=425">
<span>
<strong>When your CEO calls, will you know it's real? (Sponsor)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Phishing has gone beyond email. Today's attackers use AI-generated voices, videos, and interactive deepfakes of company executives. They can fool almost anyone - including you and your coworkers.<p></p><p>Backed by <strong>$55M+ in funding from OpenAI and a16z</strong>, Adaptive Security is the first <a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.adaptivesecurity.com%2Fdemo%2Fadaptive-security-awareness-training%3Futm_medium=newsletter%26utm_source=tldr-infosec%26utm_campaign=20251001/3/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/NbUjRqWhkGUJEXqVkMRnzdPqkVXxpPna8INeNhkW218=425" rel="noopener noreferrer nofollow" target="_blank"><span>security awareness platform built to stop AI-powered social engineering</span></a>. Adaptive keeps employees on their feet with tools such as:</p>
<ul>
<li>Deepfake phishing simulations of company executives in real-world attack scenarios</li>
<li>Interactive, customizable training content tailored for each employee (500+ resources)</li>
<li>AI-driven risk scoring that factors in your publicly available data adversaries can exploit</li>
</ul>
<p><a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.adaptivesecurity.com%2Fdemo%2Fadaptive-security-awareness-training%3Futm_medium=newsletter%26utm_source=tldr-infosec%26utm_campaign=20251001/4/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/5axjMoveZAq6VnZRfOeZivg0zg1awkfbU9Pw2kOqZvg=425" rel="noopener noreferrer nofollow" target="_blank"><span><strong>>> Book a demo</strong></span></a><strong> </strong>to chat with a custom interactive deepfake of your boss</p>
<p><a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.adaptivesecurity.com%2Fdemo%2Fself-guided-tour%3Futm_medium=newsletter%26utm_source=tldr-infosec%26utm_campaign=20251001/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/Rn3QD3OQVosnRSuyzcSPmYbugZaRuW6BiEc5lABphrw=425" rel="noopener noreferrer nofollow" target="_blank"><span><strong>>> Take a self-guided tour</strong></span></a><strong> </strong>of the platform (3 minutes)
</p>
</span></span></div>
</td></tr></tbody></table>
</td></tr></tbody></table>
</td></tr></tbody></table>
</td></tr>
<tr bgcolor=""><td class="container">
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td style="padding: 0px;">
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;"><span style="font-size: 36px;">π</span></div></div>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;">
<h1><strong>Attacks & Vulnerabilities</strong></h1>
</div>
</div>
</td></tr></tbody></table>
<table style="table-layout: fixed; width: 100%;" width="100%"><tbody><tr><td style="padding:0;border-collapse:collapse;border-spacing:0;margin:0;" valign="top">
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fthehackernews.com%2F2025%2F09%2Fcisa-sounds-alarm-on-critical-sudo-flaw.html%3Futm_source=tldrinfosec/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/e71WDs2WaIatrT2UMpaGDJ4cJfKlPIjJCz6KeU6YYfM=425">
<span>
<strong>CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems (2 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
CISA added CVE-2025-32463, a critical sudo vulnerability with a CVSS score of 9.3, to its Known Exploited Vulnerabilities catalog due to evidence of active exploitation in the wild. The flaw affects sudo versions before 1.9.17p1 and allows local attackers to leverage the --chroot option to execute arbitrary commands as root, even without sudoers file permissions. Federal agencies must patch by October 20, while organizations should immediately update sudo to version 1.9.17p1 or later to prevent privilege escalation attacks.
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.bleepingcomputer.com%2Fnews%2Fsecurity%2Fjapans-largest-brewer-suspends-operations-due-to-cyberattack%2F%3Futm_source=tldrinfosec/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/IDnRwahH20wDIGoHLOM3ulpyiECT8Kf45ZBVQPCTvxM=425">
<span>
<strong>Japan's largest brewer suspends operations due to cyberattack (2 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Asahi Group Holdings, Japan's leading brewery with $20 billion in revenue and holding a third of the market, experienced a cyberattack that disrupted ordering, shipping, call centers, and customer service. The incident, which began at 7 AM and impacted only Japan, did not result in confirmed data leaks, although investigations are ongoing, and no group has claimed responsibility. Companies should enhance their business continuity plans, adopt network segmentation, and develop incident response strategies to manage disruptions, including communication with customers and partners.
