meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, August 10th, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 10 August 2021

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Exchange ProxyShell; Synology and Router Attacks; Firefox Experiment; Messanging Bugs; HTTP2

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, August 10, 2021 edition of the Sansonet Storm Center's Stormcast.

0:07.0

My name is Johannes Ulrich and Rammokh recording from Stockholm, Germany.

0:13.0

Microsoft Exchange is likely going to remain the gift that gifts on giving and Orange Zai, who was also instrumental in finding some of the

0:24.1

recent vulnerabilities in Microsoft Exchange, has presented at Black Hat a talk where he talks

0:32.6

about some of the specific vulnerabilities or classes of war on abilities really that were introduced

0:39.3

in Exchange 2013.

0:42.3

Attackers are at the same time also heavily scanning, for example for the proxy log-on

0:47.3

war on ability and are definitely trying to figure out some of the war that Orange Tsai hinted on, but

0:56.4

never really sort of provided sufficient details to actually exploit them. So what this means

1:02.1

for Defender is get ready to patch Microsoft Exchange again and again. So better get your

1:10.5

playbook down to be able to do it quickly as additional

1:14.7

patches will likely be released in the near future. And talking about systems that keep on

1:22.7

giving for the bad guys, Synology is warning that botnets are attempting to prove force weak admin credentials,

1:32.3

specifically for its product. Synology, of course, makes these disk network storage devices.

1:39.8

Of course, we have seen over the last few years many of many Mirai-style botnets that go after devices

1:46.3

like this. At the same time, we also got new vulnerability that apparently affects about

1:53.8

20 different manufacturers of routers. Now, many of them are being provided by ISPs so the brand may not always

2:03.6

be that clear that you're using whether or not you're using a vulnerable router

2:07.8

or not let's just make this week at the router patch week if you have some time

2:14.5

this week take a look at your router make sure that your firmware is up to date.

2:21.0

And if not, then get it patched. Even if your router is not on the list, there is a good chance

2:27.0

that, well, on the last few months or so, there was a security relevant update for the device.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.