kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk시작하기//////////////////////// 복구 이메일 사용자가 로그인하는 데 도움이 필요하거나 의심스러운 활동이 감지되면 Google이 복구 이메일을 사용해 연락할 수 있습니다. 복구 이메일을 변경하는 경우, 1주일 동안은 로그인 코드가 이전 복구 이메일로 전송되도록 하는 옵션이 제공될 수도 있습니다. 자세히 알아보기 복구 이메일 mrlee99@lycos.co.kr 최종 업데이트: 알 수 없음kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk

HTML Image-haPPY 2026 !-이미지 테스트중 입니다

Trulli Trulli https://media.pixilinkserver.com/upload/house/images/180223/1.jpg.webp?w=958 kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk ////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// https://sweet-789.blogspot.com/2025/10/biget.html - this is my hometown /////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// https://sweet-789.blogspot.com/2025/10/biget.html - this is my hometown /////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// https://sweet-789.blogspot.com/2025/10/biget.html - this is my hometown /////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// https://sweet-789.blogspot.com/2025/10/biget.html - this is my hometown /////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// https://sweet-789.blogspot.com/2025/10/biget.html - this is my hometown /////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// https://sweet-789.blogspot.com/2025/10/biget.html - this is my hometown /////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// https://sweet-789.blogspot.com/2025/10/biget.html - this is my hometown /////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// https://sweet-789.blogspot.com/2025/10/biget.html - this is my hometown /////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// https://sweet-789.blogspot.com/2025/10/biget.html - this is my hometown /////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// https://sweet-789.blogspot.com/2025/10/biget.html - this is my hometown /////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// kkkkkkkkkkkk..............https://youtu.be/qHzpq9-GFYM.........................kkkkkkkkkkkkkkkkkkkkkk kkkkkkkkkkkk..............https://youtu.be/qHzpq9-GFYM.........................kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk..............https://youtu.be/qHzpq9-GFYM.........................kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk..............https://youtu.be/qHzpq9-GFYM.........................kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk..............https://youtu.be/qHzpq9-GFYM.........................kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk..............https://youtu.be/qHzpq9-GFYM.........................kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk..............https://youtu.be/qHzpq9-GFYM.........................kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk..............https://youtu.be/qHzpq9-GFYM.........................kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk..............https://youtu.be/qHzpq9-GFYM.........................kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk..............https://youtu.be/qHzpq9-GFYM.........................kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk..............https://youtu.be/qHzpq9-GFYM.........................kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk..............https://youtu.be/qHzpq9-GFYM.........................kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk..............https://youtu.be/qHzpq9-GFYM.........................kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk..............https://youtu.be/qHzpq9-GFYM.........................kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk..............https://youtu.be/qHzpq9-GFYM.........................kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk..............https://youtu.be/qHzpq9-GFYM.........................kkkkkkkkkkkkkkkkkkkkkk 7777777777777777777777777777777777777777777777777777777777777777777777777777777 7777777777777777777777777777777777777777777777777777777777777777777777777777777 