Email Details

Rackspace 0-day  🏒, Zero Trust worker security πŸ‘·β€β™‚οΈ, Arc Browser Bug Bounty 🌐

Rackspace suffered a breach on its internal monitoring dashboard that resulted in the company needing to take it offline briefly. 

TLDR

Together With

TLDR Information Security 2024-10-02

An analysis of billions of cloud assets reveals insecure practices across most AI deployments (Sponsor)

If you had a sneaking suspicion that dev teams are rushing ahead with AI and that it's often at the expense of security… you were correct. Orca Security's new research report reveals that:

  • 56% of organizations are using AI to develop their own custom applications.
  • 62% have deployed an AI package with at least one CVE.
  • 98% of organizations using Google Vertex AI have not enabled encryption at rest for their self-managed encryption keys.

> Read the full analysis and dozens of additional insights by downloading the State of AI Security Report.

> Learn more about Orca's agentless cloud security platform.

> See Orca Security in action in a live demo.

πŸ”“

Attacks & Vulnerabilities

T-Mobile Pays 31.5M in FCC Settlement Over 4 Data Breaches (2 minute read)

The FCC has announced a settlement with T-Mobile over a string of data breaches that impacted customers from 2021 to 2023. Half of the settlement will be used for cybersecurity enhancements and the other half will be paid to the U.S. Treasury as a penalty. T-Mobile has committed to introducing modern security practices such as zero trust and MFA as part of the settlement.
Rackspace Internal Monitoring Web Servers Hit With 0-Day (3 minute read)

Rackspace suffered a breach on its internal monitoring dashboard that resulted in the company needing to take it offline briefly. Rackspace has stated that only the monitoring dashboards were affected, not monitoring and alerting systems generally, and that only a limited amount of data was accessed. The attackers monitoring information that was available to the attackers included customer account name and numbers, customer usernames, internally generated device names IDs, name and device info, and encrypted internal device credentials. Rackspace says that the breach was caused by an RCE 0-day in a third party system.
AFP News Agency's Content Delivery Systems Hit by Cyberattack (2 minute read)

AFP News Agency's content delivery systems were hit by a cyberattack, disrupting its ability to distribute news to clients. Despite the attack, AFP's news reporting remains uninterrupted, with technical teams working to restore full services and secure compromised credentials. The incident highlights ongoing concerns about cybersecurity in France. Experts are investigating the attack and urging partners to enhance security measures.
🧠

Strategies & Tactics

Securing Your Contingent Workers With Zero Trust (11 minute read)

BPOs are often utilized to provide a large group of contractors for outsourcing certain tasks like customer service. Onboarding BPOs can be complicated in a zero-trust environment as zero-trust tools often rely on managed devices, but providing managed hardware to a BPO can prove prohibitively expensive. This post provides a number of options that can be considered. Cloud jump boxes, isolated browsers, managed devices, and managed VMs all provide methods of accessing resources in a way that can still tie into an organization's standard zero-trust procedures. If these solutions are impractical, an organization could consider using posture-based exclusions or implementing exclusions to still allow BPOs to access a limited set of data.
Simplifying XSS Detection With Nuclei - A New Approach (4 minute read)

Traditionally, XSS vulnerabilities are difficult to detect with tools like Nuclei as the tester needs to write a complex set of matchers to check if the payload is reflected in the response. Nuclei headless mode allows testers to configure templates to mimic real user actions on a webpage. When combined with the waitdialog action, a template can be instructed to wait for a dialog box and a matcher can be configured to check if the expected message appears in the dialog. This also enhances accuracy as in the traditional method there's no way to ensure that the script was triggered.
Securing the software supply chain with the SLSA framework (7 minute read)

This post discusses how the SLSA framework can enhance software supply chain security by providing a standard for verifying the creation process of open-source software artifacts. The standard offers different compliance levels, with Level 3 providing the highest security through rigorous build platform hardening. Adoption of SLSA can help prevent attacks on build and distribution processes, but integrating the framework into package distribution tools is crucial for maximizing its benefits.
πŸ§‘β€πŸ’»

Launches & Tools

Free OWASP Top 10 API Training Programs (Sponsor)

October is cybersecurity awareness month β€” and Security Journey is offering free training programs for developers who work with APIs, covering the OWASP Top 10 API Security Risks. This expertly-crafted, 12-lesson learning path is perfect for individual developers or teams. Get free access
Segugio (GitHub Repo)

Segugio is a DFIR tool that extracts IoCs from malware by tracking the critical steps in the malware detonation process.
WhoYouCalling (GitHub Repo)

WhoYouCalling monitors network activity of processes and creates .pcap files automatically. It simplifies process network monitoring by recording TCP/IP activities and DNS requests. The tool can be used to start and monitor executables, generating detailed reports for analysis.
Dragos Acquires Network Perception to Boost Visibility (2 minute read)

Dragos has acquired Network Perception, a company specializing in network visibility solutions for OT networks. The acquisition will enhance Dragos' platform by improving network visibility, segmentation, and compliance capabilities. Network Perception's NP-View product helps security teams identify and address risks in OT environments through network topology mapping and firewall rule evaluations.
🎁

Miscellaneous

Microsoft Announces New Version of Controversial Recall Feature (2 minute read)

Microsoft delayed its Recall feature to address privacy and security concerns following an unpopular launch. Recall is now an opt-in feature and can be uninstalled by users. It will also encrypt data and screenshots with keys stored in the TPM and will require Windows Hello to access the keys.
WhatsApp and Cloudflare Enhance Security by Auditing Key Transparency for End-to-End Encryption (4 minute read)

WhatsApp and Cloudflare began their partnership in 2022 by designing the Code Verify tool to verify the integrity of WhatsApp Web clients. In continuation of this partnership, they've released Plexi for key transparency audits. Key transparency audits will now allow WhatsApp users to verify the integrity of the public keys used for end-to-end encryption as a further level of security.
New security protocol shields data from attackers during cloud-based computation (5 minute read)

MIT researchers have developed a security protocol that uses quantum light to protect data during cloud-based deep-learning computations. The protocol ensures data security while maintaining 96% accuracy in deep-learning models. By encoding data into laser light, the protocol prevents attackers from intercepting information without detection.
⚑

Quick Links

Arc browser launches bug bounty program after fixing RCE bug (2 minute read)

The Browser Company launched an Arc Bug Bounty Program to encourage finding and reporting security flaws.
Four LockBit ransom gang arrests, servers seized by Europol (3 minute read)

Europol made four LockBit gang arrests and seized critical servers used by the ransomware group in a joint international operation with the FBI.
Impact of Verizon's September 30 outage on Internet traffic (3 minute read)

Cloudflare has published an analysis of Verizon's outage on September 30 that shows a decline in HTTP request traffic during the outage, with some cities experiencing significant drops in traffic while others saw increases.

Love TLDR? Tell your friends and get rewards!

Share your referral link below with friends to get free TLDR swag!
Track your referrals here.

Want to advertise in TLDR? πŸ“°

If your company is interested in reaching an audience of cybersecurity professionals and decision makers, you may want to advertise with us.

If you have any comments or feedback, just respond to this email!

Thanks for reading,
Prasanna Gautam, Eric Fernandez & Sammy Tbeile


If you don't want to receive future editions of TLDR Information Security, please unsubscribe from TLDR Information Security or manage all of your TLDR newsletter subscriptions.

Β© 2024 Email Dashboard. All rights reserved.