SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

Johannes B. Ullrich
undefined
Aug 12, 2025 • 7min

SANS Stormcast Tuesday, August 12th, 2025: Erlang OTP SSH Exploits (Palo Alto Networks); Winrar Exploits; Netscaler Exploits; OpenSSH Pushing PQ Crypto;

Discover the latest cyber vulnerabilities that are causing a stir in the security world, including a critical exploit in Erlang/OTP SSH and active attacks on WinRAR. Learn how threat actors are capitalizing on Citrix Netscaler vulnerabilities and what patches are necessary to protect against them. Also, dive into OpenSSH's forward-thinking approach to quantum-safe encryption, signaling a significant leap in future cybersecurity measures. Stay informed and secure in an evolving threat landscape!
undefined
Aug 11, 2025 • 7min

SANS Stormcast Monday, August 11th, 2025: Fake Tesla Preorders; Bad USB Cameras; Win-DoS Epidemic

Beware of fake Tesla websites tricking users into sharing credit card information for nonexistent preorders. In a shocking twist, compromised USB devices can act like keyboards to inject malicious commands. Additionally, learn about a concerning epidemic where internet-exposed domain controllers are exploited for powerful denial of service attacks, emphasizing the need for strong security measures. Stay informed and protect yourself from these modern cyber threats!
undefined
Aug 8, 2025 • 24min

SANS Stormcast Friday, August 8th, 2025:: ASN43350 Mass Scans; HTTP1.1 Must Die; Hyprid Exchange Vuln; Sonicwall Update; SANS.edu Research: OSS Security and Shifting Left

Wellington Rampazo, an information security expert with two decades in the field and recent master’s grad, enlightens listeners with crucial cybersecurity insights. He discusses the alarming rise of mass scanning from ASN 43350 and how organizations can defend against it. The conversation also dives into critical vulnerabilities in HTTP/1.1 and Microsoft Exchange Servers, emphasizing the need for swift updates. Finally, Rampazo shares vital research on improving open-source software security, advocating for developers to shift their awareness and practices to mitigate risks.
undefined
4 snips
Aug 7, 2025 • 5min

SANS Stormcast Thursday, August 7th, 2025: Sextortion Update; Adobe and Trend Micro release emergency patches

Sextortion scams are making a disturbing comeback in 2025, with some crypto addresses still receiving deposits. The Akira ransomware group is leveraging legitimate drivers for privilege escalation, raising alarms about this tactic. Emergency patches have been issued by Adobe for a critical vulnerability in Experience Manager after a proof-of-concept exploit surfaced. Similarly, Trend Micro has responded to an actively exploited vulnerability in their Apex One management console. Cybersecurity vigilance is more crucial than ever!
undefined
4 snips
Aug 6, 2025 • 8min

SANS Stormcast Wednesday, August 6th, 2025: Machinekeys and VIEWSTATEs; Perplexity Unethical Learning; SonicWall Updates

The discussion delves into the dangers of lost Machine Keys and how they can be exploited for code execution through VIEWSTATE vulnerabilities in .NET. It unveils Perplexity's sneaky tactics of using stealthy crawlers to bypass website no-crawl rules. Additionally, recent threats targeting Gen 7 SonicWall firewalls with enabled SSLVPN are analyzed, highlighting a surge in cyber incidents that require attention and swift mitigation strategies.
undefined
Aug 5, 2025 • 7min

SANS Stormcast Tuesday, August 05, 2025: Daily Trends Report; NVidia Triton RCE; Cursor AI Misconfiguration

Discover daily cybersecurity trends and how to stay one step ahead of emerging threats. An alarming vulnerability in NVIDIA's Triton servers may expose users to remote code execution. Plus, learn about the risks tied to misconfigurations in Cursor AI, which could allow attackers to exploit developer machines. Tune in for insights into safeguarding technology in a rapidly evolving digital landscape!
undefined
5 snips
Aug 4, 2025 • 5min

SANS Stormcast Monday, August 4th, 2025: Legacy Protocols; Sonicwall SSL VPN Possible 0-Day;

This episode highlights troubling cybersecurity trends, including unusual SSH scans targeting a legacy user, hinting at vulnerabilities in outdated systems. A possible 0-day vulnerability in Sonicwall SSL VPN devices used by ransomware groups raises urgent concerns. Additionally, a stealthy PAM-based Linux backdoor has emerged, evading detection by anti-malware solutions for over a year. Experts discuss the need for vigilance in monitoring authentication settings to mitigate risks.
undefined
Aug 1, 2025 • 6min

SANS Stormcast Friday, August 1st, 2025: Scattered Spider Domains; Excel Blocking Dangerous Links; CISA Releasing Thorium Platform

Explore the fascinating world of cyber threats with a deep dive into Scattered Spider's tactics and related domains. Discover Excel's upcoming changes that block links to dangerous file types for enhanced security. Plus, learn about CISA's release of Thorium, a new open-source platform for malware analysis, designed to bolster defenses against cyber attacks. Stay informed and protect yourself in an ever-evolving digital landscape!
undefined
Jul 31, 2025 • 7min

SANS Stormcast Thursday July 31st, 2025: Firebase Security; WebKit Vuln Exploited; Scattered Spider Update

Discover key lessons from a recent breach of the Tea app, highlighting Firebase security pitfalls. Learn how a newly patched WebKit vulnerability was quickly exploited in Google Chrome, raising eyebrows in the tech community. The update on Scattered Spider reveals their evolving tactics, including impersonating helpdesks, making them a formidable adversary. Tune in for essential strategies to manage cybersecurity crises and combat social engineering threats.
undefined
Jul 30, 2025 • 7min

SANS Stormcast Wednesday July 30th, 2025: Apple Updates; Python Triage; Papercut Vuln Exploited

Apple has rolled out a massive update fixing 89 vulnerabilities across its operating systems, highlighting serious risks tied to WebKit. Meanwhile, a savvy Python script has been introduced to aid in efficiently searching for compromise indicators in files, even compressed ones. The podcast also sheds light on a papercut vulnerability that has been officially added to the list of known exploited vulnerabilities, emphasizing the critical need for regular software updates to avoid significant security risks.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app