
ISC StormCast for Tuesday, May 10th, 2022
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
00:00
How to Recover From a False Positive Tetrickerd on a Micro Soft Ege Up Date File
The x f five oth token hater is, as the name condt implies, usually used for authenication. Link in the show notes to a python script published by horizon three a i that's the group that initially found the exploit here. Remember to not just patch your big systems, but make sure that this a pi is not exposed to deveral. Enemy have another issue with tenant separation in macrasos jure service and micrasoft jure snaps.
Play episode from 02:41
Transcript


