
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minute long, summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Stormcenter. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
Similar Podcasts

In Machines We Trust
A podcast about the automation of everything. Host Jennifer Strong and the team at MIT Technology Review look at what it means to entrust artificial intelligence with our most sensitive decisions.

The Cynical Developer
A UK based Technology and Software Developer Podcast that helps you to improve your development knowledge and career,
through explaining the latest and greatest in development technology and providing you with what you need to succeed as a developer.

Elixir Outlaws
Elixir Outlaws is an informal discussion about interesting things happening in Elixir. Our goal is to capture the spirit of a conference hallway discussion in a podcast.
ISC StormCast for Friday, July 6th 2018
Gentoo GitHub Breach Post Morten https://wiki.gentoo.org/wiki/Github/2018-06-28 Hamas Sets World Cup Trap for Israeli Soldiers https://www.reuters.com/article/us-israel-palestinians-cyber/israel-says-hamas-tried-to-snare-soldiers-in-world-cup-cyber-trap-idUSKBN1JT1ZX
ISC StormCast for Thursday, July 5th 2018
Progress Indication For Scripts in Windows https://isc.sans.edu/forums/diary/Progress+indication+for+scripts+on+Windows/23830/ Stylish Extension Steals History https://robertheaton.com/2018/07/02/stylish-browser-extension-steals-your-internet-history/ Data Leaks From Android Apps https://recon.meddle.mobi/panoptispy/
ISC StormCast for Thursday, July 5th 2018
Progress Indication For Scripts in Windows https://isc.sans.edu/forums/diary/Progress+indication+for+scripts+on+Windows/23830/ Stylish Extension Steals History https://robertheaton.com/2018/07/02/stylish-browser-extension-steals-your-internet-history/ Data Leaks From Android Apps https://recon.meddle.mobi/panoptispy/
ISC StormCast for Tuesday, July 3rd 2018
Odd PHP Exploit Attempt https://isc.sans.edu/forums/diary/Hello+Peppa+PHP+Scans/23826/ Diameter Security Report https://www.ptsecurity.com/ww-en/premium/diameter-2018/ Attack Against Trezor via DNS or BGP https://blog.trezor.io/psa-phishing-alert-fake-trezor-wallet-website-3bcfdfc3eced Symantec Offers VPNFilter Check http://www.symantec.com/filtercheck/
ISC StormCast for Tuesday, July 3rd 2018
Odd PHP Exploit Attempt https://isc.sans.edu/forums/diary/Hello+Peppa+PHP+Scans/23826/ Diameter Security Report https://www.ptsecurity.com/ww-en/premium/diameter-2018/ Attack Against Trezor via DNS or BGP https://blog.trezor.io/psa-phishing-alert-fake-trezor-wallet-website-3bcfdfc3eced Symantec Offers VPNFilter Check http://www.symantec.com/filtercheck/
ISC StormCast for Monday, July 2nd 2018
MacOS Malware Targeting Slack/Dicord Crypto Comunities https://isc.sans.edu/forums/diary/Crypto+community+target+of+MacOS+malware/23816/ New LTE Attacks Made Public https://alter-attack.net Rowhammer Attacks Against Android https://rampageattack.com
ISC StormCast for Monday, July 2nd 2018
MacOS Malware Targeting Slack/Dicord Crypto Comunities https://isc.sans.edu/forums/diary/Crypto+community+target+of+MacOS+malware/23816/ New LTE Attacks Made Public https://alter-attack.net Rowhammer Attacks Against Android https://rampageattack.com
ISC StormCast for Friday, June 29th 2018
Less Greedy Cryptominers https://isc.sans.edu/forums/diary/New+and+Improved+Cryptominers+Now+with+50+less+Greed/23812/ Disassemling Webassembly https://www.forcepoint.com/blog/security-labs/analyzing-webassembly-binaries Spectre Browser Mitigation Bypass https://alephsecurity.com/2018/06/26/spectre-browser-query-cache/ Gentoo Github Repository Compromise https://archives.gentoo.org/gentoo-announce/message/dc23d48d2258e1ed91599a8091167002
ISC StormCast for Friday, June 29th 2018
