4.9 • 696 Ratings
🗓️ 13 November 2025
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello and welcome to the Thursday, November 13th, |
| 0:07.6 | 2025 edition of the Sands Internet Storm Center's Stormcast. |
| 0:12.6 | My name is Johannes Ulrich, recording today from Jacksonville, Florida. |
| 0:18.0 | And this episode is brought you by the sands.edu graduate certificate program in |
| 0:22.8 | cybersecurity engineering. Earlier this week, the OASP Foundation did release a release candidate |
| 0:30.6 | for its 2025 edition of its top 10 weblication vulnerability list. This is of course always important given that there are some compliance programs |
| 0:41.4 | that refer to the OSP top 10, but also a lot of application security programs use them |
| 0:47.4 | sort of as a guideline. |
| 0:50.3 | There are, well, in some ways, sadly not a lot of changes. |
| 0:54.0 | So really a lot of the old vulnerabilities are still important, like, you know, the good old |
| 0:59.0 | things like injection and cryptographic failure, insecure design, broken access control. |
| 1:05.1 | They changed the order a little bit, but they're still part of the old WASP top 10. |
| 1:12.9 | Now, they did merge server-side request forgery into broken access control, which makes perfect sense because, well, server-side request |
| 1:18.9 | for jury really takes advantage of some of the insufficient access control that sort of built |
| 1:24.9 | around some of the trust relationships between internal applications. |
| 1:30.2 | There is also a new one, well, sort of a new one that was added, and that's software supply chain |
| 1:37.1 | failures that used to be called vulnerable and outdated components. However, it's really |
| 1:43.5 | more than just components, the supply chain. |
| 1:45.9 | And that's really what they're acknowledging here with that change in naming that it's |
| 1:50.8 | outright malicious components, for example, that weren't really covered, at least in the |
| 1:55.8 | title of the old item. |
| 1:58.9 | And also, things like developer tools and such are often talk about that can lead |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.