meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, December 12th, 2024

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 12 December 2024

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. vSphere Scans; Apple Updates; Cleo Vuln;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Thursday, December 12, 2004 edition of the Sansonet Storm Center's

0:07.6

Stormcast. My name is Johannes Ulrich. And I'm recording from Jacksonville, Florida.

0:14.3

In Diaries today, we have an interesting observation from one of our undergraduate interns,

0:21.9

Sherlock Jureer, did publish about scanning for V-Sphere vulnerabilities.

0:28.5

V-Sphere, of course, has a rich history of vulnerabilities.

0:32.4

Also, tends to be somewhat difficult to patch.

0:36.7

So when about three and a half months ago, some new vulnerabilities were being patched

0:42.0

that actually could lead to a V-sphere compromise, Jolouk pretty much saw initial reconnaissance

0:48.6

scanning the day after the vulnerability became publicly known.

0:54.6

Not only that, there were also other scans from the particular IP addresses that looked

1:00.8

like they were zooming in somewhat on the particular despair of vulnerabilities here in V-Sphere,

1:08.3

and essentially it was added sort of as a new tool to this particular actor's

1:14.2

tool set. They in the past and continue to also scan for non-BMware related vulnerabilities.

1:22.2

And this is very, very typical where attackers have a specific bot that they can easily use to add additional

1:30.1

vulnerabilities, in particular to scan just for the presence of the vulnerability, to then

1:35.9

later come and exploit them. So any one of these bots is typically scanning for a couple

1:42.2

dozen or so different vulnerabilities that are then being swapped out from time to time, old ones being retired, and new vulnerabilities being added.

1:53.4

And Apple released updates for, well, everything. We got updates for iOS, iPad OS, MacOS, WatchOS, Vision OS. So pretty much any

2:04.8

operating system that Apple produces received updates. There were also some updates for older

2:11.4

versions of MacOS going back to Ventura 13 and also for iPad OS, interestingly, 17.

2:19.7

Nothing for iOS 17.

2:22.8

Overall, the vulnerabilities are really not that sort of groundbreaking.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.