meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Tuesday, November 4th, 2025: XWiki SolrSearch Exploits and Rapper Feud; AMD Zen 5 RDSEED Bug; More Malicious Open VSX Extensions

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 4 November 2025

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS Stormcast Tuesday, November 4th, 2025: XWiki SolrSearch Exploits and Rapper Feud; AMD Zen 5 RDSEED Bug; More Malicious Open VSX Extensions

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, November 4th, 2025 edition of the Sands Internet Storm

0:10.7

Storm Centers, Stormcast.

0:12.3

My name is Johannes Ulrich, recording today from Jacksonville, Florida.

0:17.2

And this episode is brought you by the Sandsdut edu master's degree program in information security

0:23.3

engineering. This weekend, we did see a large number of exploit attempts for the ex-viki

0:30.3

solar search vulnerability. This vulnerability was added to the known exploited vulnerability

0:36.6

catalog on Friday,

0:38.0

so no real surprise that we see some exploits for it,

0:41.3

in particular since this war on ability

0:43.4

has gotten quite a bit of coverage over the weekend.

0:48.4

There are a couple odd things about these exploit attempts.

0:52.0

First of all, what took him so long? The original advisory that was

0:58.2

published by XWiki to alert users of this vulnerability actually pretty much had exploit

1:04.1

code attached to it. It had a proof-of-concept exploit that showed you how to take advantage of

1:08.9

this vulnerability, and it was pretty straightforward how to do so.

1:14.5

The other odd thing here was the user agent being used by the actor who, according to our data,

1:23.3

is pretty much responsible for all of the exploits.

1:27.7

Well, this was actually an email address.

1:30.3

The email address is with Atomicmail.io,

1:33.4

which is an encrypted and somewhat anonymous email provider.

1:37.7

So yes, certainly something that an attacker may use,

1:41.0

but not really sure why they're sort of advertising themselves here.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.