meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, December 7th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 7 December 2018

⏱️ 22 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Adobe Vuln. PoC; WatchOS Update; Data Exfiltration; Marketing 2FA @sans_edu

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, December 7th, 2018 edition of the Sanct Storm Center's Stormcast.

0:07.4

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:13.1

Early this week, Adobe released an update for Flash fixing a vulnerability that was already exploited in the wild. Now I told you may have a week

0:23.8

or so to patch this before the exploit is more widely available. Well I was off by a couple

0:30.3

days. Sorry for that. Proof-of-concept exploit has been released to GitHub so better get on with patching.

0:41.8

And then we also had Apple updates yesterday, and one of the notable omissions was an update

0:47.8

for watchOS. Well, this was released today, so a day late, probably because it also

0:53.9

included some major new features,

0:56.2

and Apple probably wanted to sort of have them stand out a little bit.

1:00.8

The vulnerabilities being addressed here are all vulnerabilities that were also addressed in

1:05.7

the other operating system updates.

1:08.0

So a number of elevation of privilege vulnerabilities here in the kernel.

1:12.6

Also again, web kit vulnerabilities. No issue so far with this update. So get it done, get it patched.

1:19.6

Nothing really sort of overly urgent with this particular update, however.

1:25.6

And then in Diaries today we got the one by Rob about how to exfiltrate data in penetration

1:32.3

tests.

1:33.4

Of course, a penetration tester will take a little bit of different route off than a normal

1:39.1

attacker would, because typically the goal of a penetration test is not necessarily to

1:43.9

exfiltrate as much data as possible,

1:46.9

but more to illustrate the severity of a particular vulnerability,

1:50.8

and also to illustrate how various controls would have helped or may have helped if they are in place.

2:00.6

So, for example, there are a number of ways that Rob goes over how to obfuscate or encrypt

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.