<!DOCTYPE html><html lang="en"><head><meta http-equiv="Content-Type" content="text/html charset=UTF-8"><meta charset="UTF-8"><meta name="viewport" content="width=device-width"><meta name="x-apple-disable-message-reformatting"><title>TLDR InfoSec</title><meta name="color-scheme" content="light dark"><meta name="supported-color-schemes" content="light dark"><style type="text/css">
:root {
color-scheme: light dark; supported-color-schemes: light dark;
}
*,
*:after,
*:before {
-webkit-box-sizing: border-box; -moz-box-sizing: border-box; box-sizing: border-box;
}
* {
-ms-text-size-adjust: 100%; -webkit-text-size-adjust: 100%;
}
html,
body,
.document {
width: 100% !important; height: 100% !important; margin: 0; padding: 0;
}
body {
-webkit-font-smoothing: antialiased; -moz-osx-font-smoothing: grayscale; text-rendering: optimizeLegibility;
}
div[style*="margin: 16px 0"] {
margin: 0 !important;
}
table,
td {
mso-table-lspace: 0pt; mso-table-rspace: 0pt;
}
table {
border-spacing: 0; border-collapse: collapse; table-layout: fixed; margin: 0 auto;
}
img {
-ms-interpolation-mode: bicubic; max-width: 100%; border: 0;
}
*[x-apple-data-detectors] {
color: inherit !important; text-decoration: none !important;
}
.x-gmail-data-detectors,
.x-gmail-data-detectors *,
.aBn {
border-bottom: 0 !important; cursor: default !important;
}
.btn {
-webkit-transition: all 200ms ease; transition: all 200ms ease;
}
.btn:hover {
background-color: #f67575; border-color: #f67575;
}
* {
font-family: Arial, Helvetica, sans-serif; font-size: 18px;
}
@media screen and (max-width: 600px) {
.container {
width: 100%; margin: auto;
}
.stack {
display: block!important; width: 100%!important; max-width: 100%!important;
}
.btn {
display: block; width: 100%; text-align: center;
}
}
body,
p,
td,
tr,
.body,
table,
h1,
h2,
h3,
h4,
h5,
h6,
div,
span {
background-color: #FEFEFE !important; color: #010101 !important;
}
@media (prefers-color-scheme: dark) {
body,
p,
td,
tr,
.body,
table,
h1,
h2,
h3,
h4,
h5,
h6,
div,
span {
background-color: #27292D !important; color: #FEFEFE !important;
}
}
a {
color: inherit !important; text-decoration: underline !important;
}
</style><!--[if mso | ie]>
<style type="text/css">
a {
background-color: #FEFEFE !important; color: #010101 !important;
}
@media (prefers-color-scheme: dark) {
a {
background-color: #27292D !important; color: #FEFEFE !important;
}
}
</style>
<![endif]--></head><body class="">
<div style="display: none; max-height: 0px; overflow: hidden;">EchoGram is a technique that exploits training data gaps in LLM guardrails by injecting βflip tokensβ (nonsensical strings, such as β=coffeeβ) β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β β </div>
<div style="display: none; max-height: 0px; overflow: hidden;">
<br>
</div>
<table align="center" class="document"><tbody><tr><td valign="top">
<table align="center" border="0" cellpadding="0" cellspacing="0" class="container" width="600"><tbody><tr class="inner-body"><td>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr class="header"><td bgcolor="" class="container">
<table width="100%"><tbody><tr><td class="container">
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" style="margin-top: 0px;" width="100%"><tbody><tr><td style="padding: 0px;">
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div style="text-align: center;">
<span style="margin-right: 0px;"><a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Ftldr.tech%2Finfosec%3Futm_source=tldrinfosec/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/17jkKsVdB7cWjypOZXTok07szGefiW7xhV2hB9bUQCw=432" rel="noopener noreferrer" target="_blank"><span>Sign Up</span></a>
