SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

Johannes B. Ullrich
undefined
Jul 3, 2025 • 5min

SANS Stormcast Thursday July 3rd, 2025: sudo problems; polymorphic zip files; cisco vulnerablity

Local users can exploit a vulnerability in the Linux sudo command to gain root access, raising significant security concerns. The podcast also delves into polymorphic zip files, which can yield different data during extraction, depending on the tool used. Additionally, there's a critical flaw in Cisco's Unified Communications Manager that allows attackers to access devices using unchangeable default credentials. These discussions emphasize the importance of patching and understanding security vulnerabilities in modern software.
undefined
6 snips
Jun 30, 2025 • 7min

SANS Stormcast Monday June 30th, 2025: Scattered Spider; AMI BIOS Exploited; Secure Boot Certs Expiring; Microsoft Resliliency Initiative

The podcast dives into the latest from the hacking group Scattered Spider, focusing on their dangerous social engineering tactics targeting airlines. A serious vulnerability in AMI BIOS is also highlighted, as it's currently being exploited. Listeners are reminded of the impending expiration of Secure Boot certificates, which is crucial for operating system security. Finally, Microsoft unveils its Resiliency Initiative, emphasizing enhanced security while introducing changes that could affect security tool functionality.
undefined
Jun 27, 2025 • 7min

SANS Stormcast Friday, June 27th, 2025: Open-VSX Flaw; Airoha Bluetooth Vulnerablity; Critical Cisco Identity Service Engine Vuln;

Developers beware: a flaw in the Open-VSX extension marketplace could jeopardize every extension available. Bluetooth vulnerabilities in the Airoha chipset may allow eavesdropping on personal devices, raising alarms about privacy. Additionally, critical weaknesses in Cisco's Identity Services Engine could enable remote attackers to gain root access. Learn about the growing threat landscape and upcoming events aimed at boosting cybersecurity awareness!
undefined
Jun 26, 2025 • 6min

SANS Stormcast Thursday, June 26th, 2025: Another Netscaler Vuln; CentOS Web Panel Vuln; IP Based Certs

A recent security bulletin revealed a critical memory overflow vulnerability in Citrix's NetScaler, posing denial of service risks if unpatched. Meanwhile, CentOS Web Panel faces a serious remote code execution flaw that allows file uploads from users. The ongoing battle against vulnerabilities continues with Gogs' insufficient patch for file deletion exploits. On a progressive note, Let's Encrypt is preparing to issue IP address-based certificates, a game-changer for TLS certification that helps devices without hostnames.
undefined
7 snips
Jun 25, 2025 • 4min

SANS Stormcast Tuesday, June 24th, 2025: Telnet/SSH Scan Evolution; Fake Sonicwall Software; File-Fix vs Click-Fix

Discover the intriguing evolution of password brute forcing over the past decade, revealing attackers' changing strategies. Learn about the alarming rise in attempts per scan, despite the consistency in password length. Delve into a new attack method called 'FileFix,' which tricks users into executing dangerous commands. Additionally, explore the trend of threat actors creating counterfeit software, like a fake Sonicwall Netextender, aimed at stealing user credentials. Stay informed on these pressing cybersecurity challenges!
undefined
Jun 24, 2025 • 5min

SANS Stormcast Tuesday, June 24th, 2025: Ichano ATHome IP Camera Scans; Netscaler Vulnerability; WinRar Vulnerability

The podcast dives into alarming scans targeting Ichano AtHome IP Cameras using easily guessable credentials like 'super_yg' and '123'. A critical vulnerability, CVE-2025-5777, is discussed regarding the Citrix Netscaler Gateway, which could put a lot of users at risk if not addressed. Additionally, the hosts reveal a concerning issue with WinRAR that could lead to remote code execution due to compromised file extraction paths. Listeners are urged to take immediate action to secure their systems.
undefined
7 snips
Jun 23, 2025 • 6min

SANS Stormcast Monday, June 23rd, 2025: ADS and Python; More Secure Cloud PCs; Zend.to Path Traversal; Parser Differentials

Explore the fascinating world of alternate data streams in NTFS with innovative tools like cut-bytes.py and filescanner. Discover how Microsoft is tightening security on Windows 365 Cloud PCs with enhanced defaults. Unpack the recent directory traversal vulnerability in zend.to and its implications for file sharing. Lastly, dive into the unexpected quirks of Go's JSON and XML parsers, revealing how they can lead to security surprises. This blend of topics provides a rich landscape of current cybersecurity challenges.
undefined
6 snips
Jun 20, 2025 • 6min

SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords

New hires beware! It only took two weeks for phishing attempts to target a fresh employee after they joined. Scammers are cunningly hijacking big-name websites to insert fake tech support numbers, leading users astray. Plus, there's a new wave of phishing focusing on academics, creatively convincing them to generate app-specific passwords for Google services. Stay alert!
undefined
8 snips
Jun 17, 2025 • 6min

SANS Stormcast Monday, June 16th, 2025: Extracting Data from JPEG; Windows Recall Export; Anubis Wiper; Mitel Vuln and PoC

Discover how to expertly extract data from JPEG files with a nifty tool, jpegdump.py. Microsoft's new Windows 11 feature allows European users to export data while managing encryption keys. Meanwhile, the Anubis ransomware takes a dark turn by wiping data even after ransom payments. Plus, critical vulnerabilities in Mitel software are discussed, highlighting the urgency for immediate security measures. Stay informed about these emerging threats and cutting-edge tech developments!
undefined
4 snips
Jun 16, 2025 • 7min

SANS Stormcast Monday, June 16th, 2025: Katz Stealer in JPG; JavaScript Attacks; Reviving expired Discord Invites for Evil

Uncover the sinister world of cyber threats as the hosts discuss malware cleverly disguised within JPEG images. They highlight an alarming trend where JavaScript obfuscation is employed on a staggering 200,000 websites to spread malware. Additionally, the revival of expired Discord invite links as traps for unsuspecting users illustrates the creative tactics cybercriminals are using to target victims. Stay alert, as the cybersecurity landscape is constantly evolving!

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app