meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, November 13th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 13 November 2018

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Google BPG Hijack via Russia; Bootable USB Microcode Loader; Wordpress GDPR Vuln.

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, November 13th, 2018 edition of the Sansonet Storm Center's

0:10.1

Stormcast. My name is Johannes Ulrich, I'm recording from Jacksonville, Florida.

0:17.2

And we do have more BGIP-based routing attacks to talk about.

0:22.2

At least it sort of looks like an attack against Google cost and outage in some of Google's cloud services.

0:30.5

Cloud service monitoring company Thousand Eyes first noted the problem and what they saw was that the traffic was redirected to China, Russia

0:40.8

and an ISP in Nigeria. Now, the main problem that then led to an outage was that, well, China

0:48.3

is dropping Google's traffic so it never actually got routed back to Google once it entered China.

0:57.0

Sort of a problem with a lot of these routing attacks is that they often go unnoticed,

1:02.0

but in this case because China dropped traffic, they actually then resulted in a denial of service.

1:09.0

No real idea yet, who is behind it it or if this was intentional or if this

1:15.1

was just another accident. Earlier we also had some outages with Facebook that were routing

1:21.4

related but according to Facebook this was related to a test that apparently didn't work out quite right.

1:30.6

And then we have another tool in the fight to get old CPU's microcode updated to protect them from the specter vulnerability.

1:40.0

If you have a modern up-to-date operating system, then that really shouldn't be a big problem

1:46.2

for you because these operating systems did deliver new microcode as a patch, like, for example,

1:53.2

in Windows and you should be all good. But yes, there are still a lot of people out there that

1:58.8

are using no longer supported operating

2:01.3

systems.

2:02.3

And for them, it was kind of difficult to apply this patch.

2:06.7

You can find the microcode online, but you have to find the right microcode for your

2:12.6

CPU.

2:13.5

Apparently, there are something like 2,900 different CPU versions out there that are affected

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.