meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, November 12th, 2024

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 12 November 2024

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. PDF Phish Analysis; Mazda Vulns; Ruby SAML Vuln Details; Veeam Vuln; Fake FBI EDRs;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, November 12, 2024 edition of the Sansonet Storm Center's Stormcast.

0:08.5

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:14.3

DDI continues to entertain us with nice write-ups of how to use his tools, PDF ID and PDF dump to analyze Malver.

0:25.2

In the latest example, it's actually, well, strictly maybe not Malver.

0:28.6

It's a PDF with phishing links.

0:32.1

And just with a couple lines of code on the command line, you're able to, first of all,

0:37.1

identify that this

0:39.0

particular PDF does contain URLs, and then next you're able to extract it. Really easy then to,

0:47.6

of course, double check what this particular URL points to, which in this case turns out to be

0:53.4

your standard fishing site. So if this is

0:56.2

something that you're doing regularly, if this is something you're struggling with to do at scale

1:00.2

and to automate, well, these are exactly the tools you need in order to automatically analyze

1:05.7

PDFs, extract URLs, and then verify if they point to fishing sites or not.

1:13.5

Let me got a few vulnerabilities to talk about today ahead, of course, of Microsoft's

1:18.6

Patch Tuesday tomorrow.

1:20.7

The first one I want to mention is six different vulnerabilities in the Mazda infotainment

1:26.7

system.

1:27.9

These car hacking vulnerabilities, of course, always attract a lot of attention.

1:32.6

The mitigating factor here is that in order to exploit them, an attacker already has to be

1:38.5

inside the vehicle and connect a USB device to the vehicle.

1:43.8

But the vulnerabilities themselves are rather straightforward

1:46.8

and basic in the sense that data, for example,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.