7777777777777777777777777777777777777777777777777777777777777777777777777777777 관리 페이지 ..... hello body ! ...... https://sweet-789.blogspot.com/search?q=lee7789 .............. hotmail입력주소-??? .........https://sweet-789.blogspot.com/2025/10/biget.html 1234567890 1234567890 1234567890 1234567890 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 https://www.blogger.com/blog/posts/602530074209766435 ................. https://notion84550.tistory.com/entry/%EB%AC%B4%EB%A3%8C-AI-%EC%9D%8C%EC%84%B1-%EB%B3%80%ED%99%98-%ED%88%B4-3%EA%B0%80%EC%A7%80-%EB%B9%84%EA%B5%90-TTS-%C2%B7-%EB%8D%94%EB%B9%99-%C2%B7-%EB%B3%B4%EC%9D%B4%EC%8A%A4-%EC%B2%B4%EC%9D%B8%EC%A0%80 ............................................................................................................... /////////////////////////////////////////////////////////////////////////////////////////////////////////////////// 자동팝업 - https://blog.naver.com/spirit0/50097665940 ///////////////////////////////////// https://lib.eplib.or.kr/infomation/eprss.asp - 은평News - hwpx. 고령자형 매입임대주택은 저소득 고령자층이 현 생활권에서 안정적으로 거주할 수 있도록 한국토지주택공사(LH)가 다가구 등 기존주택을 매입 후 리모델링(재건축)하여 시중시세의 40% 수준의 임대조건으로 저렴하게 임대하는 사업입니다.//////////////////////////////// 8888888888888888888888888888아시아를 중심으로 코로나19 재확산 우려가 커지고 있다. 최근 홍콩 등 중화권에서 확진자와 사망자가 늘어난 데 이어, 한국 관광객이 많이 찾는 동남아시아에서도 감염 사례가 빠르게 증가하고 있다. 각국 보건당국은 마스크 착용 등 방역 수칙을 강조하며 대응에 나섰다. //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// 888888888888888888888888888888888888888888888888888888888888888888 - https://m.blog.naver.com/nett5503/223098269712 - pc 화면에 시계를 뛰우기 - ........https://www.blogger.com/blog/themes/customizer/602530074209766435 - 너비조정 ........ https://www.blogger.com/blog/reading/602530074209766435 - 읽기목록 ........ https://wvpanoply.blogspot.com/2024/06/monday-morning-blooms.html#more - email 8888888888888888888888888888 - 아시아를 중심으로 코로나19 재확산 우려가 커지고 있다. 최근 홍콩 등 중화권에서 확진자와 사망자가 늘어난 데 이어, 한국 관광객이 많이 찾는 동남아시아에서도 감염 사례가 빠르게 증가하고 있다. 각국 보건당국은 마스크 착용 등 방역 수칙을 강조하며 대응에 나섰다. https://vimeo.com/ko/create - abba .......... https://www.blogger.com/blog/reading/602530074209766435 - 읽기목록 - email //////////////////////////////// 7899999000-kkkkkkk-00000008- 3333336765-한줄만삽입해보다 - 우당탕탕 - good time /////////////////////////////// 여기는 어데인고 !//////////////가을인사 - 오후 4:26 2024-09-25 최근 식습관의 영향 커지고 있어 ..... 유방암 위험 요인은? ...... 히잉 - 뭐라꼬 ! kkkkkkkkkkkkkkkkkkkkkk건강관리에 각별히 주의하고 커피 한 잔의 여유로 기분좋은 하루를 시작합니다 .kkkkkkkkkkkkkkkkkkkkkkkkkk 나를이깨우는자비명상-사랑받지못하는것은 자기가자기자신을사랑하고있지않기때문입니다.살ㅇ받고싶다면 자기자신을사랑해야합니다. 조용한곳에편안하게앉기를바랍니다.나는인생의주인공이다.아무도내인생을대신해주지않읍니다.내가하는행동,내가하는말, 내가하는생각은다나의미래가됩니다.내가맡은일을어려워하지않고해낼때나느행복의나라로갑니다. 내가욕심에서,화냄에서,내가어리석음에서,근심과고통에서벗어나진정으로 행복하길바랍니다./////////////////// kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk chrome://password-manager/settings - 자동으로 로그인 설정은 여기에서이다 - kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk https://storep-phinf.pstatic.net/cafe_001/original_6.gif?type=pa50_50 - 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 https://kr.cyberlink.com/blog/the-top-video-editors/3582/virtual-ai-girlfriend 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000 https://harkness-roses.s3.amazonaws.com/700/530665.jpg 00000000000000000000000000000000000000000000000000000000000000 서울시가 ‘민생회복 소비쿠폰’ 2차 신청 접수를 9월 22일 오전 9시부터 시작합니다 .... 신청은 어디서 할까? 지급 대상자는 원하는 지급 방식에 따라 온라인 또는 오프라인으로 소비쿠폰을 신청할 수 있다. 신용·체크카드는 카드사의 누리집 및 앱, 콜센터와 ARS 등을 통해 온라인으로 신청하거나, 카드와 연계된 은행영업점을 방문(9:00~16:00)하여 신청할 수 있다. 선불카드는 주소지 관할 동주민센터에 방문(9:00~18:00)하여 신청가능하며, 1차 지급 시에는 신청서 작성을 직접 해야 했으나, 이번 2차 신청 시에는 신분증만 제시하면 신청이 가능하다. 시는 1차 지급 시 이미 선불카드를 수령한 시민은 2차 지급분도 사용하던 기존 선불카드에 충전하여 사용할 수 있으므로, 2차 소비쿠폰 신청 시 반드시 기존 카드를 지참해 줄 것을 당부했다. kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk위시작에서 여기가마지막부분이다 ................... https://222.enn.kr ...........[[[여기에서...reddit.com.....happy778900.....78907890-uiop...편집하기]]] kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk끝부분이다 kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk

