meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, July 15th, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 15 July 2021

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Malspam Fail; Firefox and SAP updates; Joker Android Malware; less.js vulnerabilities

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, July 15, 2021 edition of the Sandtonet Storms,

0:06.4

Understorm, Stormcast. My name is Johannes Ulrich. And the time recording from Jacksonville, Florida.

0:13.7

Quick little update on malicious documents from Jan and, well, not all of them actually work.

0:20.5

And that's something that I've observed in the past two, for example, against attacks, against

0:25.4

web application vulnerabilities, where sometimes, well, the attack is just not done very well

0:31.2

and often appears to be not tested.

0:34.1

In this example, it was a malicious Excel spreadsheet or supposedly malicious. We

0:39.6

couldn't really tell because it was encrypted. And part of the email was that it mentioned a

0:45.6

password. Of course, that's quite common. But the password mentioned the email didn't work. And

0:51.8

the Jan was actually not successful, brute forcing the correct

0:57.0

password. So this was obviously not tested by the attacker. One of those few cases where the

1:05.0

victim just gets lucky. And then a couple of comments, corrections about yesterday's patch Tuesday.

1:12.8

First, a couple of readers noted that I said there were six previously disclosed vulnerabilities

1:17.9

for being already exploited, but I said there are only nine, not ten, that were either

1:24.5

disclosed or already exploited, and that's just because one vulnerability

1:29.6

was both previously disclosed and already being exploited, and then of course being the

1:36.0

print spooler vulnerability.

1:38.4

And secondly, the Microsoft Exchange server vulnerability that pointed out, CVE 2021, 344-473. It was actually

1:49.9

already patched in April. The CVE was omitted from the April release, and as a result, they

1:57.6

just sort of republish this here as an informational change only. And thanks to Kenneth

2:05.0

for pointing out this oversight. And as far as post-patch Tuesday patches go, we got a couple

2:13.6

patches from Mozilla that are noteworthy. They affect Firefox with that also the Torp browser

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.