|<span style="margin-right: 2px; margin-left: 2px;"><a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fadvertise.tldr.tech%2F%3Futm_source=tldrinfosec%26utm_medium=newsletter%26utm_campaign=advertisetopnav/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/laez4y8LudRpV2FdUxnDelifB3aMUmGlCvHSxM3SY5I=432" rel="noopener noreferrer" target="_blank"><span>Advertise</span></a></span>|<span style="margin-left: 2px;"><a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fa.tldrnewsletter.com%2Fweb-version%3Fep=1%26lc=156924ca-84b7-11f0-8d58-47c5c04ad337%26p=5ca545d4-c4ff-11f0-9bc2-377fb22be17c%26pt=campaign%26t=1763561203%26s=24bdc1faf204fa0149ca22b27923543017eef872f8821f4e479e088ab2cffcdf/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/gyESRUOG1iTGkeRLwyKSoZNDZLsnqOQ9y5hQMIS2hM8=432"><span>View Online</span></a></span>
<br>
</span></div>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="text-align: center;"><span data-darkreader-inline-color="" style="--darkreader-inline-color:#3db3ff; color: rgb(51, 175, 255) !important; font-size: 30px;">T</span><span style="font-size: 30px;"><span data-darkreader-inline-color="" style="color: rgb(232, 192, 96) !important; --darkreader-inline-color:#e8c163; font-size:30px;">L</span><span data-darkreader-inline-color="" style="color: rgb(101, 195, 173) !important; --darkreader-inline-color:#6ec7b2; font-size:30px;">D</span></span><span data-darkreader-inline-color="" style="--darkreader-inline-color:#dd6e6e; color: rgb(220, 107, 107) !important; font-size: 30px;">R</span>
<br>
</td></tr></tbody></table>
<br>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr id="together-with"><td align="center" height="20" style="vertical-align:middle !important;" valign="middle" width="100%"><strong style="vertical-align:middle !important; height: 100%;">Together With </strong>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fpages.awscloud.com%2Fawsmp-mss-fortinet-fortigate-hybrid-network-security.html%3Ftrk=d2517354-73c2-44ad-bc32-08f19919a2bd%26sc_channel=el/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/5KKZDDoSH4dVumn5LdYvo1IcySZ6tEsPug-DFBr0hXo=432"><img src="https://images.tldr.tech/awsroidna.png" valign="middle" style="vertical-align: middle !important; height: 100%;" alt="AWS"></a></td></tr></tbody></table>
<table style="table-layout: fixed; width:100%;" width="100%"><tbody><tr><td style="padding:0;border-collapse:collapse;border-spacing:0;margin:0;">
<div style="text-align: center;">
<h1><strong>TLDR Information Security <span id="date">2025-11-19</span></strong></h1>
</div>
</td></tr></tbody></table>
<table style="table-layout: fixed; width:100%;" width="100%"><tbody><tr id="sponsy-copy"><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fpages.awscloud.com%2Fawsmp-mss-fortinet-fortigate-hybrid-network-security.html%3Ftrk=d2517354-73c2-44ad-bc32-08f19919a2bd%26sc_channel=el/2/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/FSm-6uXnqJuvslvFJyd6VFcNwbOg5NKGecWIRncK8b0=432">
<span>
<strong>Simplify hybrid network protection on AWS (Sponsor)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Securing hybrid workloads can be complex. <a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Faws.amazon.com%2Fmarketplace%2Fpp%2Fprodview-wory773oau6wq%3Ftrk=6b8efdde-aa2e-4ca6-a886-76e121cde88d%26sc_channel=el/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/qnmHlsErKMRnU55ugz7fDnPplN1L199XTprFTWPCkPA=432" rel="noopener noreferrer nofollow" target="_blank"><span>Fortinet FortiGate Next-Generation Firewall (NGFW)</span></a> integrates with AWS Gateway Load Balancer to simplify hybrid protection through centralized inspection, routing, and policy control.
<p></p>
<p>Learn how <a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Faws.amazon.com%2Fmarketplace%2Fpp%2Fprodview-wory773oau6wq%3Ftrk=6b8efdde-aa2e-4ca6-a886-76e121cde88d%26sc_channel=el/2/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/ZFuR6a0DbcL2vMbtEH3SD-0Ds8Hc6vl_nfbO9cf2WoA=432" rel="noopener noreferrer nofollow" target="_blank"><span>Fortinet and AWS</span></a> help teams maintain visibility, streamline compliance and reduce management overhead.
