Back to templates

Canada Tyre 38M Breach 🇨🇦, Twitch Exposes Roadmap 📹, EC2 Instance Attestation ☁️

This template is displayed for design inspiration and research purposes only. All trademarks, logos, and content belong to their respective owners. Not affiliated with or endorsed by the original sender. Copyright policy

About this template

Cybersecurity news roundup covering major data breaches, threat tactics, and security tools for defenders. Canadian Tire 38M+ account breach, Twitch roadmap exposure, EC2 attestation details, and 10+ critical vulnerabilities.
  • Audience: security professionals, CISO teams
  • Format: daily digest with analysis and resources
  • Coverage: breaches, vulnerabilities, tools, zero trust

Tags

#fintech#none#learn_more#sign_up#newsletter#saas#text_focused#light#en#us#technical

Preview

Sign Up |Advertise|View Online
TLDR

Together With Blackpoint

TLDR Information Security 2026-03-02

Inside the SOC EP#001: What's Working for Attackers Right Now (Sponsor)

ClickFix, Fake CAPTCHA, and ScreenConnect misuse are familiar threats, but they're still getting results.  

In this 45-minute live session, our SOC walks through the tradecraft, staging patterns, and execution behaviors threat actors are using, along with practical mitigation guidance.

Save your Seat

🔓

Attacks & Vulnerabilities

Canadian Tire 2025 data breach impacts 38 million users (2 minute read)

A 2025 e‑commerce breach at Canadian Tire exposed data from over 38 million accounts, including names, contact details, hashed passwords, and partial card numbers, with under 150,000 records containing full dates of birth. Financial systems and in‑store transactions were reportedly unaffected, but 42 million records were added to Have I Been Pwned.
ManoMano data breach affects 38 million customers via third-party provider (2 minute read)

DIY marketplace ManoMano is notifying about 38 million affected customers after unauthorized access at a subcontracted customer service provider handling Zendesk-based interactions. Threat actor "Indra" claims to have compromised data for 37.8 million accounts, including names, emails, phone numbers, and support communications.
Cops back Dutch telco Odido after second wave of ShinyHunters leaks (2 minute read)

ShinyHunters is dumping Odido customer records in daily batches, exposing sensitive identifiers, bank details, and support notes, and threatening to escalate the leaks after already impacting more than a million accounts. Dutch police publicly support Odido's stance of refusing ransom payments and emphasize the need for rapid law enforcement engagement and anti‑phishing vigilance.
🧠

Strategies & Tactics

Delinea Protocol Handler - Return of the MSI: RCE via Custom Launcher (8 minute read)

AmberWolf disclosed an RCE vulnerability in Delinea's Secret Server Protocol Handler (≤6.0.3.39) and Connection Manager (≤2.7.1) where improper sanitisation of the sslauncher:// URL handler's generic process launcher allowed a malicious server to supply attacker-controlled process names and arguments via encrypted launcher data, achieving arbitrary code execution on both Windows and macOS when a victim visits a crafted webpage and accepts a security prompt. The exploit, implementable as a NachoVPN plugin, abuses the legitimate key exchange flow to inject serialized launcher configurations that RDPWin.exe blindly executes via Process.Start(). Delinea patched the protocol handler as of January 17. Organizations should upgrade immediately and monitor for anomalous child processes spawned by RDPWin.exe.
Twitch Ships Server-Side Eppo Keys in Its iOS App, Exposing Its Entire Product Roadmap (10 minute read)

Twitch's iOS app uses server-side Eppo SDK keys instead of client tokens, exposing over 260 unobfuscated production feature flags via a CDN endpoint that can be freely polled once a key is observed in traffic. The flags reveal Twitch's near-term roadmap. Hardcoded IDs, internal codenames, and future launches like "Elevate Prime 2026" are visible, turning feature flags into a live intelligence feed on product, security posture, and internal economics.
Process Preluding: Child Process Injection Before the Story Begins (7 minute read)

Many security products in Windows 10 and 11 use kernel Event Tracing for Windows (ETW) hooks to monitor process creation and be notified of potentially malicious activity. An attacker can bypass these checks by exploiting a race condition between the kernel's completion of the executive process object setup and the invocation of process-creation callbacks. Attackers can also use legacy APIs for process creation, which do not trigger process-creation callbacks.
🧑‍💻

Launches & Tools

MacNoise (GitHub Repo)

MacNoise is a modular macOS telemetry-generation framework designed to help security teams validate EDR, SIEM, and firewall detection coverage by producing real system events across the network, process, file, TCC, and persistence categories. The tool includes MITRE ATT&CK-mapped modules, pre-built APT emulation scenarios, and OCSF 1.7.0-compliant audit logging for structured correlation. Scenarios can be dry-run previewed, chained via YAML, and output as JSONL for automated detection gap analysis.
Rustdesk (GitHub Repo)

