meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, April 15th, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 15 April 2022

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. CVE-2022-26809 Update/Webcast; Google Chrome 0-day; Cisco WebEx No-Mute; Grafana Enterprise

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, April 15th, 2020 edition of the Sandsenet Storm Center's Stormcast. My name is

0:09.0

Johannes Ulrich, and I'm recording from Jacksonville, Florida. Of course, the big question today

0:15.7

is what should we expect over the weekend from CVE 22-26809 the RPC vulnerability.

0:23.6

Well, there is not a ton of news which is kind of good here.

0:29.6

Now, the closest to a public exploit we have, as far as I can tell, is a tweet by Antonio

0:36.7

Kokomazzi.

0:38.1

He is going by the Ailes of Splinter code and works for Sentinel 1.

0:44.5

Antonio managed to get an exploit working, but only against a custom RPC configuration.

0:51.9

So nothing that's typically out in the wild, at least that what it

0:56.3

appears like. That's the closest we have to like I said, a public exploit. There may of course

1:03.8

be others working on exploits that are not necessarily tweeting about it. Your best bet at this

1:09.8

point is still to patch and that's where the only

1:14.0

thing that will really protect you, fire war rules and all of that. It's all nice and good,

1:19.5

but probably not going to do for you much internally. I put together a quick post,

1:25.0

just summarizing sort of what we have so far about this vulnerability

1:28.6

Friday at 11 a.m. Eastern, there will also be a webcast with Jake Williams, where he'll go over

1:36.8

some of the exploit development that has been happening so far. Links to the webcast and Antonio's tweet will be added to the show notes.

1:50.1

And if you feel pretty good about having your Windows systems patched, there is a new update out

1:56.4

for Google Chrome that fixes an actively exploited vulnerability, and that's the only

2:02.9

vulnerability being addressed with this update.

2:07.9

And Shihu 360 and the Chinese certsian cert have worked together to identify a new Didos botnet.

2:21.4

They're calling it Fajja. It sort of does adopt a lot of the elements we have seen of prior Linux, IoT-focused botnets, mostly spreading via weak

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.