meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Tuesday, August 05, 2025: Daily Trends Report; NVidia Triton RCE; Cursor AI Misconfiguration

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 5 August 2025

⏱️ 7 minutes

🧾️ Download transcript

Summary


Daily Trends Report
A new trends report will bring you daily data highlights via e-mail.
https://isc.sans.edu/diary/New%20Feature%3A%20Daily%20Trends%20Report/32170
NVidia Triton RCE
Wiz found an interesting information leakage vulnerability in NVidia s Triton servers that can be leveraged to remote code execution.
https://www.wiz.io/blog/nvidia-triton-cve-2025-23319-vuln-chain-to-ai-server
Cursor AI MCP Vulnerability
An attacker could abuse negligent Cursor MCP configurations to implement backdoors into developer machines.
https://www.aim.security/lp/aim-labs-curxecute-blogpost

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, August 5th, 2025 edition of the Sands and then at Storm Center's Stormcast.

0:08.2

My name is Johannes Ulrich, recording day from Jacksonville, Florida.

0:13.1

And this episode is brought you by the Sands.edu undercredit certificate program in Applied Cybersecurity.

0:23.8

Today I added a new daily notification report that you may subscribe to their email or, well, just download the raw

0:29.7

JSON from the website if you want to sort of build your own little report like this. This is really something that I found useful.

0:40.4

I originally build it for myself and figured, well, you know, why not share it with others?

0:45.8

So you may also see some interesting new things in our data. It does summarize,

0:52.9

some of the highlights of the data for each day starts out with our

0:57.7

suspicious domains for the particular day that we sort of identified than any new URLs from

1:05.5

our web honeypots. So here looks like, for example, some of these Odine calls were new.

1:13.0

And then yet another variation of SharePoint, of course.

1:16.8

This is actually an older vulnerability here.

1:20.2

Just a slightly different sort of way of using it.

1:23.4

This U-edit part here I think think, is usually U-Editor.

1:27.8

So attackers trying something a little bit different.

1:32.0

Top S-H data.

1:33.2

Here we are looking at the new usernames that we have seen.

1:37.3

Sys ad-EM-3.

1:39.6

That could potentially be interesting.

1:41.6

Haven't really looked at the details here yet for this particular one.

1:45.8

There are some odd ones like this user agent.

1:49.2

That just happens if an attacker is sending an HTTP request to a Telnet server.

...

Transcript will be available on the free plan in 14 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.