

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minute long, summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Stormcenter. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
Episodes
Mentioned books

Sep 13, 2024 • 5min
ISC StormCast for Friday, September 13th, 2024
A recent compromise of an old .mobi whois server sheds light on the cybersecurity risks tied to forgotten domains. The podcast discusses Microsoft's new security innovations, including the implementation of post-quantum cryptography to safeguard Windows customers. Additionally, a critical update for GitLab is highlighted, addressing a severe remote code execution vulnerability. The necessity for vigilant data validation and management post-expiration is emphasized, showcasing the importance of proactive security measures in today's digital landscape.

Sep 11, 2024 • 6min
ISC StormCast for Wednesday, September 11th, 2024
The hosts dive into urgent cybersecurity vulnerabilities impacting Microsoft, highlighting risks of remote code execution. A critical issue in ColdFusion also gets attention. The importance of timely patching is stressed, especially with notable updates from Microsoft, Adobe, and Ivanti. Listeners are advised on best practices for vulnerability management, considering upcoming changes to the podcast schedule.

Sep 10, 2024 • 4min
ISC StormCast for Tuesday, September 10th, 2024
Explore critical cybersecurity vulnerabilities, including a high-risk flaw in Loadmaster with a CVSS score of 10. Urgent patches for HAProxy and SonicWall SSL VPN are highlighted. The discussion dives into Akira ransomware targeting specific accounts and a severe Kibana deserialization vulnerability. Additionally, it examines how Stately Taurus abuses Visual Studio Code for espionage, shedding light on the complexity of these attacks that exploit legitimate software features.

Sep 9, 2024 • 6min
ISC StormCast for Monday, September 9th, 2024
Discover the shocking energy consumption of password cracking using Hashcat and how a new Python plugin enhances Notepad++. Dive into the murky waters of fake LinkedIn job ads used by North Korea to distribute malware. Learn about a sneaky new Android malware that strips crypto wallet passphrases right from your device. Plus, be wary of a sneaky sextortion scam that leverages victims' spouses' names as bait, highlighting the critical need for vigilance in online security.

Sep 6, 2024 • 6min
ISC StormCast for Friday, September 6th, 2024
Discover how enriching log data from honeypots can unveil malicious activities. Learn about critical vulnerabilities in Veeam's service provider console and the urgent need for updates. Delve into major security flaws in the OF Biz CRM suite, including a dangerous unauthenticated remote code execution issue. Plus, find out about essential patches for Cisco’s Smart License Manager that highlight the importance of keeping software up-to-date. These discussions shed light on protecting against evolving cyber threats.

Sep 5, 2024 • 7min
ISC StormCast for Thursday, September 5th, 2024
The talk dives into a recently identified vulnerability in the Moodle learning platform that has caught the attention of cybersecurity experts. Listeners learn about the alarming risks associated with the PyPi repository, where a technique has exposed around 22,000 packages. The discussion also highlights important updates regarding Android security patches and a new proof-of-concept exploit targeting MediaTek chipsets. It's a deep dive into current threats and protective measures in the digital landscape.

Sep 4, 2024 • 7min
ISC StormCast for Wednesday, September 4th, 2024
Discover how to protect OOXML text documents while navigating the world of sextortion scams that now include personal photos. Learn about newly uncovered vulnerabilities in D-Link routers and the potential risks of OS command injection. The conversation delves into critical issues like VMWare privilege escalation and a YubiKey sidechannel attack, emphasizing the importance of regular firmware updates to combat these emerging cybersecurity threats.

Sep 3, 2024 • 6min
ISC StormCast for Tuesday, September 3rd, 2024
Discover the latest in Wireshark as new features simplify filtering, though risks remain with open-source collaboration. Learn about malicious GitHub comments that could spread malware and the chilling effects of Voldemort malware threatening organizations via tax authority impersonation. Dive into a critical Jenkins vulnerability that enables remote code execution, highlighting the urgent need for enhanced cybersecurity measures. Stay informed and prepared for the ever-evolving digital landscape!

Aug 30, 2024 • 14min
ISC StormCast for Friday, August 30th, 2024
Discover the intricate world of cybersecurity threats, from live patching DLLs with Python to the latest in BlackByte ransomware. Dive into phishing tactics targeting VPN users and the risks of exposed GenAI services. Learn about the challenges in spotting malicious activities amid legitimate admin actions and how understanding context is vital for effective threat detection. Plus, explore the importance of change control practices in crucial sectors like healthcare and the need for standardized tools to bolster security measures.

Aug 29, 2024 • 6min
ISC StormCast for Thursday, August 29th, 2024
Explore innovative ways to analyze IP activity over time using Vega-Lite and Kibana. Discover the latest attack tool updates that disrupt Windows systems. Delve into the troubling connection between Iranian cyber actors and ransomware targeting US organizations. Learn about Confluence vulnerabilities exploited for crypto mining and the risks associated with hard-coded credentials in Fortra's products. Stay informed about the evolving cybersecurity landscape and the critical need for robust defenses.


