<!DOCTYPE html><html lang="en"><head>
<meta http-equiv="Content-Type" content="text/html charset=UTF-8">
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width">
<meta name="x-apple-disable-message-reformatting">
<title>TLDR InfoSec</title>
<meta name="color-scheme" content="light dark">
<meta name="supported-color-schemes" content="light dark">
<style type="text/css">
:root {
color-scheme: light dark; supported-color-schemes: light dark;
}
*,
*:after,
*:before {
-webkit-box-sizing: border-box; -moz-box-sizing: border-box; box-sizing: border-box;
}
* {
-ms-text-size-adjust: 100%; -webkit-text-size-adjust: 100%;
}
html,
body,
.document {
width: 100% !important; height: 100% !important; margin: 0; padding: 0;
}
body {
-webkit-font-smoothing: antialiased; -moz-osx-font-smoothing: grayscale; text-rendering: optimizeLegibility;
}
div[style*="margin: 16px 0"] {
margin: 0 !important;
}
table,
td {
mso-table-lspace: 0pt; mso-table-rspace: 0pt;
}
table {
border-spacing: 0; border-collapse: collapse; table-layout: fixed; margin: 0 auto;
}
img {
-ms-interpolation-mode: bicubic; max-width: 100%; border: 0;
}
*[x-apple-data-detectors] {
color: inherit !important; text-decoration: none !important;
}
.x-gmail-data-detectors,
.x-gmail-data-detectors *,
.aBn {
border-bottom: 0 !important; cursor: default !important;
}
.btn {
-webkit-transition: all 200ms ease; transition: all 200ms ease;
}
.btn:hover {
background-color: #f67575; border-color: #f67575;
}
* {
font-family: Arial, Helvetica, sans-serif; font-size: 18px;
}
@media screen and (max-width: 600px) {
.container {
width: 100%; margin: auto;
}
.stack {
display: block!important; width: 100%!important; max-width: 100%!important;
}
.btn {
display: block; width: 100%; text-align: center;
}
}
body,
p,
td,
tr,
.body,
table,
h1,
h2,
h3,
h4,
h5,
h6,
div,
span {
background-color: #FEFEFE !important; color: #010101 !important;
}
@media (prefers-color-scheme: dark) {
body,
p,
td,
tr,
.body,
table,
h1,
h2,
h3,
h4,
h5,
h6,
div,
span {
background-color: #27292D !important; color: #FEFEFE !important;
}
}
a {
color: inherit !important; text-decoration: underline !important;
}
</style>
<!--[if mso | ie]>
<style type="text/css">
a {
background-color: #FEFEFE !important; color: #010101 !important;
}
@media (prefers-color-scheme: dark) {
a {
background-color: #27292D !important; color: #FEFEFE !important;
}
}
</style>
<![endif]-->
</head>
<body class="">
<div style="display: none; max-height: 0px; overflow: hidden;">Researchers from Googleโs Project Zero discovered a vulnerability in Dolbyโs Unified Decoder that could lead to remote code execution โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ โ </div>
<div style="display: none; max-height: 0px; overflow: hidden;">
<br>
</div>
<table align="center" class="document">
<tbody>
<tr>
<td valign="top">
<table align="center" border="0" cellpadding="0" cellspacing="0" class="container" width="600">
<tbody>
<tr class="inner-body">
<td>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr class="header">
<td bgcolor="" class="container">
<table width="100%">
<tbody>
<tr>
<td class="container">
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" style="margin-top: 0px;" width="100%">
<tbody>
<tr>
<td style="padding: 0px;">
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding: 15px 15px;">
<div style="text-align: center;">
<span style="margin-right: 0px;"><a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Ftldr.tech%2Finfosec%3Futm_source=tldrinfosec/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/gIIZOampu_pQV_OxqC3WuHQ_Qgqix4EKjdVUXeYAWJ0=428" rel="noopener noreferrer" target="_blank"><span>Sign Up</span></a>
