4.9 • 696 Ratings
🗓️ 26 October 2016
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, October 27th, 2016 edition of the Sanctonet Storm Center's |
0:07.0 | Stormcast. |
0:08.0 | My name is Johannes Ulrich. |
0:09.0 | I'm recording from Jacksonville, Florida. |
0:12.0 | Adobe released an update for Flash today that patches one vulnerability CVE 2016-7855 that is already being exploited in the wild in some targeted attacks. |
0:28.3 | So that's why they went ahead and released this update outside of their normal patch schedule. |
0:35.6 | Now the vulnerability does affect all releases of Flash, |
0:41.1 | so it's Linux, OS10, and Windows, but so far it only has been exploited actually on Windows. |
0:50.7 | So please go ahead and update this as soon as you can. And of course, as always, review that you have Flash installed securely or not installed at all if you need it. One of the things to double check is that Flash only runs if the user actually enables it for a particular site, |
1:11.1 | because this is hardly the last flash exploit |
1:14.6 | that we are going to see. |
1:16.4 | And another point to own contest targeting mobile devices |
1:20.5 | just wrapped up revealing new exploits against iOS, |
1:25.2 | as well as against Android. In particular, against Android, it was possible |
1:30.3 | to install a malicious application without any user interaction and essentially root the phone |
1:38.1 | on iOS. The attackers also managed to install an application. However, it didn't survive reboot, |
1:46.4 | which, well, in hindsight, it isn't really all that bad, given that you typically don't reboot |
1:52.0 | your iPhone all the time. As targets, they use an iPhone 6S and Nexus 6P device, so relatively recent devices and they all had fully patched, recent |
2:06.2 | versions of the operating system installed. |
2:10.4 | Vulnerabilities used in these exploits have been revealed to respective vendors and we hopefully |
2:17.3 | will see patches for these vulnerabilities |
2:20.3 | shortly. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.