A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minute long, summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Stormcenter. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .

Similar Podcasts

In Machines We Trust

In Machines We Trust
A podcast about the automation of everything. Host Jennifer Strong and the team at MIT Technology Review look at what it means to entrust artificial intelligence with our most sensitive decisions.

The Cynical Developer

The Cynical Developer
A UK based Technology and Software Developer Podcast that helps you to improve your development knowledge and career, through explaining the latest and greatest in development technology and providing you with what you need to succeed as a developer.

Elixir Outlaws

Elixir Outlaws
Elixir Outlaws is an informal discussion about interesting things happening in Elixir. Our goal is to capture the spirit of a conference hallway discussion in a podcast.

ISC StormCast for Tuesday, October 9th 2018

October 08, 2018 4:44 3.99 MB Downloads: 0

Apple Updates iOS and iCloud for Windows https://support.apple.com/en-ca/HT209162 https://support.apple.com/en-ca/HT209141 Intel Adds Spectre/Meltdown Mitigation to 9th Generation CPUs https://www.bleepingcomputer.com/news/security/spectre-and-meltdown-hardware-protection-added-to-intels-9th-gen-cpus/ Windows October Update File Deleting Issues https://support.microsoft.com/en-us/help/4464619/windows-10-update-history https://blogs.technet.microsoft.com/filecab/2018/08/30/9205/ macOS Code Signing Vulnerabilities https://www.virusbulletin.com/conference/vb2018/abstracts/code-signing-flaw-macos

ISC StormCast for Monday, October 8th 2018

October 07, 2018 6:53 5.79 MB Downloads: 0

WPA2 Karck Attack Update https://www.krackattacks.com/followup.html#overview Cisco Updates https://tools.cisco.com/security/center/publicationListing.x?product=Cisco&sort=-day_sir#~Vulnerabilities Seattle Police Tries to Stop SWATing https://www.seattle.gov/police/need-help/swatting git Vulnerability Fixed https://github.com/timwr/CVE-2017-1000117

ISC StormCast for Monday, October 8th 2018

October 07, 2018 6:53 5.79 MB Downloads: 0

WPA2 Karck Attack Update https://www.krackattacks.com/followup.html#overview Cisco Updates https://tools.cisco.com/security/center/publicationListing.x?product=Cisco&sort=-day_sir#~Vulnerabilities Seattle Police Tries to Stop SWATing https://www.seattle.gov/police/need-help/swatting git Vulnerability Fixed https://github.com/timwr/CVE-2017-1000117

ISC StormCast for Friday, October 5th 2018

October 05, 2018 7:18 6.14 MB Downloads: 0

Does the Chinese Military Manipulate Supermicro Motherboards? https://www.bloomberg.com/news/articles/2018-10-04/the-big-hack-amazon-apple-supermicro-and-beijing-respond Cloudflare IPFS Gateway Used For Phishing https://www.bleepingcomputer.com/news/security/phishing-attacks-distributed-through-cloudflares-ipfs-gateway/ DNSSEC Root Key Signing Key Rollover https://www.icann.org/resources/pages/ksk-rollover https://www.icann.org/news/blog/2018-ksk-rollover-operator-preparedness-survey

ISC StormCast for Friday, October 5th 2018

October 05, 2018 7:18 6.14 MB Downloads: 0

Does the Chinese Military Manipulate Supermicro Motherboards? https://www.bloomberg.com/news/articles/2018-10-04/the-big-hack-amazon-apple-supermicro-and-beijing-respond Cloudflare IPFS Gateway Used For Phishing https://www.bleepingcomputer.com/news/security/phishing-attacks-distributed-through-cloudflares-ipfs-gateway/ DNSSEC Root Key Signing Key Rollover https://www.icann.org/resources/pages/ksk-rollover https://www.icann.org/news/blog/2018-ksk-rollover-operator-preparedness-survey

ISC StormCast for Thursday, October 4th 2018

October 04, 2018 6:00 5.05 MB Downloads: 0

Identifying a Phisher https://isc.sans.edu/forums/diary/Identifying+a+phisher/24164/ Phishing via Azure Blob Storage https://www.netskope.com/blog/phishing-in-the-public-cloud Zoho Domains Used for Phishing and Keyloggers https://cofense.com/staggering-amount-stolen-data-heading-zoho-domains/ Dell iDRAC Exploit https://www.servethehome.com/idracula-vulnerability-impacts-millions-of-legacy-dell-emc-servers/

ISC StormCast for Thursday, October 4th 2018

October 04, 2018 6:00 5.05 MB Downloads: 0

Identifying a Phisher https://isc.sans.edu/forums/diary/Identifying+a+phisher/24164/ Phishing via Azure Blob Storage https://www.netskope.com/blog/phishing-in-the-public-cloud Zoho Domains Used for Phishing and Keyloggers https://cofense.com/staggering-amount-stolen-data-heading-zoho-domains/ Dell iDRAC Exploit https://www.servethehome.com/idracula-vulnerability-impacts-millions-of-legacy-dell-emc-servers/