|<span style="margin-right: 2px; margin-left: 2px;"><a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fadvertise.tldr.tech%2F%3Futm_source=tldrinfosec%26utm_medium=newsletter%26utm_campaign=advertisetopnav/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/ftIPkm78e6Ik8YN-sRQBJimjsuxwHlBAaSfzNj-joDY=428" rel="noopener noreferrer" target="_blank"><span>Advertise</span></a></span>|<span style="margin-left: 2px;"><a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fa.tldrnewsletter.com%2Fweb-version%3Fep=1%26lc=156924ca-84b7-11f0-8d58-47c5c04ad337%26p=c2ecc148-af36-11f0-be25-a13c5c74b403%26pt=campaign%26t=1761138416%26s=ad350ce441e63de604701797f4a048482861892c8f65941644f15bc0c94c44f7/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/QVwYZRKDDeDmesBczLSXc7FP23-x2NFB1UXgR9Gd9UQ=428"><span>View Online</span></a></span>
<br>
</span></div>
</td>
</tr>
</tbody>
</table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="text-align: center;"><span data-darkreader-inline-color="" style="--darkreader-inline-color:#3db3ff; color: rgb(51, 175, 255) !important; font-size: 30px;">T</span><span style="font-size: 30px;"><span data-darkreader-inline-color="" style="color: rgb(232, 192, 96) !important; --darkreader-inline-color:#e8c163; font-size:30px;">L</span><span data-darkreader-inline-color="" style="color: rgb(101, 195, 173) !important; --darkreader-inline-color:#6ec7b2; font-size:30px;">D</span></span><span data-darkreader-inline-color="" style="--darkreader-inline-color:#dd6e6e; color: rgb(220, 107, 107) !important; font-size: 30px;">R</span>
<br>
</td>
</tr>
</tbody>
</table>
<br>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr id="together-with">
<td align="center" height="20" style="vertical-align:middle !important;" valign="middle" width="100%"><strong style="vertical-align:middle !important; height: 100%;">Together With </strong>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2F1password.com%2Fresources%2Fsaas-sprawl-guide%3Futm_source=tldr%26utm_medium=paid_newsletter%26utm_campaign=sa_commercial_amer_english_solve-saas-chaos-guide_awareness_2025-10%26utm_content=text%26utm_term=october-22-newsletter/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/saEAvSA2s-hHMkh912eDL9aq93vMhndNlyEL5JgRlUo=428"><img src="https://images.tldr.tech/1password-2.png" valign="middle" style="vertical-align: middle !important; height: 100%;" alt="1Password"></a></td>
</tr>
</tbody>
</table>
<table style="table-layout: fixed; width:100%;" width="100%">
<tbody>
<tr>
<td style="padding:0;border-collapse:collapse;border-spacing:0;margin:0;">
<div style="text-align: center;">
<h1><strong>TLDR Information Security <span id="date">2025-10-22</span></strong></h1>
</div>
</td>
</tr>
</tbody>
</table>
<table style="table-layout: fixed; width:100%;" width="100%">
<tbody>
<tr id="sponsy-copy">
<td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2F1password.com%2Fresources%2Fsaas-sprawl-guide%3Futm_source=tldr%26utm_medium=paid_newsletter%26utm_campaign=sa_commercial_amer_english_solve-saas-chaos-guide_awareness_2025-10%26utm_content=text%26utm_term=october-22-newsletter/2/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/3Zz9oRQsHnYisDaqZ9Wul2hOPHDmNhbRSyEebR38gAE=428">
<span>
<strong>Your guide to taming SaaS chaos (Sponsor)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
IT teams face an uphill battle to secure their company's SaaS apps. There's dealing with on/offboarding, going through access reviews, and manually managing permissions for every app that's not behind SSO. And that's just for the apps you <em>know about</em>. So how can you <a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2F1password.com%2Fresources%2Fsaas-sprawl-guide%3Futm_source=tldr%26utm_medium=paid_newsletter%26utm_campaign=sa_commercial_amer_english_solve-saas-chaos-guide_awareness_2025-10%26utm_content=text%26utm_term=october-22-newsletter/3/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/qO0HCf6Fj9uijgKUBNHoRE6nEa2SnF-sD1YEatOA_VY=428" rel="noopener noreferrer nofollow" target="_blank"><span>manage the chaos and finally get full visibility</span></a> over your SaaS ecosystem?
