

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minute long, summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Stormcenter. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
Episodes
Mentioned books

11 snips
Jan 29, 2026 • 6min
SANS Stormcast Thursday, January 29th, 2026: WebLogic AI Slop; Fortinet Patches; WebLogic AI Slop; Fortinet Patches
Discussion of a CVSS 10 Oracle WebLogic vulnerability and odd nonfunctional exploit attempts seen in honeypot logs. Coverage of an AI-generated exploit circulating on GitHub and the risks of relying on AI-crafted signatures. Update on Fortinet SSO patches rolling out and debate over re-enabling SSO. Brief note on SolarWinds Web Help Desk remote code execution flaws and other recent patches.

11 snips
Jan 28, 2026 • 8min
SANS Stormcast Wednesday, January 28th, 2026: Romance Scams; DoS Vuln in React Server Components; OpenSSL Patch; Kubernetes Priv Confusion
A run-through of how romance scams begin with misrouted texts and why victims often resist admitting they were targeted. A look at ongoing React Server Components fixes that address denial-of-service issues. Rundown of OpenSSL monthly updates correcting a potential remote code execution risk. Examination of Kubernetes Helm chart permission confusion that can enable node/proxy remote code execution.

10 snips
Jan 27, 2026 • 6min
SANS Stormcast Tuesday, January 27th, 2026: PWD scanning; MSFT Office OOB Patch; Exposed Clawdbot
Scanners are appending pwd output to web URLs to hunt for exposed OS paths and config files. A new out-of-band Microsoft Office patch fixes an actively exploited COM/OLE bypass. Many CloudBot instances are left exposed without access control, risking full remote takeover. Brief notes on Apple updates and recommended mitigations round out the discussion.

6 snips
Jan 26, 2026 • 4min
SANS Stormcast Monday, January 26th, 2026: FortiOS SSO Vuln Updates; Outlook OOB Update; VMware vCenter Exploited
A rundown of a FortiOS SAML single-sign-on bypass and why any SAML integration can be at risk. Discussion of a Microsoft out-of-band Outlook update that fixes issues from recent patches. Coverage of VMware vCenter vulnerabilities that are now being actively exploited and advice on avoiding publicly exposed admin interfaces.

9 snips
Jan 23, 2026 • 7min
SANS Stormcast Friday, January 23rd, 2026: Scanning AI Code; FortiGate Update; ISC BIND DoS; Trivial SmaterMail Vulnerability
Is AI-generated code secure? A review reveals it can have minor issues even with advanced assistance. Attackers exploit vulnerabilities in FortiGate devices through SSO accounts, leading to significant risks. A new ISC BIND flaw can crash systems using specific Drone ID records. Additionally, SmarterMail has a concerning vulnerability allowing admin password resets without prior authentication. These topics highlight the constant battle against evolving security threats.

5 snips
Jan 22, 2026 • 7min
SANS Stormcast Thursday, January 22nd, 2026: Visual Studio Code Scripts; Cisco Unified Comm and Zoom Vuln; Insufficient Fortinet Patch; SANS SOC Survey
Visual Studio Code can automatically execute scripts, raising concerns about trusting source code. A critical remote code execution vulnerability in Cisco Unified Communications products leaves systems open to attack. Meanwhile, a command injection flaw in Zoom's multimedia routers has been patched, but not before posing risks to users. Discussions around a potential bypass for Fortinet's single sign-on have emerged, urging caution while awaiting fixes. Additionally, insights from the latest SOC survey are solicited to enhance cybersecurity practices.

Jan 21, 2026 • 7min
SANS Stormcast Wednesday, January 21st, 2026: Punycode Hunting; telnetd vuln; 6 day Certs and IP Certs; Oracle Patches
Explore the intriguing world of Punycode and its role in threat hunting, as experts suggest looking for specific patterns in DNS logs to sniff out impersonation attempts. Uncover critical vulnerabilities in legacy telnetd, where an authentication bypass could lead to serious security breaches. Discover the introduction of six-day certificates by Let’s Encrypt, particularly for IP addresses, and hear about Oracle's latest patch update that addresses a staggering 337 vulnerabilities. Stay informed and secure!

4 snips
Jan 20, 2026 • 6min
SANS Stormcast Tuesday, January 20th, 2026: Scans Against LLMs; NTLM Rainbow Table; OOB MSFT Patch
Attackers are using clever queries to scan and fingerprint exposed LLMs. Mandiant has released rainbow tables for the outdated Net-NTLMv1 protocol to expedite its deprecation. A recent out-of-band update from Microsoft addresses critical issues from the January security patch, affecting multiple Windows versions. Additionally, a new exploit technique involving Google Calendar and Gemini allows for the sneaky exfiltration of future meeting summaries. These insights highlight the ongoing challenges in cybersecurity.

5 snips
Jan 16, 2026 • 7min
SANS Stormcast Friday, January 16th, 2026: Cryptojacking Hidden Gifts; Bluetooth Vulnerability; Reprompt in MSFT Copilot
Discover the hidden dangers of cryptojacking, where miners use SSH backdoors to exploit systems. Learn about a flaw in Google's Fast Pair protocol that allows nearby devices to hijack Bluetooth accessories. Explore how Microsoft Copilot prompts can be manipulated through clever URL tricks, potentially misleading users. This episode highlights the risks of social engineering and emphasizes the need for vigilance when clicking links. Tune in for essential cybersecurity insights!

4 snips
Jan 15, 2026 • 6min
SANS Stormcast Thursday, January 15th, 2026: Luma Streal Repeat Infection; ServiceNow Broken Auth; Starlink/GPS Jamming
Luma Stealer is causing chaos by repeatedly adding scheduled tasks to download malicious payloads. An alarming flaw in ServiceNow, dubbed 'BodySnatcher', exposes the risk of broken authentication due to shared credentials. Meanwhile, in Iran, GPS spoofing has disrupted Starlink services, raising questions about satellite positioning limits. A proposed fix suggests leveraging Starlink satellites for better location accuracy to counteract such interference. Tune in for an insightful analysis of these pressing cybersecurity issues!