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.theverge.com%2Fnews%2F787836%2Ftile-trackers-stalking-research-unencrypted%3Futm_source=tldrinfosec/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/tnK5BHf_07s_5OJtpJb7S25XxTrGRwCKvDxHDRVjYlc=425">
<span>
<strong>Tile's lack of encryption could make tracker owners vulnerable to stalking (3 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Security flaws in Tile's tracking devices have raised concerns about user vulnerability. Researchers found that these devices lack proper encryption and fail to adequately rotate identification details, making them easily exploitable for stalking and tracking purposes. Despite noting recent improvements, Tile's approach falls short compared to other brands, as anti-theft features can be abused, and privacy remains at risk for users relying on the technology.
</span>
</span>
</div>
</td></tr></tbody></table>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;"><span style="font-size: 36px;">π§ </span></div>
</div>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;">
<h1><strong>Strategies & Tactics</strong></h1>
</div>
</div>
</td></tr></tbody></table>
<table style="table-layout: fixed; width: 100%;" width="100%"><tbody><tr><td style="padding:0;border-collapse:collapse;border-spacing:0;margin:0;" valign="top">
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.csoonline.com%2Farticle%2F4064326%2Fcoherence-insider-risk-strategys-new-core-principle.html%3Futm_source=tldrinfosec/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/QOv3qkMiE4ETueyNxKltBOJhmXUj_8-_wPj-XFZvcKc=425">
<span>
<strong>Coherence: Insider risk strategy's new core principle (7 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
This article proposes "coherence" as a new foundational principle for insider risk management, arguing that traditional control and surveillance approaches fail because they don't address human alignment and organizational meaning. The author identifies "drift" - gradual detachment from purpose and clarity - as an early warning signal that precedes both malicious actions and human errors, manifesting through compliance without conviction, corporate messaging noise, and reduced employee initiative. Security professionals should focus on building semantic consistency in messaging, creating feedback channels to detect narrative drift, partnering cross-functionally to align organizational language, and treating coherence as operational infrastructure rather than just cultural enhancement.
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.schneier.com%2Fblog%2Farchives%2F2025%2F09%2Fabusing-notions-ai-agent-for-data-theft.html%3Futm_source=tldrinfosec/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/c7UtTPPGBTM00AseZoksbRd31TNB0wrZWAnQS_ZsBsA=425">
<span>
<strong>Abusing Notion's AI Agent for Data Theft (3 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Notion's AI agents are susceptible to prompt injection attacks exploiting Simon Willson's 'lethal trifecta'βaccess to private data, exposure to untrusted content, and external communication. Attackers can embed malicious instructions in PDFs with white text instructing AI to extract and exfiltrate confidential data through web searches to attacker-controlled URLs. Security professionals should evaluate AI deployments carefully, as current systems lack effective defenses against such attacks, and organizations should enforce strict data access and network controls for sensitive AI systems.
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.koi.security%2Fblog%2Fpostmark-mcp-npm-malicious-backdoor-email-theft%3Futm_source=tldrinfosec/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/pENPlhYEjBYj0OYyj-7DLQz-CuGx8VjODFgINssFrJo=425">
<span>
<strong>First Malicious MCP in the Wild: The Postmark Backdoor That's Stealing Your Emails (8 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
MCP servers, designed to help AI assistants automate tasks like sending emails, can pose significant security risks if abused. Recently, a popular npm package called postmark-mcp was discovered to be exfiltrating emailsβincluding sensitive content like password resets and confidential memosβto a remote server controlled by its developer. The backdoor was introduced in a single line of code within an otherwise trustworthy tool, highlighting how quickly legitimate infrastructure can become compromised.