2026년 3월 26일 목요일

밀웨어

///////////////////// from 이메일 2016 -03-28

다운로드
















👩👋👈👺👻👽👿💑💁🌳🌾🍈🍒🍉🍓🍝🍧🍦🍯/////////////////////////////////////////////////////////////////////////////////////////////////////


 https://www.youtube.com/watch?v=f-XizWQzLDs - 생전처음ㄴ댓글 달아보다 

//////////////////////////////////////////oh-shit/- ///////////////////////////////////////////////////

2026. 2. 25. — 대표적인 영어 욕설이며 fuck과 함께 영어권 욕설 중 대표적인 욕설이다. 본래는 똥 혹은 변을 보다의 뜻으로 주로 쓰였으나 이후로는 더 많은 의미를 ...///////'shit'의 번역
명사

shit, dung, ordure///////////////////////////////////////////////////you are shit ////////////

오늘받은 메일인데 위험한 밀웨어라고 하네요 구글본사에서요 그러네요 - 그래서 여러분들이 참고하라고 여기에다 복사해서 보여드립니다 - 저는 그저 받은것뿐인데  - 사실이라면 참으로 나쁜사람이군요 - 다시말해서 거짓말이라고 하네요 

다음 검색어에 대한 결과 포함: 맬웨어 - 내용을 구글에서 복사하고요 - 


밀웨어가 사실이라면 당신은 천벌 만벌을 받을 것입니다 .

 - 이사람이 - 

  

TLDR InfoSec dan@tldrnewsletter.com


TLDR InfoSec dan@tldrnewsletter.com

 - 이




다음 검색어에 대한 결과만 표시: 밀웨어

AI 개요
멀웨어(Malware)는 
악성 소프트웨어(Malicious Software)의 줄임말로, 컴퓨터 시스템이나 사용자에게 해를 끼치도록 설계된 바이러스, 트로이 목마, 랜섬웨어, 스파이웨어 등을 통칭합니다. 주로 정보 유출, 시스템 파괴, 광고 노출, 금전 탈취 등을 목적으로 동작합니다.
주요 내용
  • 대표 유형: 랜섬웨어(파일 암호화), 스파이웨어(정보 수집), 봇넷, 트로이 목마(정상 파일로 위장), 애드웨어.
  • 감염 경로: 악성 이메일 첨부 파일, 감염된 웹사이트 방문, 보안이 취약한 USB 등.
  • 멀웨어란 무엇일까요? | Akamai
    멀웨어는 IT 환경에 손상이나 중단을 유발하거나 해커가 IT 환경에 접속할 수 있도록 돕도록 설계된 소프트웨...
    Akamai
  • 멀웨어 - 나무위키:대문
    사용자의 이익에 반해 시스템을 파괴하거나 정보를 변조, 유출하는 등 악의적인 작업을 하도록 만들어진 소프트웨...
/////////////////////////////////////////////////////////

복사본입니다 -

LiteLLM Backdoored 🐍, Vibe Code, Real Vulns 🤖, Google PQC: 2035 → 2029 ⚛️ 

스팸함

TLDR InfoSec dan@tldrnewsletter.com

3월 26일 (목) PM 10:13 (17시간 전)
에게

위험한 메일일 수 있음

멀웨어를 호스팅하는 웹사이트의 링크가 포함되어 있습니다. 메일에 포함된 링크를 클릭하지 마세요.

위험한 메일일 수 있음

멀웨어를 호스팅하는 웹사이트의 링크가 포함되어 있습니다. 메일에 포함된 링크를 클릭하지 마세요.


