4.9 • 696 Ratings
🗓️ 7 March 2025
⏱️ 14 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Friday, March 7th, 2025 edition of the Sands and at Storm Center's Stormcast. |
0:08.4 | My name is Johannes Ulrich, and today I'm recording from Baltimore, Maryland. |
0:13.6 | Well, we all know it's important to keep your browsers up to date. |
0:18.0 | Last week, Google did release a new update for Google Chrome. Unfortunately, they're |
0:24.2 | sort of doubling down on getting rid of older extensions that are still using the version |
0:30.8 | two of their manifest. The problem here is that these older extensions had more privileges |
0:37.3 | to interact with Chrome, which Google |
0:40.2 | no longer wants to allow. However, there are also some beneficial extensions that took advantage |
0:48.2 | of this access. One that's very vocal here is U-block. Uploc origin now in this latest update is automatically |
0:59.4 | being deactivated and then if a user is trying to manage their extensions, well they're kind of |
1:07.4 | pushed in the direction of actually uninstalling and removing this extension. |
1:13.1 | The problem is, well, you don't actually have to remove it. You are able to reactivate it for |
1:18.2 | now. Just Google doesn't make that very obvious. This has been an ongoing battle between |
1:25.0 | sort of Uploglock origin and Google, |
1:28.5 | not have to ensure if U-Block origin could come up with other ways to do its work and block advertisements. |
1:35.9 | Of course, one of the suspicions here is that Google's reliance on advertisement revenue |
1:42.1 | makes them more likely to actually prevent users from running |
1:47.6 | these type of extensions in their browsers. Let me have some critical updates to talk about, |
1:53.5 | first of all, Kibana. Kibana, of course, is also part of our honeypot seam. It's the popular |
2:00.3 | dashboard for Elastic Search and it suffers from a |
2:06.6 | prototype pollution vulnerability that could allow arbitrary code execution in order to exploit |
2:13.6 | the vulnerability and a hacker would have to have access as viewer to the dashboard. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.