<p></p>
<p>That's where SaaS management solutions come in. <a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2F1password.com%2Fresources%2Fsaas-sprawl-guide%3Futm_source=tldr%26utm_medium=paid_newsletter%26utm_campaign=sa_commercial_amer_english_solve-saas-chaos-guide_awareness_2025-10%26utm_content=text%26utm_term=october-22-newsletter/4/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/w7iUW3THpqDowwfygpSqGXaHWHQbDUq1JlCKu8lI0-4=428" rel="noopener noreferrer nofollow" target="_blank"><span>1Password's latest guide</span></a> explores proven strategies and tools to manage every app -- yes, even shadow IT.</p>
<p><a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2F1password.com%2Fresources%2Fsaas-sprawl-guide%3Futm_source=tldr%26utm_medium=paid_newsletter%26utm_campaign=sa_commercial_amer_english_solve-saas-chaos-guide_awareness_2025-10%26utm_content=text%26utm_term=october-22-newsletter/5/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/WY2bBJQZd1F_4DSeYMu4rmyhTfimryk6yvafyf6tGuo=428" rel="noopener noreferrer nofollow" target="_blank"><span>Read the guide</span></a>
</p>
</span></span></div>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
<tr bgcolor="">
<td class="container">
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td style="padding: 0px;">
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;"><span style="font-size: 36px;">๐</span></div></div>
</td>
</tr>
</tbody>
</table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;">
<h1><strong>Attacks & Vulnerabilities</strong></h1>
</div>
</div>
</td>
</tr>
</tbody>
</table>
<table style="table-layout: fixed; width: 100%;" width="100%">
<tbody>
<tr>
<td style="padding:0;border-collapse:collapse;border-spacing:0;margin:0;" valign="top">
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.securityweek.com%2Fover-73000-watchguard-firebox-devices-impacted-by-recent-critical-flaw%2F%3Futm_source=tldrinfosec/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/wJM8pNFlffaM5pyNIj4Dv6gAweRTLAZE1lYMbT8Yp0M=428">
<span>
<strong>Over 73,000 WatchGuard Firebox Devices Impacted by Recent Critical Flaw (2 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
A critical vulnerability in WatchGuard Firebox devices running certain Fireware OS versions puts over 73,000 network firewalls at risk of unauthenticated remote code execution. Despite patches being released in September, tens of thousands of devices remain unpatched, with the largest concentrations in the US and Europe.
</span>
</span>
</div>
</td>
</tr>
</tbody>
</table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.theregister.com%2F2025%2F10%2F21%2Fmuji_askul_ransomware%2F%3Futm_source=tldrinfosec/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/cRdszvz_P6Q7Q_6hJ32NphogZwjnW867AHZVR3OMsXI=428">
<span>
<strong>Muji's minimalist calm shattered as ransomware takes down logistics partner (3 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
A ransomware attack on logistics partner Askul forced Japanese retailer Muji to suspend online orders, affecting customers and disrupting services. With Askul's systems nearly paralyzed, many functions, including shipments and customer support, are down. No ransomware group has claimed responsibility.
</span>
</span>
</div>
</td>
</tr>
</tbody>
</table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.securityweek.com%2Fvulnerability-in-dolby-decoder-can-allow-zero-click-attacks%2F%3Futm_source=tldrinfosec/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/U_zxGOuWpg-A1tBefcReKymbcfGDcC9CfG3J-sLaCR4=428">
<span>
<strong>Vulnerability in Dolby Decoder Can Allow Zero-Click Attacks (2 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Researchers from Google's Project Zero discovered a vulnerability in Dolby's Unified Decoder that could lead to remote code execution. Dolby Decoder is used by Android to locally decode all audio messages and attachments. The vulnerability is caused by a buffer overflow.
</span>
</span>
</div>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;"><span style="font-size: 36px;">๐ง </span></div>
</div>
</td>
</tr>
</tbody>
</table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;">
<h1><strong>Strategies & Tactics</strong></h1>
</div>
</div>
</td>
</tr>
</tbody>
</table>
<table style="table-layout: fixed; width: 100%;" width="100%">
<tbody>
<tr>
<td style="padding:0;border-collapse:collapse;border-spacing:0;margin:0;" valign="top">
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fthehackernews.com%2F2025%2F10%2Fanalysing-clickfix-3-reasons-why.html%3Futm_source=tldrinfosec/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/5BgDmlXZKSvLjRolGz9OR4p2ea4mKP4VGyvu3iNURsk=428">
<span>
<strong>Analysing ClickFix: 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches (7 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
ClickFix attacks trick users into copying and pasting malicious commands from fake CAPTCHA prompts in web browsers, which are then executed locally on their devices, with attacks spreading primarily through SEO poisoning and malvertising rather than email. These attacks exploit three key weaknesses: users lack awareness training for copy-paste threats, detection evasion techniques bypass email scanners and web proxies by using non-email delivery vectors and heavily obfuscated code, and EDR becomes the sole defense layer since malicious clipboard actions occur within the browser sandbox, invisible to traditional security tools. Security professionals should implement browser-based detection for malicious copy-paste operations, enhance user training to recognize fake CAPTCHA prompts, and deploy comprehensive endpoint monitoring since EDR remains the only reliable detection point after users execute the commands.
