SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

Johannes B. Ullrich
undefined
5 snips
Jan 27, 2025 • 6min

SANS ISC Stormcast, Jan 27, 2025: Access Brokers; Llama Stack Vuln; ESXi SSH Tunnels; Zyxel Boot Loops; Subary StarLeak

Cybercriminals are using access brokers to maintain a persistent grip on compromised networks, raising significant security concerns. A critical vulnerability in Meta's Llama Stack highlights the need for robust mitigation strategies. The discussion also covers how to defend against ESXi ransomware and the importance of SSH tunneling. Additionally, a flaw in Subaru's Starlink system puts vehicles at risk of remote hacking, prompting urgent resolution measures. Tune in for insights on these pressing cybersecurity issues!
undefined
7 snips
Jan 24, 2025 • 15min

SANS ISC Stormcast, Jan 24, 2025: XSS in Email, SonicWall Exploited; Cisco Vulnerablities; AI and SOAR (@sans_edu research paper by Anthony Russo)

In this discussion, Anthony Russo, U.S. team lead for security operations at Atlassian, shares insights on using AI for SOAR platforms. He highlights recent XSS attacks targeting webmail and the essential patches from SonicWall and Cisco to address critical vulnerabilities. Russo also delves into the integration of AI in automating security operations and the potential of large language models like ChatGPT in enhancing cybersecurity. However, he stresses the importance of understanding AI limitations and ensuring effective automation.
undefined
5 snips
Jan 22, 2025 • 8min

SANS ISC Stormcast, Jan 23, 2025: PFSync Protocol; Oracle CPU; Korean VPN Supply Chain Attack; Ivanti Guidance

Discover the intricacies of the PFSync protocol, crucial for synchronizing firewall states during failover scenarios. Delve into Oracle's latest critical patch release that targets multiple vulnerabilities. Uncover a sophisticated supply chain attack on a Korean VPN service, revealing significant security implications. Explore the challenges of VPN configuration and the urgent need for enhanced security measures regarding Ivanti. Stay informed with effective strategies to protect critical infrastructure from emerging threats.
undefined
4 snips
Jan 22, 2025 • 9min

SANS ISC Stormcast, Jan 22, 2025: Geolocation via Starlink and Cloudflare; AI Prompt Risks; Homebrew Phishing

Explore the unsettling geolocation risks for Starlink users, revealing how satellite internet could expose sensitive data. Learn about Cloudflare's role in potentially deanonymizing individuals by tracking cached content. Delve into alarming incidents where AI assistants leak confidential customer information due to careless prompts. Finally, discover the rising threat of phishing attacks targeting Mac users, underscoring the urgent need for better data protection and user training.
undefined
6 snips
Jan 21, 2025 • 6min

SANS ISC Stormcast, Jan 21, 2025: Downloading Partial ZIP files; Remote Tools Used in Attakcs; Azure DevOps SSRF

Explore the cunning tactics behind partial ZIP file downloads that help attackers sneak past security checks. Learn about the Ukrainian CERT's urgent advice on thwarting threats linked to AnyDesk remote access. Delve into the risky SSRF vulnerabilities discovered within Azure DevOps, revealing how they can be exploited by cybercriminals. This discussion highlights the importance of maintaining awareness against social engineering and unauthorized access in today's digital landscape.
undefined
4 snips
Jan 20, 2025 • 3min

SANS ISC Stormcast, Jan 20, 2025: Honeypots for Offense; SimpleHelp and UEFI Secure Boot Vulnerabilities

Explore the intriguing world of honeypots and how they can extend the life of offensive security operations. Discover three critical vulnerabilities in SimpleHelp that urgently need patching to avert exploitation. Dive into the alarming findings about a new flaw that allows UEFI Secure Boot bypass, potentially putting countless systems at risk. Stay ahead of the curve in cybersecurity by understanding these pressing issues.
undefined
9 snips
Jan 17, 2025 • 13min

SANS ISC Stormcast, Jan 17, 2025: Analyzing Complex Datasets, Citrix Update Issues, Ivanti's Security Advisory, and the Future of Passkeys (@sans_edu)

Rich Green, a SANS.edu graduate student and senior solutions engineer, dives into the transformative world of passkeys, highlighting their potential to enhance security beyond traditional passwords. He shares insights from his research on the cryptographic methods underlying passkeys and the challenges of implementing them in legacy systems. The discussion also addresses the latest issues with Citrix's Session Recording Agent and Ivanti's security advisories, offering a glimpse into the evolving landscape of cybersecurity.
undefined
11 snips
Jan 16, 2025 • 9min

SANS ISC Stormcast, Jan 16, 2025: Critical Vulnerabilities and Cybersecurity Updates You Need to Know

A long-neglected vulnerability in Netgear routers is back in the spotlight, with attackers exploiting it to deploy crypto miners. There's a critical flaw in Google's OAuth that threatens sensitive data through defunct domains. Rsync also faces urgent security issues that require immediate patching. Meanwhile, Fortinet's advisory nudges the importance of updating firmware to secure defenses. Explore these pressing concerns and fortify your cybersecurity today!
undefined
9 snips
Jan 15, 2025 • 8min

SANS ISC Stormcast, Jan 14 2025: Microsoft Patch Tuesday, FortiOS and FortiProxy Patches; Paessler PRTG Patches

Microsoft's latest Patch Tuesday updates reveal 209 fixed vulnerabilities, including critical ones that have been actively exploited. The discussion highlights specific risks these vulnerabilities pose to network security. Fortinet raises alarms about an unpatched Node.js authentication bypass that could grant attackers super-admin privileges on FortiOS devices. The podcast also emphasizes the importance of securing admin interfaces and managing software vulnerabilities effectively.
undefined
8 snips
Jan 13, 2025 • 8min

SANS ISC Stormcast, Jan 14, 2025: Brute-Forcing Hikvision Devices, macOS SIP Bypass, Linux Rootkits, Aviatrix Exploits, and AWS Ransomware Tactics

Discover the vulnerabilities plaguing Hikvision IP cameras as attackers exploit flawed password reset systems. Learn about a critical macOS flaw that allows system integrity to be bypassed through kernel extensions. Delve into a sophisticated Linux rootkit that remotely controls systems using zero-day vulnerabilities. Lastly, unravel a new ransomware scheme that targets AWS S3 buckets, leveraging SSE-C encryption to lock down data, highlighting the urgent need for protective measures and timely patching.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app