이 메일은 영어로 작성된 것 같습니다
TLDR

Together With 1Password

TLDR Information Security 2026-03-26

Secure access across humans, AI agents, and machine identities (Sponsor)

Legacy IAM tools like PAM and SSO can't manage access from the ever-growing sprawl of identities, SaaS apps, and AI agents.

That's why 1Password created Unified Access. This is the solution designed to help reduce endpoint blind spots, credential sprawl, and accountability gaps. 

Unified Access is a comprehensive solution for shadow AI discovery, secure vaulting, and context-aware authorization.

Learn how it gives you visibility and control over all access, whether from humans, agents, or machine identities.

Explore the solution.

🔓

Attacks & Vulnerabilities

Popular LiteLLM PyPI Package Backdoored to Steal Credentials and Auth Tokens (2 minute read)

The TeamPCP hacking group, which was responsible for the recent supply chain compromise of Trivy, claimed responsibility for a supply chain compromise of the LiteLLM PyPI package. The malicious updates download a ‘.pth' file, which Python runs on every interpreter startup to download the CloudStealer payload. The stealer attempts to steal credentials such as cloud access keys, Kubernetes service account tokens, SSH keys, cryptocurrency wallet data, and database credentials, then attempts lateral movement to Kubernetes clusters and installs a persistence script via systemd.
TP-Link Warns Users to Patch Critical Router Auth Bypass Flaw (2 minute read)

TP-Link has patched several vulnerabilities in its Archer NX router series, including an authentication bypass that could allow attackers to upload arbitrary firmware. The flaw stems from a missing authentication check in the HTTP server for certain CGI endpoints. Other patched flaws include removing a hardcoded cryptographic key and patching two command-execution vulnerabilities that required admin privileges.
TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials (4 minute read)

TeamPCP, the group behind the Trivy supply chain attack (CVE-2026-33634, CVSS 9.4), compromised two Checkmarx GitHub Actions, checkmarx/ast-github-action and checkmarx/kics-github-action, by reusing credentials stolen from the Trivy breach four days earlier. The "TeamPCP Cloud stealer" harvests SSH keys, AWS/GCP/Azure creds, Kubernetes configs, Docker secrets, and crypto wallet data, exfiltrating them as an encrypted archive to checkmarx[.]zone. Trojanized Open VSX extensions for VS Code were also pushed.
🧠

Strategies & Tactics

Fake install logs in npm packages load RAT (5 minute read)

Researchers found a cluster of malicious npm packages, dubbed the "Ghost campaign," that has been active since early February. Published by a single npm user, the packages display fake installation logs with random delays and a progress bar to disguise malicious activity. During this fake process, users are prompted to enter their sudo password under the guise of fixing installation errors. That password is then used to execute a final-stage RAT that steals crypto wallets and sensitive data. Other research links a related package to the same techniques, suggesting this may have been an early test run of a broader campaign.
Pentest of a 100% vibe-encoded app: complete security analysis of an AI-generated app (4 minute read)

A web app built entirely with Claude Opus 4.6 was pentested in grey-box mode with standard user credentials. Critical findings came fast: an LFI via an unfiltered full_path parameter exposed /etc/passwd and opened the door to RCE. An IDOR on /employee/{guid} lets any user pull other employees' emails, roles, and password hashes by harvesting GUIDs from a public leaderboard API. The front-end ran Vite 5.4.10, carrying three known CVEs. AI-generated code ended up skipping input validation, weak access controls, and dependency checks.
The LiteLLM Supply Chain Attack: A Complete Technical Breakdown Of The AI Ecosystem's Darkest Hour (9 minute read)

