4.9 • 696 Ratings
🗓️ 16 May 2025
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Sands and H Storm Center's Stormcast. My name is Johannes Ulrich, |
0:06.0 | and today I'm recording from Jacksonville, Florida. And today's episode is brought you by the sands.edu graduate |
0:13.5 | certificate in penetration testing and ethical hacking. In diaries today, we have a gea talk well yet again about the 2021 sonic wall |
0:24.8 | vulnerabilities that are still being exploited and while there is qualitatively nothing really |
0:32.4 | new here it's still the same URLs being hit well the, the quantity substantially changed. |
0:37.7 | It changed by an order of magnitude. |
0:40.7 | Now, there is one particular network, so if that sticks out here, and that's 141.980. |
0:47.5 | This particular network belongs to a global host. |
0:52.6 | Global host appears to be one of those low-cost hosting providers. And of course, |
0:59.7 | they're often being used to then just rent a couple cheap machines and start these scans. |
1:06.1 | Of course, with low cost often also comes low support and inability to sort of react to abuse complaints. |
1:14.3 | Still have to notify them and we'll see if maybe we get a response from them. |
1:21.1 | And Google released an update to Google Chrome. |
1:24.7 | We are now up to version 136. This update fixes two vulnerabilities that were |
1:32.0 | detected externally and the number, and there's obviously various fixes from internal audits. |
1:39.9 | Now, what is kind of interesting here is that one of the flaws is already being exploited in the wild. |
1:50.6 | So upgrade, as usual, Google Chrome usually does a reasonable good job in upgrading itself. |
1:56.7 | I would recommend at least restart Google Chrome once a day. |
2:00.0 | That way, you usually make sure that the update is actually being applied. |
2:06.3 | And to make things more exciting, the vulnerability was actually made public with details on X 10 days ago by S. Lancer here, the X account. |
2:20.3 | The vulnerability resolves around link headers being sent for sub-resource requests |
2:27.3 | and the refer policy here being not correctly applied to these link headers. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.