meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Friday, August 15th, 2025: Analysing Attack with AI; Proxyware via YouTube; Xerox FreeFlow Vuln; Evaluating Zero Trust @SANS_edu

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 15 August 2025

⏱️ 15 minutes

🧾️ Download transcript

Summary


AI and Faster Attack Analysis
A few use cases for LLMs to speed up analysis
https://isc.sans.edu/diary/AI%20and%20Faster%20Attack%20Analysis%20%5BGuest%20Diary%5D/32198
Proxyware Malware Being Distributed on YouTube Video Download Site
Popular YouTube download sites will attempt to infect users with proxyware.
https://asec.ahnlab.com/en/89574/
Xerox Freeflow Core Vulnerability
Horizon3.ai discovered XXE Injection (CVE-2025-8355) and Path Traversal (CVE-2025-8356) vulnerabilities in Xerox FreeFlow Core, a print orchestration platform. These vulnerabilities are easily exploitable and enable unauthenticated remote attackers to achieve remote code execution on vulnerable FreeFlow Core instances.
https://horizon3.ai/attack-research/attack-blogs/from-support-ticket-to-zero-day/
SANS.edu Research: Darren Carstensen Evaluating Zero Trust Network Access: A Framework for Comparative Security Testing
Not all Zero Trust Network Access (ZTNA) solutions are created equal, and despite bold marketing claims, many fall short of delivering proper Zero Trust security.
https://www.sans.edu/cyber-research/evaluating-zero-trust-network-access-framework-comparative-security-testing/

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Friday, August 15th,

0:07.5

2025 edition of the Sands Internet Storm Center's Stormcast.

0:12.9

My name is Johannes Ulrich, recording today from Jacksonville, Florida.

0:18.2

And this episode is brought you by the sands.edu bachelor's degree program in

0:23.2

Applied Cybersecurity. And talking about our bachelor's decree, we do have another guest

0:29.6

diary by one of our undergraduate interns. This time Joseph Noah is writing about how AI tools

0:37.1

help Joseph to better understand

0:40.1

some of the events during the internship where our students are typically analyzing

0:45.4

alerts that they see in their honeypots.

0:50.1

This particular case looks at some issues like, for example, analyzing logs or analyzing little scripts that were found by the honeypot.

1:00.6

So, for example, better understanding what certain commands mean do and how their impact may necessarily sort of affect the particular honeypot environment system.

1:14.3

Here we have a very typical example in this blog post about command injection attack

1:21.2

and details like the no hub command, for example, in Linux.

1:26.2

What this does is, it's well, yes, you could probably figure it out with Google as well,

1:31.2

but much easier to sort of get it explained in context by various AI engines.

1:37.0

As usual, in particular, as a beginner, be careful, verify your results,

1:42.5

that you are not sort of ending up with a very plausible but wrong

1:48.7

hallucination from the AI system. And Anlap is reporting about an interesting new way how

1:56.6

proxyware matter is being distributed. In this case, it's a YouTube video download site.

2:04.6

What's happening here is that you have websites that allow you to essentially quickly download

2:10.9

a YouTube video, the actual video file. One example here is YTMP4, basically YouTube MP4.

2:19.0

You provided with the YouTube link, and in turn, you'll be able to download an MP4 file with the video,

...

Transcript will be available on the free plan in 24 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.