ISC StormCast for Wednesday, October 3rd 2018

October 03, 2018 5:11 4.37 MB Downloads: 0

How to Write Yara Rules https://isc.sans.edu/forums/diary/Developing+YARA+Rules+a+Practical+Example/24158/ GhostDNS DNS Changer Malware https://blog.netlab.360.com/70-different-types-of-home-routers-all-together-100000-are-being-hijacked-by-ghostdns-en/ Foxit PDF Reader Vulnerabilities https://www.foxitsoftware.com/support/security-bulletins.php Apple Laptops Shipped With CPU in Manufacturing Mode http://blog.ptsecurity.com/2018/10/intel-me-manufacturing-mode-macbook.html

ISC StormCast for Wednesday, October 3rd 2018

October 03, 2018 5:11 4.37 MB Downloads: 0

How to Write Yara Rules https://isc.sans.edu/forums/diary/Developing+YARA+Rules+a+Practical+Example/24158/ GhostDNS DNS Changer Malware https://blog.netlab.360.com/70-different-types-of-home-routers-all-together-100000-are-being-hijacked-by-ghostdns-en/ Foxit PDF Reader Vulnerabilities https://www.foxitsoftware.com/support/security-bulletins.php Apple Laptops Shipped With CPU in Manufacturing Mode http://blog.ptsecurity.com/2018/10/intel-me-manufacturing-mode-macbook.html

ISC StormCast for Tuesday, October 2nd 2018

October 02, 2018 6:10 5.19 MB Downloads: 0

Update About Facebook Breach https://newsroom.fb.com/news/2018/09/security-update/ Adobe Acrobat/Reader Update https://helpx.adobe.com/security/products/acrobat/apsb18-30.html SMTP MTA Strict Transport Security (MTA-STS) https://www.rfc-editor.org/rfc/rfc8461.txt

ISC StormCast for Tuesday, October 2nd 2018

October 02, 2018 6:10 5.19 MB Downloads: 0

Update About Facebook Breach https://newsroom.fb.com/news/2018/09/security-update/ Adobe Acrobat/Reader Update https://helpx.adobe.com/security/products/acrobat/apsb18-30.html SMTP MTA Strict Transport Security (MTA-STS) https://www.rfc-editor.org/rfc/rfc8461.txt

ISC StormCast for Monday, October 1st 2018

September 30, 2018 6:11 5.21 MB Downloads: 0

Facebook Leaks more than 50 Million Accounts https://newsroom.fb.com/news/2018/09/security-update/ Telegram Leaks Local IP Address By Default https://www.inputzero.io/2018/09/bug-bounty-telegram-cve-2018-17780.html Site Tricks Users Into Subscribing to Browser Notifications https://www.bleepingcomputer.com/news/security/sites-trick-users-into-subscribing-to-browser-notification-spam/ DDE Code Injection https://isc.sans.edu/forums/diary/More+Excel+DDE+Code+Injection/24150/

ISC StormCast for Monday, October 1st 2018

September 30, 2018 6:11 5.21 MB Downloads: 0

Facebook Leaks more than 50 Million Accounts https://newsroom.fb.com/news/2018/09/security-update/ Telegram Leaks Local IP Address By Default https://www.inputzero.io/2018/09/bug-bounty-telegram-cve-2018-17780.html Site Tricks Users Into Subscribing to Browser Notifications https://www.bleepingcomputer.com/news/security/sites-trick-users-into-subscribing-to-browser-notification-spam/ DDE Code Injection https://isc.sans.edu/forums/diary/More+Excel+DDE+Code+Injection/24150/

ISC StormCast for Friday, September 28th 2018

September 27, 2018 5:34 4.69 MB Downloads: 0

Enriching Radare2 and x64dbg malware analysis with statically decoded strings https://isc.sans.edu/forums/diary/Enriching+Radare2+and+x64dbg+malware+analysis+with+statically+decoded+strings/24146/ Weaknesses in Apple's Mobile Device Management https://duo.com/labs/research/mdm-me-maybe LoJax UEFI Rootkit https://www.welivesecurity.com/2018/09/27/lojax-first-uefi-rootkit-found-wild-courtesy-sednit-group/

ISC StormCast for Friday, September 28th 2018

September 27, 2018 5:34 4.69 MB Downloads: 0

Enriching Radare2 and x64dbg malware analysis with statically decoded strings https://isc.sans.edu/forums/diary/Enriching+Radare2+and+x64dbg+malware+analysis+with+statically+decoded+strings/24146/ Weaknesses in Apple's Mobile Device Management https://duo.com/labs/research/mdm-me-maybe LoJax UEFI Rootkit https://www.welivesecurity.com/2018/09/27/lojax-first-uefi-rootkit-found-wild-courtesy-sednit-group/