meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, July 18th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 18 July 2018

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Geolocating Login Attempts; Typo3 Update; Money Laundry Scheme

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, July 18th, 2018 edition of the Sansanet Storm Center's Stormcast.

0:07.9

My name is Johannes Ulrich, and today I'm recording from Washington, D.C.

0:12.5

While I'm not a big fan of just outright blocking access from certain countries, it can be quite useful in order to enrich your logs with geolocation information.

0:25.8

Xavier has a little Python script for you to quickly look up the geographic location of an IP address or a host name.

0:36.6

Now, typically you would use one of the standard geolocation databases

0:40.4

for this. Maxmind probably is the biggest one providing these databases for download,

0:47.3

either free or commercial. But what Xavier points out is that you can also add your own

0:53.2

information to these databases.

0:55.1

This is in particular helpful in order to, for example, attribute access requests to particular

1:00.9

branch offices or so in your organization.

1:04.4

So for IP addresses that you use internally, of course, you should be able to define the geographic

1:10.8

location very precisely

1:12.4

and assign it to specific locations like branch offices.

1:16.7

And if you're using the popular typo three content management system, it's time to patch.

1:24.8

The typo team did release updates for all three current versions. That's version

1:30.6

7, 8 and 9. And the new release fixes four vulnerabilities. The first one is an authentication

1:39.0

bypass vulnerability. Depends somewhat on the exact configuration on the system, then there is a

1:46.0

SQL injection vulnerability and two deserilization vulnerabilities that may lead to remote code execution.

1:54.0

So certainly patch it, even though how vulnerable you are to these particular issues,

2:00.0

depends somewhat on your system configuration.

2:03.9

Also, read the advisory in addition to just patching because there are a couple configuration options

2:10.1

that you can select in PHP to make exploitation more difficult or impossible in some cases.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.