meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Thursday Mar 6th: DShield ELK Analysis; Jailbreaking AMD CPUs; VIM Vulnerability; Snail Mail Ransomware

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 6 March 2025

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS Stormcast Thursday Mar 6th: DShield ELK Analysis; Jailbreaking AMD CPUs; VIM Vulnerability; Snail Mail Ransomware

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Thursday, March 6, 2025 edition of the Sands and the Stormsummer's

0:07.6

Stormcast. My name is Johannes Ulrich, and the time recording from Baltimore, Maryland.

0:14.4

Guy has done an amazing job with our D-Shield Honeypot, allowing you to run a Kibbana interface, all the data being stored

0:23.9

in Elastic Search, and with that, making the data that your honeypot collects much more approachable.

0:30.8

Now, there is sadly always a lot of data, well, sadly or not so sad, depending on how you look at it,

0:52.7

but the Gidu-day wrote a diary, walking you a little bit through how to better get a handle at the data and finding events of interest to better understand what attackers are up to with your honeypot and, well, learn from it.

0:57.3

Interesting blog post, yes, if you do want to run the DeShield Honeypot,

0:58.1

please do so.

0:59.0

We always like your data.

1:06.6

And with the Elk interface, well, it also becomes much more interesting for you to actually look at the data.

1:07.4

You may need a little bit more powerful system than just sort of your

1:12.4

basic Raspberry Pi in order to run all of this. The Google Buckhunter team today released

1:20.6

a lot of details, including working exploit code for a vulnerability that AMD patched a month ago.

1:29.8

This vulnerability allows you to essentially update the microcode in your CPU.

1:36.9

The microcode is routinely updated and it's often delivered with operating system updates

1:42.5

like Microsoft Linux updates and such include new microcode for your CPU.

1:49.5

But this update is supposed to be cryptographically signed.

1:54.6

The problem with AMD's implementation of this update procedure was that the hash function that they used,

2:01.9

well, wasn't really as secure as it should be for this application.

2:09.0

The patch a month ago, they updated with a new proprietary hash function that appears

2:16.0

to at least solve this problem.

2:19.2

And with that now, Google did release the details about this vulnerability,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.