</span>
</span>
</div>
</td></tr></tbody></table>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;"><span style="font-size: 36px;">π§βπ»</span></div>
</div>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;">
<h1><strong>Launches & Tools</strong></h1>
</div>
</div>
</td></tr></tbody></table>
<table style="table-layout: fixed; width: 100%;" width="100%"><tbody><tr><td style="padding:0;border-collapse:collapse;border-spacing:0;margin:0;" valign="top">
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.n-able.com%2Fcyber-resilience-summit-2025%3Futm_medium=email-paid%26utm_source=-promotion%26utm_campaign=multi-glbl-l-me-tldr_sept_quick_link_promo_2025_cyber_summit-2025-09-15%26utm_content=quick_link/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/M0ymW-aqtBWL43ehBAPLf2rNgiVEXbFjxvLdwZRbsyc=425">
<span>
<strong>Get exclusive 2025 threat intelligence at N-able's Cyber Resilience Summit (Sponsor)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Join N-able's <a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.n-able.com%2Fcyber-resilience-summit-2025%3Futm_medium=email-paid%26utm_source=-promotion%26utm_campaign=multi-glbl-l-me-tldr_sept_quick_link_promo_2025_cyber_summit-2025-09-15%26utm_content=quick_link/2/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/9IKS_3-1Eq6EaMQDuokqDh8Yckiz0dRoFBur-zgI4vY=425" rel="noopener noreferrer nofollow" target="_blank"><span><strong>Cyber Resilience Summit 2025</strong></span></a> on October 16! Gain expert threat intelligence, tactics for defending before, during, and after breaches, and insights from leading security thought-leaders, including Microsoft's Chief Security Advisor for Europe, Sarah Armstrong-Smith, and Francis Odum. Ideal for SMBs & IT pros aiming to survive and thrive in today's evolving threat landscape. <a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.n-able.com%2Fcyber-resilience-summit-2025%3Futm_medium=email-paid%26utm_source=-promotion%26utm_campaign=multi-glbl-l-me-tldr_sept_quick_link_promo_2025_cyber_summit-2025-09-15%26utm_content=quick_link/3/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/rsIBndMeZ4b9lV4FBhW50d8-Ra5n1gwgZowvk2uBX8Q=425" rel="noopener noreferrer nofollow" target="_blank"><span>Register free.</span></a>
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Flinks.tldrnewsletter.com%2FktkarB/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/KV6sdJYAnTECdFoCJui7a5JBwzeS1ksIxseaP_arhW4=425">
<span>
<strong>SafeHill Emerges from Stealth With $2.6 Million Pre-Seed Funding (2 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Chicago-based SafeHill (formerly Tacticly) emerged from stealth with $2.6 million in pre-seed funding, notable for having reformed LulzSec leader Hector Monsegur (aka Sabu) as chief research officer. The company offers SecureIQ, a continuous threat exposure management platform that combines AI-driven penetration testing with human validation to provide continuous asset discovery, automated threat assessments, and real-time monitoring. Security teams can leverage this hybrid approach for ongoing penetration testing, rather than conducting point-in-time traditional evaluations, with compliance mapping for frameworks such as PCI-DSS, CMMC, and ISO27001.
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fgithub.com%2Frotemreiss%2FMalifiScan%3Futm_source=tldrinfosec/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/SMvOapE44bGpke-x3fC0VOAm-yLoNbosXFr9g2msLoo=425">
<span>
<strong>MalifiScan (GitHub Repo)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
MalifiScan is a security tool that identifies and blocks malicious packages before they compromise your software supply chain. It monitors vulnerability databases, such as OSV, for new malicious packages and scans your registries and repositories for existing threats. When used with platforms like JFrog Artifactory, it automates exclusion patterns to prevent future downloads of flagged packages, ensuring secure dependencies across development pipelines.
