4.9 • 696 Ratings
🗓️ 12 December 2025
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello and welcome to the Friday, December 12, 2025 edition of the Sands Internet Storm Center's Stormcast. |
| 0:12.9 | My name is Johannes Ulrich, recording today from Jacksonville, Florida. |
| 0:17.9 | And this episode is brought you by the sands.edu credit certificate program in |
| 0:22.7 | cybersecurity engineering. AI, of course, is the big issue that everybody is worried about and |
| 0:29.6 | playing with these days. And, well, as a first touch point, you usually just use one of the |
| 0:35.9 | public models like chat GPT and such to get a little |
| 0:40.7 | bit experience with what these tools can do, but it can be quite intimidating to go a step further |
| 0:47.4 | and try to run some of these models locally and play sort of in a more intimate atmosphere with these particular models. |
| 0:57.2 | Well, Guy now wrote up a quick diary showing how to install Gamma 3 on a reasonably small home computer. |
| 1:07.7 | In this particular case, he used one of the new horizon chips and one of those mini computers that have become quite popular these days for home labs and shows a couple of the pitfalls here, some of the problems that he ran into trying to make this all run in the proxmogs virtualization environment and how to configure it and then in the end |
| 1:28.9 | also how to use these tools. Certainly an interesting experiment in something that gives you a little |
| 1:34.4 | bit more insight in how these tools sort of work on the backend. And then we do have an update for |
| 1:41.6 | Chrome with yet another already exploited vulnerability being addressed |
| 1:46.7 | here and this vulnerability was well by some described a little bit sort of as a mystery |
| 1:51.9 | vulnerability and it's certainly a little bit an odd one in that there is no CVE number for |
| 1:58.8 | this vulnerability there's also absolutely no detail what it's all about. |
| 2:04.1 | Now, Google usually at least sort of has these one-liners |
| 2:07.7 | that describe a little bit something about the vulnerability, |
| 2:10.9 | but here it just says under coordination. |
| 2:14.2 | What I believe is happening here, |
| 2:16.5 | and that's where the coordination part comes from, that this particular vulnerability likely affects not just Google Chrome. |
| 2:24.5 | They're likely either other browsers. |
... |
Transcript will be available on the free plan in 27 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.