meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, September 18th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 18 September 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. MFA Issue; QNAP Patches; Keychain Passkey Access; Fortinet and vBulletin XSS

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Monday, September 18, 2020,

0:05.0

edition of the Sandstone Storm Center's Stormcast.

0:09.0

My name is Johannes Ulrich and the name is recording from New York City, New York.

0:14.0

Let's start today talking about a breach.

0:17.0

Now, I don't often talk about breaches in this podcast, but sometimes there are very

0:23.4

specific lessons that can be learned from these breaches. And of course, it's always helpful

0:28.4

if companies come forward with some of the details. The breach I'm talking about here was against

0:35.6

a retool, and it certainly was one of the more targeted and

0:42.3

specific breaches. One risk it highlights is that not all multifactor authentication is actually

0:50.8

fishing resistant. Now, I will link to the detailed description and retools blog in the show notes,

0:58.2

so you can read up on all the details.

1:00.5

I don't quite agree with the headline here that, well, when multifactor authentication

1:05.7

isn't actually multifactor authentication, Google Authenticator is by all means multifactor authentication, but it's not fishing

1:14.5

resistant, meaning that if a victim is entering their credentials, their username password,

1:22.0

and one of their one-time passwords from the Google Authenticator into the wrong website.

1:28.3

That website may be able to reuse these credentials, or in this case, the victim actually

1:35.5

gave a one-time password to the attacker over the phone.

1:40.8

This is difficult to sort of fix with training because users often don't quite

1:47.8

understand the implications of giving one of their one-time passwords over the phone versus

1:54.3

entering them into the legitimate website. But a distinction that has to be made. If you're really concerned, if these are

2:02.3

critical internal systems, then Google Authenticator may not be the right solution for you,

2:08.4

but something stronger and fishing resistant, like, for example, pass keys or Fido2,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.