SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Wednesday, April 8th, 2026: Pivoting for Webshells; WatchGuard Firebox Patch; Project Glasswing; Kubernetes Misconfigurations

Apr 8, 2026
Scans searching for web shell filenames and why attackers favor WordPress-like names. How to detect malicious web shells beyond simple filename lists. A WatchGuard Firebox path traversal flaw that can enable arbitrary file writes. Anthropic's Project Glasswing giving vendors AI access to find vulnerabilities earlier. Real-world Kubernetes attacks from misconfigurations and stolen CI/CD credentials.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Attackers Probe Hundreds Of Web Shell Names

  • Attackers scan widely for many web shell filenames rather than a single name.
  • Johannes Ulrich saw four Microsoft-cloud IPs probe ~280 specific web‑shell filenames across sensors, including WordPress‑style paths.
ADVICE

Monitor For New Files Not Just Known Shells

  • Do monitor for new or unexpected files rather than only matching known web shell filenames.
  • Johannes recommends file‑system monitoring because attackers use large, changing lists (he saw ~280 names).
ANECDOTE

WatchGuard Firebox Arbitrary File Write Example

  • WatchGuard disclosed a Firebox web UI path‑traversal that allows authenticated arbitrary file write and execution.
  • Johannes notes authentication is required to exploit, but written files can be placed in executable locations so patching is needed.
Get the Snipd Podcast app to discover more snips from this episode
Get the app