</span>
</span>
</div>
</td>
</tr>
</tbody>
</table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fdfir.ch%2Fposts%2Flinux_capabilities%2F%3Futm_source=tldrinfosec/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/_HUP-I03_TNqVY3bzU_Q6CyBfgOr3yOEE0Dr7xVaQs8=428">
<span>
<strong>Linux Capabilities Revisited (4 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Linux capabilities enable fine-grained privilege management by dividing root powers into independent units, but attackers can abuse this by setting capabilities like cap_setuid on binaries (e.g., Python) to create stealthy backdoors without traditional SUID bits. Security teams should expand privilege escalation hunting beyond SUID/SGID files to include capability-enabled binaries using getcap -r / and monitor for setcap usage, as capabilities are stored in file inodes under security.capability attributes invisible to standard ls commands. Tools like LinPEAS and Elastic's detection rule for setcap utility usage help identify suspicious capability assignments, while getfattr can reveal hidden extended attributes that getcap decodes into human-readable capability flags.
</span>
</span>
</div>
</td>
</tr>
</tbody>
</table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.adamlogue.com%2Fmicrosoft-365-copilot-arbitrary-data-exfiltration-via-mermaid-diagrams-fixed%2F%3Futm_source=tldrinfosec/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/pKQntx-B7aHDve8SnjbkKhGbaLXa7rkk8eF3l4mh7W0=428">
<span>
<strong>Microsoft 365 Copilot โ Arbitrary Data Exfiltration Via Mermaid Diagrams (5 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Microsoft 365 Copilot was vulnerable to a security flaw that allowed sensitive business data, like recent emails, to be exfiltrated using specially crafted documents. Attackers could embed hidden instructions and a fake login button, which used Mermaid diagrams to send encoded company data to servers under their control if a user clicked the button. Microsoft fixed the vulnerability by disabling interactions with dynamic Mermaid diagram content, effectively closing this exfiltration route.
</span>
</span>
</div>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;"><span style="font-size: 36px;">๐งโ๐ป</span></div>
</div>
</td>
</tr>
</tbody>
</table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;">
<h1><strong>Launches & Tools</strong></h1>
</div>
</div>
</td>
</tr>
</tbody>
</table>
<table style="table-layout: fixed; width: 100%;" width="100%">
<tbody>
<tr>
<td style="padding:0;border-collapse:collapse;border-spacing:0;margin:0;" valign="top">
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fgo.flashpoint.io%2Fguide-to-osint-executive-protection%3Futm_campaign=Resource_RP_OSINT_Executive_Protection%26utm_source=tldrinfosec%26utm_medium=newsletter%26sfcampaign_id=701Rc00000Lo4xBIAR/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/bf-hgO-EOSJchb5E1nNx81NEObhxU5ncuTQE0fkrdk8=428">
<span>
<strong>OSINT for Executive Protection: The Flashpoint Guide (Sponsor)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Doxxing. Deepfakes. Targeted harassment. Executives are prime targets for cyber and physical attacksโare you equipped to protect them? Read <a class="c-link" href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fgo.flashpoint.io%2Fguide-to-osint-executive-protection%3Futm_campaign=Resource_RP_OSINT_Executive_Protection%26utm_source=tldrinfosec%26utm_medium=newsletter%26sfcampaign_id=701Rc00000Lo4xBIAR/2/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/GXf-C9xzUlhxFxz_r4upzBVZiUQY4qtICc0vapjPzbM=428" rel="noopener noreferrer" target="_blank"><span><em>The Complete Guide to OSINT for Executive Protection</em></span></a> to learn how to Identify and neutralize digital threats before they escalate, set up real-time alerts, and use AI-powered analysis. <a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fgo.flashpoint.io%2Fguide-to-osint-executive-protection%3Futm_campaign=Resource_RP_OSINT_Executive_Protection%26utm_source=tldrinfosec%26utm_medium=newsletter%26sfcampaign_id=701Rc00000Lo4xBIAR/3/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/UhPWu1nPSQH6H_XX3TVeBfxznmOItXhyIQF7xipcBZE=428" rel="noopener noreferrer nofollow" target="_blank"><span>Download the guide</span></a>
</span>
</span>
</div>
</td>
</tr>
</tbody>
</table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.terra.security%2F%3Futm_source=tldrinfosec/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/Ak6Cfi_ajnMCLx6aaFC_4Aj_Sn6CizCTZhs2n9q7d3Y=428">
<span>
<strong>Terra Security (Product Launch)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Terra Security offers an agentic-AI-powered continuous penetration testing platform that deploys swarms of AI agents to simulate real-world attacks, providing tailored and scalable vulnerability assessments so organizations can address risks before attackers exploit them.