Less Greedy Cryptominers https://isc.sans.edu/forums/diary/New+and+Improved+Cryptominers+Now+with+50+less+Greed/23812/ Disassemling Webassembly https://www.forcepoint.com/blog/security-labs/analyzing-webassembly-binaries Spectre Browser Mitigation Bypass https://alephsecurity.com/2018/06/26/spectre-browser-query-cache/ Gentoo Github Repository Compromise https://archives.gentoo.org/gentoo-announce/message/dc23d48d2258e1ed91599a8091167002
ISC StormCast for Thursday, June 28th 2018
Secret Office 365 Activity Log API Unveiled (plus tool to extract logs) http://lmgsecurity.com/exposing-the-secret-office-365-forensics-tool/ Anonymizing Printers https://tu-dresden.de/ing/informatik/sya/ps/die-professur/news/geheime-daten-auf-dem-druckpapier-diplominformatiker-der-tu-dresden-entwickeln-verfahren-gegen-druckerueberwachung Silently Profiling Unknown Malware Samples https://isc.sans.edu/forums/diary/Silently+Profiling+Unknown+Malware+Samples/23808/ Cisco CVE-2018-0296 Exploited https://www.bleepingcomputer.com/news/security/cisco-asa-flaw-exploited-in-the-wild-after-publication-of-two-pocs/
ISC StormCast for Thursday, June 28th 2018
Secret Office 365 Activity Log API Unveiled (plus tool to extract logs) http://lmgsecurity.com/exposing-the-secret-office-365-forensics-tool/ Anonymizing Printers https://tu-dresden.de/ing/informatik/sya/ps/die-professur/news/geheime-daten-auf-dem-druckpapier-diplominformatiker-der-tu-dresden-entwickeln-verfahren-gegen-druckerueberwachung Silently Profiling Unknown Malware Samples https://isc.sans.edu/forums/diary/Silently+Profiling+Unknown+Malware+Samples/23808/ Cisco CVE-2018-0296 Exploited https://www.bleepingcomputer.com/news/security/cisco-asa-flaw-exploited-in-the-wild-after-publication-of-two-pocs/
ISC StormCast for Wednesday, June 27th 2018
Analyzing XPS Files https://isc.sans.edu/forums/diary/Analyzing+XPS+files/23804/ WPA3 Standard Finalized https://www.wi-fi.org/news-events/newsroom/wi-fi-alliance-introduces-wi-fi-certified-wpa3-security Executing Code with SettingContent-ms Files https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39 EFF Analysis of STARTTLS https://www.eff.org/deeplinks/2018/06/technical-deep-dive-starttls-everywhere
ISC StormCast for Wednesday, June 27th 2018
Analyzing XPS Files https://isc.sans.edu/forums/diary/Analyzing+XPS+files/23804/ WPA3 Standard Finalized https://www.wi-fi.org/news-events/newsroom/wi-fi-alliance-introduces-wi-fi-certified-wpa3-security Executing Code with SettingContent-ms Files https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39 EFF Analysis of STARTTLS https://www.eff.org/deeplinks/2018/06/technical-deep-dive-starttls-everywhere
ISC StormCast for Tuesday, June 26th 2018
Guilty By Association https://isc.sans.edu/forums/diary/Guilty+by+association/23800/ Filezila and Adware https://forum.filezilla-project.org/viewtopic.php?t=48441 iOS Pin Brute Forcing Confusion https://twitter.com/hackerfantastic/status/1010631766087032832 https://twitter.com/hackerfantastic/status/1010240042990596096 Azure Baseline Security Policy https://cloudblogs.microsoft.com/enterprisemobility/2018/06/22/baseline-security-policy-for-azure-ad-admin-accounts-in-public-preview/ Phone Battery Usage as Keystroke Logger https://sites.google.com/site/silbersteinmark/Home/popets18power.pdf?attredirects=1
ISC StormCast for Tuesday, June 26th 2018
Guilty By Association https://isc.sans.edu/forums/diary/Guilty+by+association/23800/ Filezila and Adware https://forum.filezilla-project.org/viewtopic.php?t=48441 iOS Pin Brute Forcing Confusion https://twitter.com/hackerfantastic/status/1010631766087032832 https://twitter.com/hackerfantastic/status/1010240042990596096 Azure Baseline Security Policy https://cloudblogs.microsoft.com/enterprisemobility/2018/06/22/baseline-security-policy-for-azure-ad-admin-accounts-in-public-preview/ Phone Battery Usage as Keystroke Logger https://sites.google.com/site/silbersteinmark/Home/popets18power.pdf?attredirects=1