meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, December 3rd, 2024

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 3 December 2024

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Credential Guard; AWS Key Rotation; Corrupt Document Phishing; IBM Security Verify Access Appliance vuln;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, December 3, 2024 edition of the Science and at Storm Center's Stormcast.

0:08.1

My name is Johannes Ulrich and I'm recording from Jacksonville, Florida.

0:14.4

Threat-informed defense is something that's often being thrown around as, well, a methodology where you're defending against actual current

0:23.5

threats, avoiding, spending a lot of time on defenses that in the end don't really matter.

0:30.3

One of the ways how you can get to that state is actually having a good red team engagement. And that's exactly what

0:39.8

Boyan wrote about in his last diary. One particular control that often frustrates them in

0:47.1

their red team engagements. And if you can frustrate Boyan, you probably are also going to

0:52.7

frustrate a whole lot of attackers.

0:55.6

The assumption here is that some host network is already compromised and now you're trying

1:02.5

to prevent lateral movement.

1:05.6

The particular control that Boyan points out that being quite effective in preventing many techniques that are being

1:12.6

applied here is credential guard. Credential guard does prevent an attacker from, for example,

1:20.1

gathering other users' credentials. Just one little word of warning if you're enabling it,

1:25.9

and one reason why you may not want to enable it,

1:28.0

that it does interfere with some virtualization solutions. Credential Guard itself is implemented

1:33.6

by essentially running your Windows environment on top of HyperVee, and that will interfere with,

1:40.8

for example, running VMware on a system that has credential guard enabled.

1:47.1

And talking about credentials, researchers from clutch security looked a little bit about how long

1:53.7

it takes to have exposed AWS credentials exploited.

1:59.1

Well, the sad truth is that it takes literally seconds, maybe a couple

2:04.7

minutes for credentials to actually be exploited. They tried a couple different things,

2:10.2

like, for example, exposing them via GitHub and the like. This is in line with what we have seen in other reports, so this is not something

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.