4.9 • 696 Ratings
🗓️ 20 September 2018
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, September 20th, 2018 edition of the Sanct Storm Center's Stormcast. |
0:07.4 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:13.5 | It's just about a week since Patch Tuesday, but Adobe already released another update, this one affecting Adobe Acrobat and Reader. |
0:24.7 | The update fixes seven vulnerabilities and one of these vulnerabilities an out-of-bounds memory write is labeled as critical because it does lead to arbitrary code execution. |
0:38.6 | Adobe is currently not aware of any exploits for this vulnerability and also doesn't consider |
0:44.9 | exploitation to be imminent. |
0:47.8 | And both Mac as well as Windows are affected by this vulnerability, given that Adobe did meant through trouble to actually publish |
0:57.8 | a special bulletin for these vulnerabilities. I would still probably try to expedite updating |
1:04.1 | these products. And Akamai released its state of the internet report. |
1:11.8 | Now based on Akamai's business, it's focusing heavily on denial of service attacks. |
1:17.8 | And one attack that they're pointing out here that I have seen really on the rise sort of |
1:23.8 | over the last year is credential stuffing. |
1:27.3 | Credential stuffing is essentially a password |
1:29.8 | prudforce attack, but one that's a bit more intelligent in that it uses a username and |
1:36.1 | password combinations that have been leaked in some of these large leaks of such data. |
1:43.2 | Now the problem to the defender is that many of these attacks |
1:46.9 | originate from botnets, so they come from many, many different IP addresses. Also, individual |
1:53.3 | users are typically only hit a couple of times, depending on how many different passwords |
1:58.6 | the attacker has for the particular user ID. |
2:02.6 | But what Akamai is pointing out that these attacks can quickly amount to a denial of service |
2:08.7 | attack, given the size of the botnets that are conducting these attacks, and also the size of |
2:15.9 | these data breaches that the bad guys have accumulated. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.