</p>
</span></span></div>
</td></tr></tbody></table>
</td></tr></tbody></table>
</td></tr></tbody></table>
</td></tr>
<tr bgcolor=""><td class="container">
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td style="padding: 0px;">
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;"><span style="font-size: 36px;">π</span></div></div>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;">
<h1><strong>Attacks & Vulnerabilities</strong></h1>
</div>
</div>
</td></tr></tbody></table>
<table style="table-layout: fixed; width: 100%;" width="100%"><tbody><tr><td style="padding:0;border-collapse:collapse;border-spacing:0;margin:0;" valign="top">
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fhackread.com%2Fechogram-flaw-bypass-guardrails-major-llms%2F%3Futm_source=tldrinfosec/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/2XPH_bXqAIWpckH0iMDZbUApFTJ0bStcNSzK5CT038A=432">
<span>
<strong>EchoGram Flaw Bypasses Guardrails in Major LLMs (2 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
EchoGram is a technique that exploits training data gaps in LLM guardrails by injecting βflip tokensβ (nonsensical strings, such as β=coffeeβ) that cause both false positives and bypasses of safety controls in GPT-5.1, Claude, and Gemini. The attack is effective against both LLM-as-judge and classification-based guardrails. Researchers estimate that attackers can replicate the method within three months. Security teams face dual threats - malicious prompts that bypass defenses and legitimate requests being falsely flagged - leading to alert fatigue in critical sectors such as finance and healthcare.
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Ftechcrunch.com%2F2025%2F11%2F17%2Fsurveillance-tech-provider-protei-was-hacked-its-data-stolen-and-its-website-defaced%2F%3Futm_source=tldrinfosec/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/OnG4lnUtiwGkM4UlpmBJ-xiyUYGj1GFii9GCn2KAHW4=432">
<span>
<strong>Surveillance Tech Provider Protei Was Hacked (2 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Protei, a Russian telecom company that develops technology to enable phone and internet companies to conduct web surveillance and censorship, was hacked. The attackers defaced its website and stole 182GB of data, including confidential emails. The threat actor defaced the website with the message βanother DPI/SORM provider bites the dust,β referring to the company's sales of deep packet inspection and other internet filtering technologies developed for the Russian lawful intercept system.
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.securityweek.com%2Fprinceton-university-data-breach-impacts-alumni-students-employees%2F%3Futm_source=tldrinfosec/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/2qZPWxvFfcNM7LyESnmmMVBrjvjga1YFXB-7QXjn8nw=432">
<span>
<strong>Princeton University Data Breach Impacts Alumni, Students, Employees (2 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Princeton University disclosed a data breach after a hacker accessed a database with personal details of alumni, donors, faculty, students, and parents. The attack, traced to a phishing call, compromised information like names, addresses, emails, and donation records, but not passwords or financial data.
</span>
</span>
</div>
</td></tr></tbody></table>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;"><span style="font-size: 36px;">π§ </span></div>
</div>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;">
<h1><strong>Strategies & Tactics</strong></h1>
</div>
</div>
</td></tr></tbody></table>
<table style="table-layout: fixed; width: 100%;" width="100%"><tbody><tr><td style="padding:0;border-collapse:collapse;border-spacing:0;margin:0;" valign="top">
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fsirantd.com%2Fhow-i-overlooked-the-problem-and-shot-myself-in-the-foot-06841414e1de%3Futm_source=tldrinfosec/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/jiWkRs9IAMNrDSOfoVkKSW-iVz4cC9A7rd9RRrC3Vwg=432">
<span>
<strong>How I Overlooked the Problem and Shot Myself in the Foot (4 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
This author disabled and deleted Identity & Access Management (IAM) users before updating associated Terraform state and key policies while migrating from legacy IAM users to SSO in an AWS environment, inadvertently locking access to an AWS KMS key. Terraform applied changes but masked the fact that the EKS cluster continued to use the orphaned key, causing permission failures and locking out key management until AWS Support intervened. Security teams should ensure IAM and key-policy transitions are sequenced and validated, maintain Terraform state accuracy, and treat KMS keys as high-risk break-glass resources during cloud IAM migrations.
