SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

Johannes B. Ullrich
undefined
Jun 8, 2017 • 6min

ISC StormCast for Thursday, June 8th 2017

Deceptive Advertisements: What They Do And Where They Come From https://isc.sans.edu/forums/diary/Deceptive+Advertisements+What+they+do+and+where+they+come+from/22494/ Instagram as Covert Channel https://www.welivesecurity.com/2017/06/06/turlas-watering-hole-campaign-updated-firefox-extension-abusing-instagram/ Domain Shadowing Used in Rik Exploit Kit https://blogs.rsa.com/shadowfall/
undefined
Jun 6, 2017 • 5min

ISC StormCast for Wednesday, June 7th 2017

Finding XOR Keys Part 2 https://isc.sans.edu/forums/diary/Malware+and+XOR+Part+2/22490/ Instagram Stories Not Using TLS https://vvyper.com/2017/05/22/instagram-stories-ssl/ Printer "Dots" May Have Lead to Arrest of NSA Contractor http://blog.erratasec.com/2017/06/how-intercept-outed-reality-winner.html#.WTc9SMbMyRt Exfiltrating Data via Blinking LED https://arxiv.org/abs/1706.01140
undefined
Jun 6, 2017 • 7min

ISC StormCast for Tuesday, June 6th 2017

Finding XOR Keys Used To Encode Malware https://isc.sans.edu/forums/diary/Malware+and+XOR+Part+1/22486/ Citywide IMSI Discovery https://seaglass.cs.washington.edu Hijacking Country Level Domains https://thehackerblog.com/the-journey-to-hijacking-a-countrys-tld-the-hidden-risks-of-domain-extensions/index.html
undefined
Jun 5, 2017 • 8min

ISC StormCast for Monday, June 5th 2017

Phishing Campaigns for Bitcoin https://isc.sans.edu/forums/diary/Phishing+Campaigns+Follow+Trends/22482/ Mouseover May Trigger Powerpoint Macro https://www.dodgethissecurity.com/2017/06/02/new-powerpoint-mouseover-based-downloader-analysis-results/ Vault 7 "Pandemic" Tool https://wikileaks.org/vault7/document/Pandemic-1_1-S-NF/Pandemic-1_1-S-NF.pdf Mozilla Considering Move Away From OCSP https://bugzilla.mozilla.org/show_bug.cgi?id=1366100 Defending Web Application Security Minneapolis https://www.sans.org/event/minneapolis-2017 Intrusion Detection in Depth Columbia MD https://www.sans.org/event/columbia-2017/course/intrusion-detection-in-depth
undefined
Jun 2, 2017 • 11min

ISC StormCast for Friday, June 2nd 2017

Sharing Private Data With Webcast Invitations https://isc.sans.edu/forums/diary/Sharing+Private+Data+with+Webcast+Invitations/22478/ onelogin breach https://www.onelogin.com/blog/may-31-2017-security-incident Google AMP Phishing https://citizenlab.org/2017/05/tainted-leaks-disinformation-phish/ STI Student Paper: Kevin Kelly Tesla Crypt https://www.sans.org/reading-room/whitepapers/bestprac/indicators-compromise-teslacrypt-malware-37622
undefined
Jun 1, 2017 • 6min

ISC StormCast for Thursday, June 1st 2017

Analysis of Competing Hypotheses, WCry and Lazarus https://isc.sans.edu/forums/diary/Analysis+of+Competing+Hypotheses+WCry+and+Lazarus+ACH+part+2/22470/ Windows XP Not Stable Enough for WannaCry https://blog.kryptoslogic.com/malware/2017/05/29/two-weeks-later.html Mexican Biker Gang Uses Jeep Database to Steal Car https://regmedia.co.uk/2017/05/31/indictment5_30.pdf Dangers of Public WAS Snapshots https://www.nvteh.com/news/problems-with-public-ebs-snapshots
undefined
May 31, 2017 • 7min

ISC StormCast for Wednesday, May 31st 2017

FreeRADIUS Vulnerability https://isc.sans.edu/forums/diary/FreeRadius+Authentication+Bypass/22466/ Microsoft Malware Protection Engine Update http://seclists.org/microsoft/2017/q2/8 Chrome UI Bug May Allow Unnoticed Recording https://medium.com/@barzik/the-new-html5-video-audio-api-has-privacy-issues-on-desktop-chrome-5832c99c7659 AWS Auditing Tools https://summitroute.com/blog/2017/05/30/free_tools_for_auditing_the_security_of_an_aws_account/ SANS Social Denver June 14th https://pages.sans.org/denversocial
undefined
May 30, 2017 • 7min

ISC StormCast for Tuesday, May 30th 2017

Analysis of Competing Hypotheses https://isc.sans.edu/forums/diary/Analysis+of+Competing+Hypotheses+ACH+part+1/22460/ Microsoft Master File Table BSOD Exploit http://www.theregister.co.uk/2017/05/29/microsoft_master_file_table_bug_exploited_to_bsod_windows_7_81/ SMTP Split Tunnel / Transparent Proxy Exploit https://blog.securolytics.io/2017/05/split-tunnel-smtp-exploit-explained/
undefined
May 25, 2017 • 14min

ISC StormCast for Friday, May 26th 2017

Samba Remote Code Execution Vulnerability https://isc.sans.edu/forums/diary/Critical+Vulnerability+in+Samba+from+350+onwards/22452/ Pacemaker Vulnerabilities http://blog.whitescope.io/2017/05/understanding-pacemaker-systems.html Patching May have Affected Access to Australian Health Systems http://www.cairnspost.com.au/news/cairns-hospital-suffers-software-catastrophe-with-possible-loss-of-patient-data/news-story/c828de3f4a0f73132ec3d19284cbae88
undefined
May 25, 2017 • 6min

ISC StormCast for Thursday, May 25th 2017

Jaff Ransomware Gets a Makeover https://isc.sans.edu/forums/diary/Jaff+ransomware+gets+a+makeover/22446/ OpenVPN Access Server Vulnerability http://seclists.org/oss-sec/2017/q2/332 Large Credential Dumps Used in Password Brute Forcing Attacks http://info.digitalshadows.com/AccountTakeover-WhitePapersPage_Registration.html

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app