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fgithub.com%2Fshivasurya%2Fcode-pathfinder%3Futm_source=tldrinfosec/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/sQC0k4mwJQytDd8QELJW4M_p5nMXVTRInS8mN9E_nsk=425">
<span>
<strong>Code Pathfinder (GitHub Repo)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Code Pathfinder, the open-source alternative to GitHub CodeQL, was built with GoLang. Built for advanced structural search, derive insights, and find vulnerabilities in code.
</span>
</span>
</div>
</td></tr></tbody></table>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;"><span style="font-size: 36px;">π</span></div></div>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;"><strong><h1>Miscellaneous</h1></strong></div>
</div>
</td></tr></tbody></table>
<table bgcolor="" style="table-layout: fixed; width: 100%;" width="100%"><tbody><tr><td style="padding:0;border-collapse:collapse;border-spacing:0;margin:0;" valign="top">
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fredhuntlabs.com%2Fblog%2Fe-commerce-fraud-as-a-service-how-scammers-exploit-brand-trust-at-scale%2F%3Futm_source=tldrinfosec/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/ePxLrvdn-jh35cCKj5Lk0jEdi5zd-KGC8DPFeiX3ksc=425">
<span>
<strong>E-commerce Fraud-as-a-Service: How Scammers Exploit Brand Trust at Scale (8 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Cybercriminals target e-commerce brands through three primary fraud-as-a-service operations: credential phishing via fake login pages promoted on Facebook and Instagram, fraudulent storefronts that offer fake deals to harvest payment data, and fake job campaigns for work-from-home scams. These attacks utilize Phishing-as-a-Service platforms that simplify the deployment of sophisticated scams, even for non-technical actors, targeting mobile users to evade detection. Organizations should monitor their brand with Google Alerts, educate customers about official sites, deploy Digital Risk Protection tools to detect phishing setups, and establish rapid response procedures for takedown requests and evidence collection.
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Flinks.tldrnewsletter.com%2Ft3J4ys/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/qO1vKMGn7MI1Na11QqsHunLuTSS6G7sGJNzwhQFowyI=425">
<span>
<strong>'Trifecta' of Gemini Flaws Turn AI Into Attack Vehicle (4 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Google's Gemini AI suite had three critical flaws: Search Personalization enabled injection and data leaks via Chrome history, Cloud Assist allowed prompt manipulation through raw logs, and the Browsing Tool exposed saved data through a side channel. All vulnerabilities could be exploited for data exfiltration. Google has now fixed them.
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.fortinet.com%2Fblog%2Fthreat-research%2Fsvg-phishing-hits-ukraine-with-amatera-stealer-pureminer%3Futm_source=tldrinfosec/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/T_JfXe4wdCymBnS7SBhSAgmk8gdfnThM94RxohPollY=425">
<span>
<strong>SVG Phishing hits Ukraine with Amatera Stealer, PureMiner (7 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
A phishing campaign targeting Ukrainian organizations has emerged using emails disguised as official notices from the country's police. These emails contain SVG attachments that trigger fileless attacks when opened, deploying malware including Amatera Stealer and PureMiner. The SVG initiates a download chain using password-protected files that ultimately execute malicious code via in-memory, process-hollowing techniques. The Amatera Stealer collects sensitive information and credentials, while PureMiner hijacks victim resources for cryptocurrency mining. Both can then install additional malware.
