4.9 • 696 Ratings
🗓️ 7 November 2024
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Thursday, November 7, 2024 edition of the Sandinet Stormsanders Stormcast. |
0:08.2 | My name is Johannes Ulrich and then I'm recording from Riyadh, Saudi Arabia. |
0:13.6 | Today's blog post comes from one of our Sands.edu bachelor degree interns. |
0:20.0 | Trevor Coleman writes about a search and activity against |
0:23.8 | their honeypot from back in early August. The amazing part here is that one single IP address, |
0:33.1 | one link single source IP address was responsible for 62 million different attacks, covering pretty |
0:40.8 | much all major web application attacks. Of course, these type of attacks are often used |
0:47.1 | to build a botnet. It's a little bit interesting that all the attacks came from one single |
0:51.8 | IP address, not from a botnet itself. There's no indication in this |
0:57.2 | case that this attack was sort of more a research scan, where someone is just enumerating |
1:03.5 | vulnerable systems without actively exploiting them as well. And do you have an air fryer, maybe one that is controllable via a mobile app, which an organization |
1:17.9 | that calls itself the UK's consumer champion did take a look at some of these apps and air |
1:24.5 | fryers and, well, what they found shouldn't really surprise anybody, but |
1:29.0 | these devices tend to be rather chatty in the sense that they are export trading data back |
1:36.1 | to the manufacturer. In general, the recommendation here is to be careful if you're buying |
1:43.5 | devices like this, also as you are setting them up be careful |
1:47.3 | what permissions you grant the related apps and what information you are entering as you are |
1:54.6 | registering for an account overall it's always a little bit questionable if an appliance like this |
2:00.7 | doesn't work unless you set up an account. |
2:03.6 | That usually also implies that if the manufacturer no longer supports the particular device, it may no longer work. |
2:12.6 | And the report recently released by the UK's National Cyber Security Center outlines a threat that they are calling PICME GOAT. |
2:24.8 | This particular threat is targeting perimeter security devices. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.