TeamPCP exploited a `pull_request_target` GitHub Actions misconfiguration in Aqua Security's Trivy scanner on February 27 to steal a privileged PAT, rewrote 75 of 76 mutable version tags in the trivy-action repo to deliver credential-stealing code, and ultimately harvested LiteLLM's PyPI publish token from its unpinned CI/CD pipeline to push malicious versions 1.82.7 and 1.82.8 (97M monthly downloads). The v1.82.8 payload used a `.pth` file in site-packages to trigger a double base64-encoded infostealer on every Python interpreter startup, targeting SSH keys, AWS/GCP/Azure credentials, CI/CD secrets, and crypto wallets, with stolen data AES-256 and RSA-4096 encrypted before exfiltration to `models.litellm.cloud`. Defenders should pin all GitHub Actions to immutable commit hashes, enforce strict lockfiles (Poetry or uv), scope CI/CD tokens to least privilege, and treat any environment that ran Python between 09:00 and 13:30 UTC on March 24 as fully compromised, requiring full credential rotation.
🧑‍💻

Launches & Tools

Caterpillar (GitHub Repo)

Caterpillar is a security scanner for AI skills that scans for anti-patterns in those skills before a user downloads them.
Escape (Product Launch)

Escape is launching an offensive security platform that uses automated agents to discover, test, and fix application vulnerabilities within engineering workflows, including attack surface mapping and security testing.
Default Creds (GitHub Repo)

Default Creds is a centralized, community-driven repository of factory-set credentials.
🎁

Miscellaneous

81-Month Sentence for Russian Hacker Behind Major Ransomware Campaigns (2 minute read)

A US federal court sentenced Aleksei Volkov to 81 months in prison for acting as an initial access broker for the Yanluowang ransomware group. He broke into corporate networks, sold that access to ransomware operators, and took a cut of the proceeds. Attacks caused $9M in actual losses and $24M in intended losses. Arrested in Rome in 2024 and extradited, he pleaded guilty in November 2025 to fraud, identity theft, and conspiracy, and must pay $9.1M in restitution.
Delve did the security compliance on LiteLLM, an AI project hit by malware (3 minute read)

A credential-harvesting malware slipped into LiteLLM (3.4M daily downloads) via a compromised dependency, propagating across downstream packages and accounts before being caught within hours by a FutureSearch researcher whose machine crashed due to a bug in the malware itself. LiteLLM holds SOC 2 and ISO 27001 certifications issued by Delve, a YC-backed compliance startup that has been separately accused of generating fake audit data and rubber-stamping reports. Mandiant has been brought in for forensic review, with technical findings to be shared with the developer community upon completion.
Electric Motorcycles Don't Have To Be Security Nightmares, But This One Was (2 minute read)

Researchers Persephone Karnstein and Mitchell Marasch presented at BSides Seattle 2026 how they achieved full firmware control over a Zero Motorcycle by exploiting its OTA update mechanism and a VIN validation bypass that accepted any VIN-structured code rather than a registered one. The attack surface extended to the battery management system, enabling a conceptual payload capable of triggering a battery fire, disabling the brakes via OTA, and blocking factory resets that would otherwise reverse the compromise.
⚡

Quick Links

CSA Launches CSAI Foundation for AI Security (3 minute read)

The Cloud Security Alliance spun out CSAI, a nonprofit focused on security for autonomous AI agents.
Google moves post-quantum encryption timeline up to 2029 (1 minute read)

Citing faster-than-expected advances in quantum hardware, error correction, and factoring, Google accelerated its internal PQC migration deadline to 2029, six years ahead of the NIST-mandated 2035 federal baseline, and called on private industry to follow suit.
Mirai Malware Evolves into Hundreds of Variants Driving Botnet Growth (1 minute read)

Botnet C2 servers grew 24% in H2 2025, driven by 116 Mirai variants across 21,000+ samples targeting IoT devices.

Love TLDR? Tell your friends and get rewards!

Share your referral link below with friends to get free TLDR swag!
Track your referrals here.

Want to advertise in TLDR? 📰

If your company is interested in reaching an audience of cybersecurity professionals and decision makers, you may want to advertise with us.

Want to work at TLDR? 💼

Apply herecreate your own role or send a friend's resume to jobs@tldr.tech and get $1k if we hire them! TLDR is one of Inc.'s Best Bootstrapped businesses of 2025.

If you have any comments or feedback, just respond to this email!

Thanks for reading,
Prasanna GautamEric Fernandez & Sammy Tbeile


Manage your subscriptions to our other newsletters on tech, startups, and programming. Or if TLDR Information Security isn't for you, please unsubscribe.


/////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

댓글 없음: