

ISC StormCast for Tuesday, November 14th, 2023
Nov 14, 2023
Explore how DNS logs can reveal command and control channels used by attackers. Learn about serious vulnerabilities in SSH that could compromise security. Delve into the risks of faulty signatures in RSA algorithms and their effects on secret key protection. The importance of updating server secret keys and engaging clients in new security measures is also emphasized. Additionally, discover how recent Juniper vulnerabilities have been exploited, potentially leading to remote code execution.
Chapters
Transcript
Episode notes