
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minute long, summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Stormcenter. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
Latest episodes

9 snips
Jan 15, 2025 • 8min
SANS ISC Stormcast, Jan 14 2025: Microsoft Patch Tuesday, FortiOS and FortiProxy Patches; Paessler PRTG Patches
Microsoft's latest Patch Tuesday updates reveal 209 fixed vulnerabilities, including critical ones that have been actively exploited. The discussion highlights specific risks these vulnerabilities pose to network security. Fortinet raises alarms about an unpatched Node.js authentication bypass that could grant attackers super-admin privileges on FortiOS devices. The podcast also emphasizes the importance of securing admin interfaces and managing software vulnerabilities effectively.

8 snips
Jan 13, 2025 • 8min
SANS ISC Stormcast, Jan 14, 2025: Brute-Forcing Hikvision Devices, macOS SIP Bypass, Linux Rootkits, Aviatrix Exploits, and AWS Ransomware Tactics
Discover the vulnerabilities plaguing Hikvision IP cameras as attackers exploit flawed password reset systems. Learn about a critical macOS flaw that allows system integrity to be bypassed through kernel extensions. Delve into a sophisticated Linux rootkit that remotely controls systems using zero-day vulnerabilities. Lastly, unravel a new ransomware scheme that targets AWS S3 buckets, leveraging SSE-C encryption to lock down data, highlighting the urgent need for protective measures and timely patching.

10 snips
Jan 13, 2025 • 7min
SANS ISC Stormcast, Jan 13, 2025: Defender Updates, Ivanti RCE, Apple USB-C Hack and more
In the latest discussions, Windows Defender enhances its ability to detect malicious Chrome extensions, bolstering enterprise security. Attackers are using embedded OLE files in Office documents to evade detection, prompting new combat tools. A serious vulnerability in Ivanti's software raises concerns, while researchers reveal a hack of Apple's USB-C controller, exposing hardware security issues. With tax season approaching, there's a push for taxpayers to secure their IP PIN to prevent identity theft.

4 snips
Jan 10, 2025 • 7min
SANS ISC Stormcast: Cryptomining Malware, Fake PoC Exploit, Malicious Browser Extensions, and Palo Alto Vulnerabilities. Jan 9th 2024
Delve into the world of cyber threats with insights into Redtail, a sophisticated cryptomining malware that uses advanced tactics to exploit vulnerabilities. Discover how malicious browser extensions manipulate search results to deceive users. Learn about a sneaky information stealer posing as a proof of concept exploit, preying on those testing vulnerabilities. Also, uncover critical vulnerabilities in the Palo Alto Networks' Expedition tool that could expose credentials and allow unauthorized commands.

4 snips
Jan 9, 2025 • 6min
SANS ISC Stormcast, Jan 9, 2025: Critical Vulnerabilities in Ivanti, Aviatrix, and Hijacked Backdoors in Compromised Systems
Explore critical vulnerabilities affecting Ivanti Connect Secure and Policy Secure, with insights on urgent security updates. Discover the alarming command injection risks in Aviatrix Network Controllers, which allow for unauthorized code execution. Dive into the innovative tactics of researchers hijacking abandoned domains linked to backdoors, revealing new threats to system security. This information emphasizes the importance of staying vigilant in an ever-evolving cyber landscape.

6 snips
Jan 8, 2025 • 7min
SANS ISC Stormcast, Jan 8, 2025: Critical Vulnerabilities in SonicWall, Moxa, and Windows BitLocker – Plus, Malware Targets PHP Servers and the Launch of U.S. Cyber Trust Mark
Discover the alarming exploitation of a zero-day vulnerability in SonicWall SSL-VPN devices. Unearth security flaws in Moxa routers that allow privilege escalation. Learn about the new cryptocurrency mining malware targeting PHP servers. Meanwhile, the White House introduces the U.S. Cyber Trust Mark, aiming to help consumers identify secure connected devices. This insightful discussion emphasizes the importance of patch management and informed decisions in cybersecurity.

Jan 7, 2025 • 5min
ISC StormCast for Tuesday, January 7th, 2025
Explore the latest critical vulnerabilities shaking up cybersecurity, including the alarming 'RegreSSHion' flaw affecting OpenSSH and a bypass vulnerability in Nuclei. Learn how malware cleverly adapts to evade detection in analysis environments, stressing the importance of replicating operational settings. Additionally, discover the risks surrounding fake exploits targeting researchers and the urgent need for timely updates on software like BeyondTrust. Tune in for essential patching strategies and insights into managing emerging threats!

9 snips
Jan 6, 2025 • 8min
ISC StormCast for Monday, January 6th, 2025
Discover the latest cybersecurity threats, including malware delivered via Python scripts. Learn about critical vulnerabilities affecting ASUS routers and important updates in SSL/TLS protocols. Explore goodware hash sets and their role in enhancing security. The discussion highlights the need for vigilance in defense strategies as hackers continue to evolve their tactics. Stay informed to safeguard your systems!

20 snips
Dec 20, 2024 • 6min
ISC StormCast for Friday, December 20th, 2024
Delve into alarming cybersecurity threats, including the recent Antrox ghost malware exploit and Mirai attacks on smart routers. Discover how default passwords are leaving systems vulnerable. There’s also a spotlight on significant vulnerabilities in FortiWLM and updates on the BadBox botnet. As the holiday season approaches, experts stress the importance of vigilance with new devices hitting the market.

12 snips
Dec 19, 2024 • 7min
ISC StormCast for Thursday, December 19th, 2024
Dive into the world of TeamTNT as they exploit web servers, leaving behind stealthy malware. Discover the alarming rise of social engineering attacks targeting Okta users and what that means for security. The discussion also touches on possible regulations for TP-Link routers due to cybersecurity threats. Finally, catch up on CISA’s latest best practices for mobile communications, ensuring you're equipped to handle evolving cyber risks.
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.