SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Thursday, December 4th, 2025: CDN Headers; React Vulnerabiity; PickleScan Patch

7 snips
Dec 4, 2025
Honeypots reveal scans with CDN headers, highlighting attempts by attackers to bypass these defenses. A critical vulnerability in React server components has been patched, but exploitation may occur soon. Additionally, PickleScan, a tool for AI model security, has addressed three significant vulnerabilities, ensuring safer PyTorch models. The discussion dives into the implications of these security issues, making the stakes clearer for developers and cybersecurity professionals.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

CDN Bypass Is A Real Risk

  • Many attackers try to bypass CDNs by connecting directly to origin servers once the origin IP is discovered.
  • Reliance on CDN-added headers for protection can fail if checks are predictable or incomplete.
ADVICE

Validate CDN Headers Properly

  • Do validate CDN headers using unpredictable values and reject requests that lack them.
  • Also verify whether traffic truly passed the CDN rather than trusting header presence alone.
ADVICE

Patch React Server Components Now

  • Patch React server components immediately because a critical deserialization flaw was disclosed and fixed today.
  • Assume compromise and respond quickly since public, reliable exploits are likely or already circulating.
Get the Snipd Podcast app to discover more snips from this episode
Get the app