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fcyberscoop.com%2Fciso-burnout-mental-health-cybersecurity-exhaustion-op-ed%2F%3Futm_source=tldrinfosec/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/K-g_60d9Ii0WwnpwYRFUuw67whS6hGQUGtEaGl7tr2E=432">
<span>
<strong>The realities of CISO burnout and exhaustion (4 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
CISOs are facing a surge in burnout driven by accelerating threats, shrinking budgets, and increasing executive accountability for breaches. The evolving role now spans governance, risk, crisis management, and business strategy, creating sustained cognitive load and operational fatigue that raises organizational and even national-security risk. Security leaders should prioritize realistic resourcing, delegation, mental-health sustainability, and board-level alignment to ensure that essential defensive capabilities do not degrade under chronic pressure.
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fblog.randorisec.fr%2Fms-teams-access-tokens%2F%3Futm_source=tldrinfosec/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/mptV1rH2lXztJu346SRQ2iiZ6wotYG4baHyWlGIInV0=432">
<span>
<strong>Stealing Microsoft Teams Access Tokens in 2025 (4 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Microsoft Teams stores its auth_cookie in a DPAPI-encrypted value in the Cookie database of the embedded Chromium browser used by Teams. The key used to encrypt the cookie can be retrieved from the Local State file in the Teams cache and used in conjunction with the nonce to decrypt the auth_cookie using AES-256-GCM. This auth_cookie can then be used with GraphSpy to retrieve and send messages on Teams.
</span>
</span>
</div>
</td></tr></tbody></table>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;"><span style="font-size: 36px;">π§βπ»</span></div>
</div>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;">
<h1><strong>Launches & Tools</strong></h1>
</div>
</div>
</td></tr></tbody></table>
<table style="table-layout: fixed; width: 100%;" width="100%"><tbody><tr><td style="padding:0;border-collapse:collapse;border-spacing:0;margin:0;" valign="top">
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.strongdm.com%2Fblog%2Fpolicy-enforcement-for-agentic-ai-with-leash%3Futm_source=tldrinfosec/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/CsRCnCasPIYKWby1z-lIeOPQOQaQ04loDJpwEjX6lZI=432">
<span>
<strong>π StrongDM launches Leash: open-source policy enforcement for AI agents (Sponsor)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
AI agents are the fastest-growing class of identity. They're connecting to tools and systems 24/7 - requiring a new approach to access control. <a class="underline" href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.strongdm.com%2Fblog%2Fpolicy-enforcement-for-agentic-ai-with-leash/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/eRF3GXmtFioRSYkfCFtMG1msRDGNB-YAVqNN7JVbd1w=432" rel="noopener noreferrer nofollow" target="_blank"><span>Leash is StrongDM's new open-source project</span></a> that extends runtime control to agentic systems. Leash works at kernel level (<1ms latency overhead) to evaluate agent activity against human-readable guardrails. <a class="underline" href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.strongdm.com%2Fblog%2Fpolicy-enforcement-for-agentic-ai-with-leash/2/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/l9UOjBZHWbEywgbZSleQJcFK4Btcf4vdGJ9GpVkT5wc=432" rel="noopener noreferrer nofollow" target="_blank"><span>Read the blog</span></a>
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fgithub.com%2Fricardojoserf%2FSAMDump%3Futm_source=tldrinfosec/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/kH445PwfH-XSvi_0iXUgmnMDz2lqYE_FAhKi3H3cYWI=432">
<span>
<strong>SAMDump (GitHub Repo)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
This tool extracts offline Windows SAM, SYSTEM, and SECURITY registry hives and parses them to extract hashed credentials for analysis. It's intended for use by red-team or forensic practitioners to recover NTLM/LM hashes for further brute force or audit activities. Infosec professionals should treat any accessible hives as a high-risk indicator, ensure live system backup integrity, enforce privilege separation for hive access, and validate detection around unusual hive reads or exfiltration.