</span>
</span>
</div>
</td></tr></tbody></table>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;"><span style="font-size: 36px;">β‘</span></div></div>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;">
<h1><strong>Quick Links</strong></h1>
</div>
</div>
</td></tr></tbody></table>
<table bgcolor="" style="table-layout: fixed; width: 100%;" width="100%"><tbody><tr><td style="padding:0;border-collapse:collapse;border-spacing:0;margin:0;" valign="top">
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.ox.security%2Fevents%2Fvibeseccon%2F%3Futm_campaign=9574189-TLDR%26utm_source=TLDR%26utm_medium=quick_link/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/z_1QOHg_MRietwAFx7QOHCnsphD836G6gnjC5U-ZoS8=425">
<span>
<strong>In 2025, Security Lost to Vibe Coding. Meet VibeSec. (Sponsor)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
The first vibe security platform built to secure code at creation, <br>finally making security faster than vulnerabilities. <br>Join the leading AI & Security event: VibeSecCon at ox.security.<p></p><p><a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.ox.security%2Fevents%2Fvibeseccon%2F%3Futm_campaign=9574189-TLDR%26utm_source=TLDR%26utm_medium=quick_link/2/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/Dt5Hij1rCJbA1Zjhn_RxsqkWb3_ii46P6fVpHePF2QI=425" rel="noopener noreferrer nofollow" target="_blank"><span>See the vibe!</span></a>
</p>
</span></span></div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fcyberscoop.com%2Ftwo-thirds-of-cisa-personnel-could-be-sent-home-under-shutdown-september-2025%2F%3Futm_source=tldrinfosec/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/jR5iwRCHPbSE8A89cF9yQmS7VpU_EG1YvZZ3j1OTtaQ=425">
<span>
<strong>Two-thirds of CISA personnel could be sent home under shutdown (2 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
If the government shuts down, about two-thirds of workers at the Cybersecurity and Infrastructure Security Agency (CISA) could be sent home.
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Ftechcrunch.com%2F2025%2F09%2F29%2Fuk-government-bails-out-jaguar-land-rover-with-1-5b-loan-after-hack-disrupts-vehicle-production-for-weeks%2F%3Futm_source=tldrinfosec/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/tNKsifJqlKNZgEnhP3AePnJtshtjxNogS8YqziFoqmQ=425">
<span>
<strong>UK government bails out Jaguar Land Rover with Β£1.5B loan after hack disrupts vehicle production for weeks (3 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
After a major cyberattack halted Jaguar Land Rover's production, the UK government stepped in with a Β£1.5 billion loan guarantee to stabilize the company and its vast supply chain.
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fcyberscoop.com%2Finterpol-operation-contender-3-africa%2F%3Futm_source=tldrinfosec/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/ceGRk6bovzQV7-JjD3tWFZBZineW7uQl5ld_k4tH-cc=425">
<span>
<strong>Interpol operation disrupts romance scam and sextortion networks in Africa (2 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Interpol's Operation Contender 3.0 arrested 260 cybercrime suspects across 14 African countries in a coordinated crackdown targeting romance scam and sextortion networks that caused $2.8 million in losses to nearly 1,500 victims.
</span>
</span>
</div>
</td></tr></tbody></table>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td align="left" style="word-break: break-word; vertical-align: top; padding: 5px 10px;">
<p style="padding: 0; margin: 0; font-size: 22px; color: #000000; line-height: 1.6; font-weight: bold;">
Love TLDR? Tell your friends and get rewards!
</p>
</td></tr>
<tr><td class="container" style="padding: 0px 10px 15px;">
<div class="text-block">
Share your referral link below with friends to get free TLDR swag!
</div>
</td></tr>
<tr><td align="left" style="padding: 10px;">
<div class="text-block">
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Frefer.tldr.tech%2F78de0e20%2F8/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/V0uwVzRWBevEudXFGVlWrj7ix27zYR3kJd4r6LneYdA=425" style="color: #464ba4; text-decoration: underline;">https://refer.tldr.tech/78de0e20/8</a>
</div>
</td></tr>
<tr></tr>
<tr><td align="left" style="padding:5px 10px;">
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fhub.sparklp.co%2Fsub_d62447d5a74a%2F8/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/eqy8AAI02KyEW8TsJxJebemvgK1izqkPbOM8EQvUUHc=425" style="font-size: 16px; line-height: 1.6; padding: 10px 0; display: inline-block; text-decoration: underline;"><span style="mso-text-raise:13pt; text-decoration: underline;">Track your referrals here.</span></a>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td align="left" style="word-break: break-word; vertical-align: top; padding: 5px 10px;">
<p style="padding: 0; margin: 0; font-size: 22px; color: #000000; line-height: 1.6; font-weight: bold;">
Want to advertise in TLDR? π°
</p>
<div class="text-block" style="margin-top: 10px;">
If your company is interested in reaching an audience of cybersecurity professionals and decision makers, you may want to <a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fadvertise.tldr.tech%2F%3Futm_source=tldrinfosec%26utm_medium=newsletter%26utm_campaign=advertisecta/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/GSijoeLb9Tcoz2JHuAkJS87vLg_Q6PDitOgTThpj7Oo=425"><strong><span>advertise with us</span></strong></a>.
