SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Friday, October 17th, 2025: New Slack Workspace; Cisco SNMP Exploited; BIOS Backdoor; @sans_edu reseach: Active Defense

Oct 17, 2025
Mark Stephens, a cybersecurity architect at Cisco and an MSISE graduate, dives deep into active defense strategies in this discussion. He emphasizes the significance of detecting adversaries within networks using techniques like MITRE Engage. Topics include recent exploitation of a patched Cisco SNMP flaw and the discovery of a BIOS backdoor. Mark shares insights on using deception through honeytokens and honeypots for early detection, while also stressing the importance of continuously updating defenses to thwart evolving threats.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ADVICE

Replace Misconfigured Slack Workspace Quickly

  • Move your Slack community to a new workspace if the provider misconfigures your account to an unsuitable tier.
  • Notify users and update links quickly before deleting the old workspace to avoid disruption.
INSIGHT

SNMP Exploit Undermined Network Isolation

  • A Cisco SNMP vulnerability (CVE-2025-20352) was exploited in the wild soon after patch release, targeting older devices without ASLR.
  • Attackers used switch access to break network isolation and deploy rootkits, enabling persistent backdoors.
INSIGHT

Pre-Boot Shells Can Act As Persistent Backdoors

  • Framework laptop BIOS shells include an mm command that can read/write memory before OS boot.
  • That pre-boot access can override security checks and persist changes, effectively acting like a backdoor.
Get the Snipd Podcast app to discover more snips from this episode
Get the app