meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Wednesday, November 26th, 2025: Attacks Against Messaging; Passwords in Random Websites; Fluentbit Vuln; #thanksgiving

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 26 November 2025

⏱️ 6 minutes

🧾️ Download transcript

Summary


Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications
Spyware attacks messaging applications in part by triggering vulnerabilities in messaging applications but also by deploying tools like keystroke loggers and screenshot applications.
https://www.cisa.gov/news-events/alerts/2025/11/24/spyware-allows-cyber-threat-actors-target-users-messaging-applications
Stop Putting Your Passwords Into Random Websites Yes. Just Stop!
https://labs.watchtowr.com/stop-putting-your-passwords-into-random-websites-yes-seriously-you-are-the-problem/
Fluentbit Vulnerability
https://www.oligo.security/blog/critical-vulnerabilities-in-fluent-bit-expose-cloud-environments-to-remote-takeover
Happy Thanksgiving. Next podcast on Monday after Thanksgiving.

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, November 26, 2025 edition of the Sands and at Storm Center's Stormcast.

0:13.1

My name is Johannes Ulrich, recording today from Jacksonville, Florida.

0:18.0

And this episode is brought you by the sands.edu underwrite a certificate program

0:22.5

in cyber security fundamentals. And just as a reminder, this is the last podcast for this week,

0:30.7

given the Thanksgiving holiday coming up. This is published a quick announcement here that

0:37.4

they're seeing some attacks against messaging applications.

0:41.7

The attacks themselves are not new.

0:43.7

They're already sort of highlighting three different attacks here.

0:46.8

One is the use of QR codes, which sometimes can be used in order to trick a victim into adding an attacker's device to their account. And then, of course,

0:56.6

that attacker device does have access to your messages, even in some cases for end-to-end

1:03.3

encrypted applications. Also, the exploitation of bugs in the application itself. That's then sort of in some cases these very dangerous seroclic attacks.

1:15.0

I message, WhatsApp in the past, have been hit by these war on abilities.

1:20.6

And lastly, also, well, that's probably the hardest to defend against impersonation,

1:24.6

where someone is just claiming to be a different person in a messaging

1:28.8

app. So always be careful to verify who you are talking to. I just want to point out something

1:35.3

that isn't sort of explicitly stated here. They're talking about WhatsApp signal, signal in particular

1:41.4

being famous for its very robust end-to-end encryption. Just remember,

1:46.5

end-to-end encryption means that at the ends, the messages are still readable. So if the

1:51.8

attacker does have access to like a keystroke logger or the ability to take screenshots, then usually

1:58.1

that end-to-end encryption doesn't really do much, even if the application

2:02.9

is rather careful in how they're dealing with these messages on the end user system, like how

2:09.5

they're then encrypting them.

...

Transcript will be available on the free plan in 11 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.