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.nudgesecurity.com%2F%3Futm_source=tldrinfosec/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/DaH3T7ph8-dLJ14UvCsLeDE8PLLKp13pPhntCnD0884=432">
<span>
<strong>Nudge Security (Product Launch)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Nudge Security helps organizations secure SaaS and AI usage by providing real-time visibility, risk detection, and automated policy enforcement. It uncovers risky integrations, monitors AI/data access, and addresses identity security gaps across apps and users.
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fgithub.com%2Ffarhanashrafdev%2F90DaysOfCyberSecurity%3Futm_source=tldrinfosec/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/aaY3qYuKpNVmZa3DI4H_wcSLc5hbwyYm4gWwkY9tSI0=432">
<span>
<strong>90DaysOfCyberSecurity (GitHub Repo)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
This repository contains a 90-day cybersecurity study plan, along with resources and materials for learning various cybersecurity concepts and technologies. The plan is organized into daily tasks and covers topics such as Network+, Security+, Linux, Python, Traffic Analysis, Git, ELK, AWS, Azure, and Hacking.
</span>
</span>
</div>
</td></tr></tbody></table>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;"><span style="font-size: 36px;">π</span></div></div>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;"><strong><h1>Miscellaneous</h1></strong></div>
</div>
</td></tr></tbody></table>
<table bgcolor="" style="table-layout: fixed; width: 100%;" width="100%"><tbody><tr><td style="padding:0;border-collapse:collapse;border-spacing:0;margin:0;" valign="top">
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.securityweek.com%2Firanian-hackers-target-defense-and-government-officials-in-ongoing-campaign%2F%3Futm_source=tldrinfosec/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/fcKxX_LBsOy1Z3itFfbxSkblgYoO545eC2eRh4cclBQ=432">
<span>
<strong>Iranian Hackers Target Defense and Government Officials in Ongoing Campaign (4 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
APT42 (aka SpearSpecter) targets senior defense/government officials through social engineering, extending attacks to victims' family members to increase pressure. The campaign deploys TameCat malware, a PowerShell backdoor using Telegram/Discord for C&C that performs reconnaissance, credential theft, and data exfiltration while evading detection through in-memory execution and obfuscation.
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Farstechnica.com%2Ftech-policy%2F2025%2F11%2Fwidespread-cloudflare-outage-blamed-on-mysterious-traffic-spike%2F%3Futm_source=tldrinfosec/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/8YJh9wj-mExSbKn_msvAtQ7aunK70CK0t-Yh-A-T2WM=432">
<span>
<strong>Widespread Cloudflare outage blamed on mysterious traffic spike (3 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
A major Cloudflare outage temporarily knocked many major websites and platforms offline due to a spike in unusual traffic, which overwhelmed a configuration file and caused core systems to crash. Although not caused by an attack, the outage impacted services like X, ChatGPT, Amazon, and Spotify.
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.cybersecuritydive.com%2Fnews%2Fcisa-hiring-workforce-strategy%2F805733%3Futm_source=tldrinfosec/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/zeo7vwKD55OrzPJIooOzs37i_nGA7evNHfPn7oN1dhc=432">
<span>
<strong>CISA, Eyeing China, Plans Hiring Spree to Rebuild its Depleted Ranks (3 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Given a 40% vacancy rate in pivotal areas, CISA has announced plans to increase hiring in 2026 to replace its depleted workforce and remain competitive. CISA will prioritize hiring liaisons between CISA and critical infrastructure, as well as utilize the DHS's Cyber Talent Management system. CISA will also offer exemptions to its return-to-office policy and strengthen partnerships with colleges and universities to attract top talent.
