4.9 • 696 Ratings
🗓️ 13 May 2025
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Tuesday, May 13th, |
0:03.5 | 2000-25 edition of the Sands Internet Storm Center's Stormcast. |
0:09.2 | My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida. |
0:14.5 | And well, today we got patches from Apple. |
0:17.4 | So tomorrow, Microsoft Patch Tuesday, today, Apple Patch, Patch Monday, even though, of course, Apple does publish patches not on a regular schedule. |
0:28.0 | This particular update fixes 65 different vulnerabilities. There's one sort of notable vulnerability here, and that one is already being exploited. |
0:39.3 | It's an audio stream vulnerability. |
0:41.8 | Apple has released a patch for this particular vulnerability back mid-April, but only for the most recent versions of iOS and macOS. |
0:51.8 | This update now does also update some of the older versions of MacOS and iOS. For MacOS, |
1:00.0 | it goes back to Ventura, which is 13, so about two years ago. In addition to this particular |
1:09.0 | vulnerability that's already being exploited, there are a number of other notable vulnerabilities. |
1:14.7 | For example, a couple of vulnerabilities in WebKit that could lead to code execution if you're visiting a malicious website. |
1:23.0 | Also kind of an interesting vulnerability in FaceTime where apparently the mute button didn't always |
1:28.6 | work as expected, of course, that would be a rather embarrassing mistake in some cases. |
1:36.8 | And our honeypots detected the use of a new username and password combination, and that's |
1:43.4 | Unipy and Unipy. Technology. |
1:46.6 | This particular username and password combination is the default password for devices created |
1:53.2 | by a company called Unipi Technology. |
1:56.9 | And, well, they're sort of in the business of kind of IoT, like home automation, business |
2:04.4 | control systems and the like. And yes, they're still using a default password. It is, however, |
2:11.7 | pointed out in their Quick Start guide as sort of a bold item at the top that you should probably change this |
2:19.5 | particular password. The malware being spread here, well, it smells, looks like Mirai. It also does |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.