4.9 • 696 Ratings
🗓️ 12 April 2022
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Tuesday, April 12, 2020 edition of the Sandsenet Storm Center's Stormcast. |
0:08.1 | My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida. |
0:13.5 | Remember around the time when the spring for shell vulnerability came out, there was all that |
0:19.4 | confusion, there was another vulnerability that was patch There was all that confusion. There was another vulnerability |
0:22.0 | that was patched in spring and that affected spring cloud function. Now, we are seeing |
0:29.5 | active exploit attempts, at least probes for this vulnerability, where attackers are checking |
0:36.0 | if you are using spring Cloud function by actually looking |
0:40.7 | at the gateway routes URL. |
0:44.3 | So don't forget this particular vulnerability. |
0:47.7 | It's one IP address in particular that does very actively scan for this vulnerability. |
0:57.3 | It also scans for other web vulnerabilities, some of them Java related, but also some totally different and very old |
1:03.4 | PHP vulnerabilities. So it looks like they're trying to add this particular exploit to their |
1:10.4 | repertoire for this particular bot. |
1:14.2 | And talking about applying patches, Microsoft has something new there for enterprises that they call Auto Patch. |
1:22.6 | Now, when you hear Autopatch, it of course sounds very much like the automatic updates that you can enable |
1:29.6 | in consumer Windows and, well, a lot of operating systems. |
1:34.8 | This one is a little bit different and more targeting enterprises. |
1:39.3 | Essentially, what Autopatch is doing is it automatically selects some representative systems from your environment and then first installs the patch on a very small number of systems. |
1:53.3 | They sort of one out of each category, sort of it identifies checks if the patch works okay, only if they work okay, then it sort of increases the population |
2:04.3 | of patch devices for sort of to 1%, then 9%, until it then rolls them out to the entire enterprise. |
2:14.7 | Interesting system, we'll have to see how this works, but the idea is to sort of |
2:19.5 | automate what a lot of enterprises do anyway, but they first sort of test a patch, then they roll it |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.