meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, January 10th, 2024

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 10 January 2024

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Microsoft Patches; Adobe Patches; Kyocera Vuln; Hacked Wrenches

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, January 10th, 2020,

0:04.0

for edition of the Sansonet Storm Center's Stormcast.

0:07.8

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:14.0

It's Microsoft Patch Tuesday, and with that, the first Microsoft Patch Tuesday of 2024.

0:21.4

Hope it's a sign of future patch Tuesdays,

0:24.7

but we got less patches than normal and less severe patches than normal.

0:32.2

48 patches total for Microsoft products,

0:36.1

only four additional patches that affect chromium and with

0:40.3

that Microsoft Edge. Also, one open source vulnerability being patched here, the Stranger

0:48.8

Strings sequel Light vulnerability. That vulnerability actually sort of became known in 2022, but none of the

0:56.6

vulnerabilities that were patched today were disclosed prior to the patch being released or

1:02.8

exploited prior to today. So what about the two critical vulnerabilities? There was a remote code

1:09.3

execution vulnerability in Windows HyperV,

1:12.6

always, of course, critical if you're using that particular product.

1:16.5

And then probably affecting a larger number of users here, also having a CVSS score of 9.0,

1:25.7

a security bypass vulnerability in Windows Kerbara. Windows Kerberos, of course,

1:30.6

beings of the authentication access control backbone for many Windows networks, this particular

1:36.6

vulnerability would allow an attacker to bypass authentication by impersonating the Kerberos server. Requires a machine in the middle position

1:47.8

in order to exploit this vulnerability, but again, that's not really a stretch here. These types

1:53.9

of vulnerabilities are typically exploited after sort of the parameters being breached and the attacker

1:58.6

already has a foothold in the network

2:00.9

and then needs to sort of perform some lateral movement and that vulnerability will fit right

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.