</span>
</span>
</div>
</td></tr></tbody></table>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;"><span style="font-size: 36px;">β‘</span></div></div>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding-top: 0px; padding-bottom: 0px;">
<div class="text-block">
<div style="text-align: center;">
<h1><strong>Quick Links</strong></h1>
</div>
</div>
</td></tr></tbody></table>
<table bgcolor="" style="table-layout: fixed; width: 100%;" width="100%"><tbody><tr><td style="padding:0;border-collapse:collapse;border-spacing:0;margin:0;" valign="top">
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.codacy.com%2F%3Futm_campaign=19062107-TLDR%2520Ad%2520Placement%26utm_source=TLDR%26utm_medium=newsletter%26utm_term=tldr-infosec-quicklinks%26utm_content=security/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/5fff98qqROuv9NeQlu4-Co_R3GmMlpHNuC_jO6l-ldE=432">
<span>
<strong>Codacy: Security Scans Your Devs Won't Bypass (Sponsor)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Secure all your code, dependencies and infrastructure effortlessly, with a unified platform that's built-in, not bolted on. <a class="c-link c-link--focus-visible c-link--underline" href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.codacy.com%2F%3Futm_campaign=19062107-TLDR%2520Ad%2520Placement%26utm_source=TLDR%26utm_medium=newsletter%26utm_term=tldr-infosec-quicklinks%26utm_content=security/2/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/_Fc2Zt5B3PAgu88rgTWEANiQDS6QkEopRWBHLx2D8GA=432" rel="noopener noreferrer" target="_blank"><span>Try Codacy for free</span></a>
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fhackread.com%2Fmicrosoft-azure-blocks-tbps-ddos-attack-botnet%2F%3Futm_source=tldrinfosec/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/FjTPzFMmlwCrFWCU3KcBqHt4Es598CGzntrF6vf2hLY=432">
<span>
<strong>Microsoft Azure Blocks 15.72 Tbps Aisuru Botnet DDoS Attack (2 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Azure mitigated a record 15.72 Tbps DDoS attack from the Aisuru botnet, which has infected over 700,000 IoT devices.
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fbugbounty.meta.com%2Fblog%2F15th-anniversary-2025%2F%3Futm_source=tldrinfosec/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/KCrSGqSNzRoX_OXjRt_xPRYdVi-RtSQ09oKpgecr1HM=432">
<span>
<strong>Celebrating 15 years of Meta's Bug Bounty Program (2 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Meta has paid out $4 million through its bug bounty program in 2025, bringing the total awarded by the social media giant since the creation of the program to more than $25 million.
</span>
</span>
</div>
</td></tr></tbody></table>
<table align="center" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block">
<span>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Flinks.tldrnewsletter.com%2FEFY18t/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/dqx5bA7RGYMcBTirXaRRMbFNs2-8wmCpVuP5bI3Xs0Y=432">
<span>
<strong>Cabify driver database allegedly stolen by hackers (1 minute read)</strong>
</span>
</a>
<br>
<br>
<span style="font-family: "Helvetica Neue", Helvetica, Arial, Verdana, sans-serif;">
Hackers claim to have stolen 430,000+ Cabify driver records.
</span>
</span>
</div>
</td></tr></tbody></table>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td align="left" style="word-break: break-word; vertical-align: top; padding: 5px 10px;">
<p style="padding: 0; margin: 0; font-size: 22px; color: #000000; line-height: 1.6; font-weight: bold;">
Love TLDR? Tell your friends and get rewards!
</p>
</td></tr>
<tr><td class="container" style="padding: 0px 10px 15px;">
<div class="text-block">
Share your referral link below with friends to get free TLDR swag!
</div>
</td></tr>
<tr><td align="left" style="padding: 10px;">
<div class="text-block">
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Frefer.tldr.tech%2F78de0e20%2F8/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/zNsFhCN2XVIalZshnfzEhjLpbjzkkkEF0_eeljxiDtc=432" style="color: #464ba4; text-decoration: underline;">https://refer.tldr.tech/78de0e20/8</a>
</div>
</td></tr>
<tr></tr>
<tr><td align="left" style="padding:5px 10px;">
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fhub.sparklp.co%2Fsub_d62447d5a74a%2F8/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/27Z1lf3uBdNq9PkdI9qxbl3grU7yALXkq0p1c3fuGXk=432" style="font-size: 16px; line-height: 1.6; padding: 10px 0; display: inline-block; text-decoration: underline;"><span style="mso-text-raise:13pt; text-decoration: underline;">Track your referrals here.</span></a>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td align="left" style="word-break: break-word; vertical-align: top; padding: 5px 10px;">
<p style="padding: 0; margin: 0; font-size: 22px; color: #000000; line-height: 1.6; font-weight: bold;">
Want to advertise in TLDR? π°
</p>
<div class="text-block" style="margin-top: 10px;">
If your company is interested in reaching an audience of cybersecurity professionals and decision makers, you may want to <a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fadvertise.tldr.tech%2F%3Futm_source=tldrinfosec%26utm_medium=newsletter%26utm_campaign=advertisecta/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/0HbssvdOTk1yg1XOhq2YwicnUHJmFt5zte88ol6MNvY=432"><strong><span>advertise with us</span></strong></a>.
