meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Thursday, November 13th, 2025: OWASP Top 10 Update; Cisco/Citrix Exploits; Test post quantum readiness

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 13 November 2025

⏱️ 7 minutes

🧾️ Download transcript

Summary


OWASP Top 10 2025 Release Candidate
OWASP published a release candidate for the 2025 version of its Top 10 list
https://owasp.org/Top10/2025/0x00_2025-Introduction/
Citrix/Cisco Exploitation Details
Amazon detailed how Citrix and Cisco vulnerabilities were used by advanced actors to upload webshells
https://aws.amazon.com/blogs/security/amazon-discovers-apt-exploiting-cisco-and-citrix-zero-days/
Testing Quantum Readyness
A website tests your services for post-quantum computing-resistant cryptographic algorithms
https://qcready.com/

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Thursday, November 13th,

0:07.6

2025 edition of the Sands Internet Storm Center's Stormcast.

0:12.6

My name is Johannes Ulrich, recording today from Jacksonville, Florida.

0:18.0

And this episode is brought you by the sands.edu graduate certificate program in

0:22.8

cybersecurity engineering. Earlier this week, the OASP Foundation did release a release candidate

0:30.6

for its 2025 edition of its top 10 weblication vulnerability list. This is of course always important given that there are some compliance programs

0:41.4

that refer to the OSP top 10, but also a lot of application security programs use them

0:47.4

sort of as a guideline.

0:50.3

There are, well, in some ways, sadly not a lot of changes.

0:54.0

So really a lot of the old vulnerabilities are still important, like, you know, the good old

0:59.0

things like injection and cryptographic failure, insecure design, broken access control.

1:05.1

They changed the order a little bit, but they're still part of the old WASP top 10.

1:12.9

Now, they did merge server-side request forgery into broken access control, which makes perfect sense because, well, server-side request

1:18.9

for jury really takes advantage of some of the insufficient access control that sort of built

1:24.9

around some of the trust relationships between internal applications.

1:30.2

There is also a new one, well, sort of a new one that was added, and that's software supply chain

1:37.1

failures that used to be called vulnerable and outdated components. However, it's really

1:43.5

more than just components, the supply chain.

1:45.9

And that's really what they're acknowledging here with that change in naming that it's

1:50.8

outright malicious components, for example, that weren't really covered, at least in the

1:55.8

title of the old item.

1:58.9

And also, things like developer tools and such are often talk about that can lead

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.