Rustdesk is an open-source remote desktop application designed for self-hosting. An alternative to TeamViewer, it works out of the box with no configuration required. You have full control over your data, with no security concerns.
ksentinel (GitHub Repo)

ksentinel is a Linux kernel module that monitors syscall table integrity, function prologues, and LSTAR MSR values using FNV-1a hashing to detect unauthorized modifications from rootkits such as PUMAKIT, Diamorphine, and KoviD. It covers 500+ syscall wrappers, plus critical VFS, networking, credential, and tracing functions, with anti-unload protection via a compile-time-generated unlock key. The module supports Linux versions 5.4 to 6.12+ on x86_64 and ARM64. It features configurable check intervals and a management script for live monitoring and violation alerts.
🎁

Miscellaneous

Critical Flaws Exposed Gardyn Smart Gardens to Remote Hacking (2 minute read)

Researchers reported flaws in Gardyn Home and Studio, which exposed roughly 138,000 indoor smart gardens to unauthenticated, internet‑reachable remote compromise, including OS command execution via command injection and hardcoded admin credentials in the Gardyn IoT Hub and Azure IoT infrastructure. Thankfully, patches are out and auto‑delivered.
What is EC2 Instance Attestation (5 minute read)

Nitro enclaves were introduced in 2020 to provide a trusted execution environment for security-sensitive applications. However, application development was more complex due to the execution environment's limitations. Last year, AWS launched EC2 instance attestation, which extends the security enclave to the full instance, enabling more use cases and improving usability at the cost of greater effort to secure the instance and increased deployment complexity. This post walks through the process of creating an application running on an EC2 instance with attestation, including a GitHub Actions workflow to build a hardened, attestable AMI.
Demystifying Zero Trust (5 minute read)

This part of the UK's NCSC multi-part guide on implementing zero trust in an enterprise focuses on defining zero trust beyond the buzzword or a specific product. Zero trust defines a strategic shift where users are continually authenticated as opposed to a point-in-time authentication at the beginning of a session. It implies a defense in depth approach where controls are layered in a system and may work in conjunction with existing systems or replace them.
⚡

Quick Links

Free patching for your first 200 endpoints, Action1 (Sponsor)

Action1 - patching that just works, first 200 endpoints are free forever. No feature limits, No credit card. No catch. Activate 200 Free Endpoints
Spain arrests suspected hacktivists for DDoSing govt sites (2 minute read)

Spanish Civil Guard arrested four alleged members of "Anonymous Fénix" for conducting DDoS attacks against government ministries and public institutions.
Multiple Zero-Day Flaws in PDF Platforms Enable XSS and One-Click Attacks (2 minute read)

Novee Security disclosed 16 zero-day vulnerabilities across Foxit and Apryse PDF platforms.
Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens (2 minute read)

A typosquatted NuGet package named "StripeApi.Net" impersonated the legitimate Stripe.net library with artificially inflated download counts (~180K across 506 versions) and silently exfiltrated Stripe API tokens while maintaining full payment processing functionality to avoid detection.

Love TLDR? Tell your friends and get rewards!

Share your referral link below with friends to get free TLDR swag!
Your referral link
Track your referrals here.

Want to advertise in TLDR? 📰

If your company is interested in reaching an audience of cybersecurity professionals and decision makers, you may want to advertise with us.

Want to work at TLDR? 💼

Apply here, create your own role or send a friend's resume to jobs contact and get $1k if we hire them! TLDR is one of Inc.'s Best Bootstrapped businesses of 2025.

If you have any comments or feedback, just respond to this email!

Thanks for reading,
Prasanna Gautam, Eric Fernandez & Sammy Tbeile


More templates

Today's Deals: 💰 $800 OFF! Nearity Conference Camera w/ 15x Hybrid Zoom & More!

Today's Deals: 💰 $800 OFF! Nearity Conference Camera w/ 15x Hybrid Zoom & More!

Fresh undies are waiting (in new spring colors)

Fresh undies are waiting (in new spring colors)

New Looks Just In!

New Looks Just In!

See what's on sale + get an extra 40% off

See what's on sale + get an extra 40% off

Templ8Templ8

Professional email template builder for modern teams. Design beautiful, responsive emails in minutes.

support@templ8.email

Product

  • Features
  • Templates
  • Integrations
  • Pricing
  • Explore

Use Cases

  • Marketing
  • Newsletters
  • Transactional
  • Onboarding
  • Events

Company

  • Contact Us
  • Privacy Policy
  • Terms of Service
  • DMCA Policy
  • Brand Removal
  • Refund Policy

Resources

  • System Status

© 2026 Templ8. All rights reserved.

TwitterAll systems operational
Made with care in Netherlands
Templ8Templ8