4.9 • 696 Ratings
🗓️ 26 November 2025
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello and welcome to the Wednesday, November 26, 2025 edition of the Sands and at Storm Center's Stormcast. |
| 0:13.1 | My name is Johannes Ulrich, recording today from Jacksonville, Florida. |
| 0:18.0 | And this episode is brought you by the sands.edu underwrite a certificate program |
| 0:22.5 | in cyber security fundamentals. And just as a reminder, this is the last podcast for this week, |
| 0:30.7 | given the Thanksgiving holiday coming up. This is published a quick announcement here that |
| 0:37.4 | they're seeing some attacks against messaging applications. |
| 0:41.7 | The attacks themselves are not new. |
| 0:43.7 | They're already sort of highlighting three different attacks here. |
| 0:46.8 | One is the use of QR codes, which sometimes can be used in order to trick a victim into adding an attacker's device to their account. And then, of course, |
| 0:56.6 | that attacker device does have access to your messages, even in some cases for end-to-end |
| 1:03.3 | encrypted applications. Also, the exploitation of bugs in the application itself. That's then sort of in some cases these very dangerous seroclic attacks. |
| 1:15.0 | I message, WhatsApp in the past, have been hit by these war on abilities. |
| 1:20.6 | And lastly, also, well, that's probably the hardest to defend against impersonation, |
| 1:24.6 | where someone is just claiming to be a different person in a messaging |
| 1:28.8 | app. So always be careful to verify who you are talking to. I just want to point out something |
| 1:35.3 | that isn't sort of explicitly stated here. They're talking about WhatsApp signal, signal in particular |
| 1:41.4 | being famous for its very robust end-to-end encryption. Just remember, |
| 1:46.5 | end-to-end encryption means that at the ends, the messages are still readable. So if the |
| 1:51.8 | attacker does have access to like a keystroke logger or the ability to take screenshots, then usually |
| 1:58.1 | that end-to-end encryption doesn't really do much, even if the application |
| 2:02.9 | is rather careful in how they're dealing with these messages on the end user system, like how |
| 2:09.5 | they're then encrypting them. |
... |
Transcript will be available on the free plan in 11 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.