meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Stormcast, Jan 20, 2025: Honeypots for Offense; SimpleHelp and UEFI Secure Boot Vulnerabilities

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 20 January 2025

⏱️ 3 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS ISC Stormcast, Jan 20, 2025: Honeypots for Offense; SimpleHelp and UEFI Secure Boot Vulnerabilities

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Monday, January 20th, 2025 edition of the Sands Internet Storm Center's Stormcast.

0:08.6

My name is Johannes Ulrich and I'm recording from Jacksonville, Florida.

0:15.2

Well, keeping things a little bit shorter today because of the federal holiday here in the U.S.

0:24.2

Starting with one of the diaries from this weekend. I think it was actually Fridays. And that's an other diary from one of our

0:30.0

undergraduate interns. This one was written by Alex Sanders. And Alex is writing about how to use honeypots for offensive purposes,

0:41.2

in particular to identify infrastructure that may be used to identify

0:46.6

some of the offensive infrastructure parts that a RETI member may deploy. So you're setting up a fishing site. You

0:57.0

want to prevent that fishing site from being discovered. It may be good to have a list of

1:02.8

researchers and such that are scanning the internet proactively to uncover sites like this.

1:10.4

Well, we do actually offer feed of researchers,

1:14.4

and I have to add the one or two researchers

1:17.8

that Alex here has as part of his diary.

1:23.3

But overall, usually it's actually better

1:26.1

to just do an allow list where only the organization

1:30.3

that you're testing has access to the particular phishing or malicious website.

1:35.5

But that's not always that easy in case they're using various tunneling systems that often

1:41.8

are being used to protect their users.

1:44.0

So their IP address are not

1:45.6

essentially easily identifiable. And then of course, you have a lot of users using mobile devices,

1:52.5

maybe even working from home, so their home IP address may be showing up. And that makes sort of

1:59.4

the allow list approach a lot more difficult, which is then

2:04.0

where you may want to implement some kind of plot list in order to extend the lifetime of

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.