meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, October 10th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 10 October 2018

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Microsoft Patch Tuesday; Adobe Updates; Magecart hits Shopper Approved

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Wednesday, October 10th, 2018 edition of the Sandinert Storm Center's

0:07.0

Stormcast. My name is Johannes Ulrich, and I'm recording from Honolulu, Hawaii.

0:14.0

And today, well, a Microsoft patched Tuesday, so let's start with this according to my count, we have

0:20.0

48 vulnerabilities being addressed by these updates.

0:23.6

In addition, there is an advisory regarding the Microsoft Office Defense in Depth update.

0:31.6

Now, there is interestingly no flash update this month.

0:36.6

We had a flash update a week or so ago, but

0:40.3

no flash update from Adobe today. Out of these vulnerabilities, three were known prior to the

0:48.8

patch being released and a fourth one had already been exploited. The exploited one is a pro-age escalation vulnerability in Windows 32K,

0:59.3

and that's one of those kernel driver issues.

1:02.7

Now, the vulnerability was probably published the most was this jet database engine vulnerability.

1:09.9

That one hasn't been exploited yet.

1:11.8

Exploitation of it would also be sort of tricky, so not really surprised that we haven't seen

1:17.6

that in the wild yet. There are also some Microsoft Exchange Remote Code Execution

1:24.2

vulnerabilities. When I saw this first, I was a little bit worried about this,

1:28.9

but this is really more of these DLL loading issues. So again, not really all that easy

1:36.0

and likely to see this exploited. Sort of an interesting vulnerability in particular, since

1:43.1

Microsoft thinks it's likely to get exploited is a security

1:48.4

feature bypass in DeviceGuard. DeviceGuard can be used to really lock down a Windows 10

1:54.4

system and prevent unauthorized code from running. So a lot of enterprises start to rely on that so definitely apply this patch if

2:04.4

device guard is an important feature for you probably less of an issue for home users in general

2:12.3

a lot of the usual stuff is some Microsoft office vulnerabilities lots of scripting engine issues and browser issues

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.