</div>
<br>
<!-- New "Want to work at TLDR?" section -->
<p style="padding: 0; margin: 0; font-size: 22px; color: #000000; line-height: 1.6; font-weight: bold;">
Want to work at TLDR? πΌ
</p>
<div class="text-block" style="margin-top: 10px;">
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fjobs.ashbyhq.com%2Ftldr.tech/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/Oxs_YB2J5GTHBXKRlRkUcdzY9I7X7_BY2ItW9G47QVs=425" rel="noopener noreferrer" style="color: #0000EE; text-decoration: underline;" target="_blank"><strong>Apply here</strong></a> or send a friend's resume to <a href="mailto:jobs@tldr.tech" style="color: #0000EE; text-decoration: underline;">jobs@tldr.tech</a> and get $1k if we hire them!
</div>
<br>
<div class="text-block">
If you have any comments or feedback, just respond to this email!
<br>
<br> Thanks for reading,
<br>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.linkedin.com%2Fin%2Fprasannagautam%2F/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/QuePoK-TW10KDBKh3hsez_xQiK-L5nypTHiDcLnKnlU=425"><span>Prasanna Gautam</span></a>, <a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.linkedin.com%2Fin%2Fericfernandezdelcampo%2F/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/i06dsIVdk-mnVJOB2QBD124C6T77Q77WK5UDEndxQnk=425"><span>Eric Fernandez</span></a> & <a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.linkedin.com%2Fin%2Fsammy-tbeile%2F/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/9IngxXz0g_JnFQWZsQt6_mVX4G9WAIzY__1om8lMFG0=425"><span>Sammy Tbeile</span></a>
<br>
<br>
</div>
<br>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block" id="testing-id">
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Ftldr.tech%2Finfosec%2Fmanage%3Femail=silk.theater.56%2540fwdnl.com/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/KMYiLQl44bpHs8b2PsrdJ3AtKBhYOYY23yH1bvjU8eY=425">Manage your subscriptions</a> to our other newsletters on tech, startups, and programming. Or if TLDR Information Security isn't for you, please <a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fa.tldrnewsletter.com%2Funsubscribe%3Fep=1%26l=8d9cea11-3e94-11ed-9a32-0241b9615763%26lc=156924ca-84b7-11f0-8d58-47c5c04ad337%26p=dfa3d4e2-9eb6-11f0-8051-072fd6b1a910%26pt=campaign%26pv=4%26spa=1759323717%26t=1759324033%26s=0a4af3f0fc5580a1deb0cd53f181e452d14c9232a5a65ed3f880bf0faf3cdd76/1/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/iMgp92Ni6Ew7KKhsWteVEh_Bny-DstS4Mx5jktQV9i0=425">unsubscribe</a>.
<br>
</div>
</td></tr></tbody></table>
</td></tr></tbody></table>
</td></tr></tbody></table>
</td></tr></tbody></table>
</td></tr></tbody></table>
<img alt="" src="http://tracking.tldrnewsletter.com/CI0/010001999fe2532c-71a8e1bb-8814-4a8f-81f3-5c5ee1c377f0-000000/aPMmZOyG56MGA767Fb0tSA-eFdVI_M3_Q9q6kiJL47g=425" style="display: none; width: 1px; height: 1px;">
</body></html>