</span>
</span>
</div>
</td>
</tr>
</tbody>
</table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fgithub.com%2Fsherlock-project%2Fsherlock%3Futm_source=tldrinfosec/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/X7RZ0mI7wbKzC9Tjt_hL7FcUqZowv0l6x51j6iG6w50=428">
<span>
<strong>Sherlock (GitHub Repo)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Hunt down social media accounts by username across social networks.
</span>
</span>
</div>
</td>
</tr>
</tbody>
</table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fgithub.com%2Fmadhuakula%2Fspotter%3Futm_source=tldrinfosec/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/JhupKPYYps5OUdMlSnQL_MASl6xpO9GNq-V8SD2mu3g=428">
<span>
<strong>Spotter (GitHub Repo)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Spotter is a security scanner that uses CEL-based rules to identify security issues in Kubernetes clusters.
</span>
</span>
</div>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;"><span style="font-size: 36px;">๐</span></div></div>
</td>
</tr>
</tbody>
</table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;"><strong><h1>Miscellaneous</h1></strong></div>
</div>
</td>
</tr>
</tbody>
</table>
<table bgcolor="" style="table-layout: fixed; width: 100%;" width="100%">
<tbody>
<tr>
<td style="padding:0;border-collapse:collapse;border-spacing:0;margin:0;" valign="top">
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.csoonline.com%2Farticle%2F4074945%2Fnetwork-security-devices-endanger-orgs-with-90s-era-flaws.html%3Futm_source=tldrinfosec/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/-rPq44DdA6KYw1vfdxK1KH0Ncthsg6ooAeAm_L8cbA0=428">
<span>
<strong>Network security devices endanger orgs with '90s era flaws (3 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Network edge devices like firewalls, VPNs, and email gateways have become major security liabilities, with nearly one in three of the 75 zero-day vulnerabilities tracked by Google in 2024 targeting these appliances. The exploited vulnerabilities consist primarily of basic 1990s-era flaws such as buffer overflows, command injections, and SQL injectionsโvulnerability classes that have well-established prevention and detection controls, yet persist in security vendors' mission-critical codebases. Security professionals should prioritize patching network appliances immediately when vulnerabilities are disclosed, implement comprehensive logging and monitoring for edge devices, and pressure vendors to adopt modern secure development practices, including memory-safe languages and rigorous code auditing.
</span>
</span>
</div>
</td>
</tr>
</tbody>
</table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.bitdefender.com%2Fen-us%2Fblog%2Fhotforsecurity%2Fhundreds-masked-ice-agents-doxxed-hackers-personal-details-posted-telegram%3Futm_source=tldrinfosec/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/v1iRrQTY_xB65h3bHkCjPMFnJSpdSq3kX1xtoDF7i4E=428">
<span>
<strong>Hundreds of masked ICE agents doxxed by hackers, as personal details posted on Telegram (3 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
The Com hacking collective leaked personal information of hundreds of US government employees, including 680 DHS officials, over 170 FBI email addresses, and 190+ Department of Justice officials on private Telegram channels, with unclear data origins. The doxxing coincides with DHS warnings about Mexican cartels allegedly targeting ICE and CBP agents with bounties, and hackers claimed interest in million-dollar rewards while threatening to target IRS officials next. Security professionals should implement enhanced operational security for government personnel, monitor dark web channels for leaked PII, and review data handling procedures to identify potential breach sources, particularly given The Com's history of high-profile attacks against MGM Resorts, Coinbase, and others.