</div>
<br>
<!-- New "Want to work at TLDR?" section -->
<p style="padding: 0; margin: 0; font-size: 22px; color: #000000; line-height: 1.6; font-weight: bold;">
Want to work at TLDR? πΌ
</p>
<div class="text-block" style="margin-top: 10px;">
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fjobs.ashbyhq.com%2Ftldr.tech/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/ZVk-dwaorpKcYaxkaDBLbdOF-tyaZb5Ir-Z00hvmZ_o=432" rel="noopener noreferrer" style="color: #0000EE; text-decoration: underline;" target="_blank"><strong>Apply here</strong></a> or send a friend's resume to <a href="mailto:jobs@tldr.tech" style="color: #0000EE; text-decoration: underline;">jobs@tldr.tech</a> and get $1k if we hire them!
</div>
<br>
<div class="text-block">
If you have any comments or feedback, just respond to this email!
<br>
<br> Thanks for reading,
<br>
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.linkedin.com%2Fin%2Fprasannagautam%2F/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/wgOyr3M6aDoyjVvAvhYWPsaxLCHu-1ZeJhpyIPh2HnE=432"><span>Prasanna Gautam</span></a>, <a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.linkedin.com%2Fin%2Fericfernandezdelcampo%2F/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/SGrI3aHhJ9tb_WtJxp3KfKsDToHtAQmvHP-b2ncwQSM=432"><span>Eric Fernandez</span></a> & <a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fwww.linkedin.com%2Fin%2Fsammy-tbeile%2F/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/x7NWk8wOVypbaK2sXyA7cAFUTgxKvz7vrZoKCNaVIiQ=432"><span>Sammy Tbeile</span></a>
<br>
<br>
</div>
<br>
</td></tr></tbody></table>
<table align="center" bgcolor="" border="0" cellpadding="0" cellspacing="0" width="100%"><tbody><tr><td class="container" style="padding: 15px 15px;">
<div class="text-block" id="testing-id">
<a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Ftldr.tech%2Finfosec%2Fmanage%3Femail=silk.theater.56%2540fwdnl.com/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/HSdZ-T8mS9YIJe_mawTO6dgNoNkgM_uFafVbNvBR-nE=432">Manage your subscriptions</a> to our other newsletters on tech, startups, and programming. Or if TLDR Information Security isn't for you, please <a href="https://tracking.tldrnewsletter.com/CL0/https:%2F%2Fa.tldrnewsletter.com%2Funsubscribe%3Fep=1%26l=8d9cea11-3e94-11ed-9a32-0241b9615763%26lc=156924ca-84b7-11f0-8d58-47c5c04ad337%26p=5ca545d4-c4ff-11f0-9bc2-377fb22be17c%26pt=campaign%26pv=4%26spa=1763560905%26t=1763561203%26s=f3159603dc24068c74529a7e9cbdfe7888c2398621dff870f55b20f7625fb113/1/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/Ii8juRYMvrD3rkOUAv0xaAEdWgxUJn0QWM_iq1Xi6L8=432">unsubscribe</a>.
<br>
</div>
</td></tr></tbody></table>
</td></tr></tbody></table>
</td></tr></tbody></table>
</td></tr></tbody></table>
</td></tr></tbody></table>
<img alt="" src="http://tracking.tldrnewsletter.com/CI0/0100019a9c706828-b711c695-b6d6-48fa-9b20-0b6ccb48b2ec-000000/YuRV7_UH1qNeYfSJuLXvc0WnH_utiAY_vsc6HlRlTBQ=432" style="display: none; width: 1px; height: 1px;">
</body></html>