</span>
</span>
</div>
</td>
</tr>
</tbody>
</table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Ftechcrunch.com%2F2025%2F10%2F21%2Fapple-alerts-exploit-developer-that-his-iphone-was-targeted-with-government-spyware%2F%3Futm_source=tldrinfosec/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/2OaMrumG8XjMj_8TnV10UjYz8meNyx3Jv5WxAqbOvTQ=428">
<span>
<strong>Apple alerts exploit developer that his iPhone was targeted with government spyware (4 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
A former Trenchant (L3Harris subsidiary) iOS exploit developer received an Apple threat notification in March indicating his personal iPhone was targeted with mercenary spyware, potentially marking the first documented case of spyware developers being targeted by their own tools. The developer, pseudonymously called Jay Gibson, was fired from Trenchant weeks earlier after being accused of leaking Chrome zero-days despite working exclusively on iOS exploits, which he and former colleagues deny. Security professionals should note that Apple's threat notification system detects sophisticated targeting even when forensic analysis finds no infection traces, suggesting either failed attack attempts or increasingly stealthy spyware that leaves minimal forensic evidence.
</span>
</span>
</div>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;"><span style="font-size: 36px;">โก</span></div></div>
</td>
</tr>
</tbody>
</table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;">
<h1><strong>Quick Links</strong></h1>
</div>
</div>
</td>
</tr>
</tbody>
</table>
<table bgcolor="" style="table-layout: fixed; width: 100%;" width="100%">
<tbody>
<tr>
<td style="padding:0;border-collapse:collapse;border-spacing:0;margin:0;" valign="top">
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fgo.veeam.com%2Fhalloveeam-de.html%3Fccode=operational_701UG00000TlQw1YAF%26utm_source=tldrinfosec/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/XVp_fHrD3O7PYNjlfhW1ox2Uv6jbXeeQoZPoDw8wNbc=428">
<span>
<strong>This Halloween, the Scariest Thing Is Unprotected Data (Sponsor)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Welcome to HalloVeeam: where cyber threats wear costumes and heroes save the day. Real security. Zero boring. All treats, no tricks. Perfect Halloween timing. October 30th, 2-3pm CET. Costumes encouraged. <a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fgo.veeam.com%2Fhalloveeam-de.html%3Fccode=operational_701UG00000TlQw1YAF/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/ND3TQZs17pbG-aYaUaUgrQJ1HBzaTre6maK8QRzwwLk=428" rel="noopener noreferrer nofollow" target="_blank"><span>Register now โ</span></a>
</span>
</span>
</div>
</td>
</tr>
</tbody>
</table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.theverge.com%2Fnews%2F802486%2Faws-outage-alexa-fortnite-snapchat-offline%3Futm_source=tldrinfosec/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/uCFXK-AvintbefUx74cJBnftvWtFWfi3H2q7zxuYkGs=428">
<span>
<strong>Major AWS outage takes down Fortnite, Alexa, Snapchat, and more (1 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
A major AWS outage disrupted multiple high-profile services, including Fortnite, Alexa, and Snapchat, highlighting the critical dependency risks and single points of failure that organizations face when relying on centralized cloud infrastructure providers.
</span>
</span>
</div>
</td>
</tr>
</tbody>
</table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Flinks.tldrnewsletter.com%2FYNkbYF/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/Y_LUmX5JWQhystqapehfTe227w1iZotKqU71cQeiSp0=428">
<span>
<strong>Hackers could've drained millions from Shopify rival (3 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Indian e-commerce platform Dukaan exposed an unsecured Apache Kafka broker for over two years, leaking payment gateway authentication tokens for Stripe, PayPal, and RazorPay, along with customer data from 3.5 million merchants that could have enabled attackers to drain hundreds of millions of dollars from merchant accounts.
</span>
</span>
</div>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td align="left" style="word-break: break-word; vertical-align: top; padding: 5px 10px;">
<p style="padding: 0; margin: 0; font-size: 22px; color: #000000; line-height: 1.6; font-weight: bold;">
Love TLDR? Tell your friends and get rewards!
</p>
</td>
</tr>
<tr>
<td class="container" style="padding: 0px 10px 15px;">
<div class="text-block">
Share your referral link below with friends to get free TLDR swag!
</div>
</td>
</tr>
<tr>
<td align="left" style="padding: 10px;">
<div class="text-block">
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Frefer.tldr.tech%2F78de0e20%2F8/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/bqVyQAXIWX-MLnhjFrmPaScTF6h7xOi_Qk4CDWJGt1M=428" style="color: #464ba4; text-decoration: underline;">https://refer.tldr.tech/78de0e20/8</a>
</div>
</td>
</tr>
<tr></tr>
<tr>
<td align="left" style="padding:5px 10px;">
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fhub.sparklp.co%2Fsub_d62447d5a74a%2F8/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/nC_I2WQYGGoYkAZ76GgupuUOFP0EpnEv-cyKsHV1OcA=428" style="font-size: 16px; line-height: 1.6; padding: 10px 0; display: inline-block; text-decoration: underline;"><span style="mso-text-raise:13pt; text-decoration: underline;">Track your referrals here.</span></a>
</td>
</tr>
</tbody>
</table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td align="left" style="word-break: break-word; vertical-align: top; padding: 5px 10px;">
<p style="padding: 0; margin: 0; font-size: 22px; color: #000000; line-height: 1.6; font-weight: bold;">
Want to advertise in TLDR? ๐ฐ
</p>
<div class="text-block" style="margin-top: 10px;">
If your company is interested in reaching an audience of cybersecurity professionals and decision makers, you may want to <a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fadvertise.tldr.tech%2F%3Futm_source=tldrinfosec%26utm_medium=newsletter%26utm_campaign=advertisecta/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/1yArBtJHw-4Mw0KNIx4sOaUuJ3q6bxlGMWfrS1_Ve20=428"><strong><span>advertise with us</span></strong></a>.
</div>
<br>
<!-- New "Want to work at TLDR?" section -->
<p style="padding: 0; margin: 0; font-size: 22px; color: #000000; line-height: 1.6; font-weight: bold;">
Want to work at TLDR? ๐ผ
</p>
<div class="text-block" style="margin-top: 10px;">
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fjobs.ashbyhq.com%2Ftldr.tech/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/xYRfgCZc1qeMK58Y6MF2tcLuo6pWE9Jz3Ua6MbrQUic=428" rel="noopener noreferrer" style="color: #0000EE; text-decoration: underline;" target="_blank"><strong>Apply here</strong></a> or send a friend's resume to <a href="mailto:jobs@tldr.tech" style="color: #0000EE; text-decoration: underline;">jobs@tldr.tech</a> and get $1k if we hire them!
</div>
<br>
<div class="text-block">
If you have any comments or feedback, just respond to this email!
<br>
<br> Thanks for reading,
<br>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.linkedin.com%2Fin%2Fprasannagautam%2F/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/UeoLvW32mdjalSx6c2z5LlA-3zSd3SCDgrJ9Qdt0xiU=428"><span>Prasanna Gautam</span></a>, <a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.linkedin.com%2Fin%2Fericfernandezdelcampo%2F/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/HtxqZrZnxOe1pG9U0f-PK8BVs2qPlPMhHA9WsDGJ710=428"><span>Eric Fernandez</span></a> & <a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.linkedin.com%2Fin%2Fsammy-tbeile%2F/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/VvyhH_KcD5no7R6NZBQXXTqwpSOntd7ZkeDsQvcnSqE=428"><span>Sammy Tbeile</span></a>
<br>
<br>
</div>
<br>
</td>
</tr>
</tbody>
</table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td class="container" style="padding: 15px 15px;">
<div class="text-block" id="testing-id">
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Ftldr.tech%2Finfosec%2Fmanage%3Femail=silk.theater.56%2540fwdnl.com/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/_Wf261tNKT5DspS3RsQHIzrEm690tclvXswMeHW5xac=428">Manage your subscriptions</a> to our other newsletters on tech, startups, and programming. Or if TLDR Information Security isn't for you, please <a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fa.tldrnewsletter.com%2Funsubscribe%3Fep=1%26l=8d9cea11-3e94-11ed-9a32-0241b9615763%26lc=156924ca-84b7-11f0-8d58-47c5c04ad337%26p=c2ecc148-af36-11f0-be25-a13c5c74b403%26pt=campaign%26pv=4%26spa=1761138106%26t=1761138416%26s=54bac60d2281bdc8f702302701c01f26cf4b1701fa0022bc56205504eb497394/1/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/1bEh94IbBWevTTGjftGq8-FpK5qC2nY7t_txGiz2CkY=428">unsubscribe</a>.
<br>
</div>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
a
<img alt="" src="http://tracking.tldrnewsletter.com/CI0/0100019a0c079c4a-ff9addeb-e55e-46c5-ac82-8f065ff5a27b-000000/ZXiNSVlz7Sp9g18gvwCK7bH5eK_P99Jn16xTimmmXlY=428" style="display: none; width: 1px; height: 1px;">
</body></html>