Talk With an Expert

Internet Storm Center Tech Corner

SANS Internet Storm Center StormCast Tuesday, August 12, 2025

Erlang OTP SSH Exploits (Palo Alto Networks); WinRAR Exploits; NetScaler Exploits; OpenSSH Pushing PQ Crypto

https://isc.sans.edu/podcastdetail/9566

Erlang OTP SSH Exploits

A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed.

https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/

WinRAR Exploited

WinRAR vulnerabilities are actively being exploited by a number of threat actors. The vulnerability allows for the creation of arbitrary files as the archive is extracted.

https://thehackernews.com/2025/08/winrar-zero-day-under-active.html

Citrix NetScaler Exploit Updates

The Dutch Center for Cyber Security is updating its guidance on recent Citrix NetScaler attacks. Note that the attacks started before a patch became available, and attackers are actively hiding their tracks to make it more difficult to detect a compromise.

https://www.ncsc.nl/actueel/nieuws/2025/07/22/casus-citrix-kwetsbaarheid
https://www.bleepingcomputer.com/news/security/netherlands-citrix-netscaler-flaw-cve-2025-6543-exploited-to-breach-orgs/

OpenSSH Post Quantum Encryption

Starting in version 10.1, OpenSSH will warn users if they are using quantum-unsafe algorithms

https://www.openssh.com/pq.html

SANS Internet Storm Center StormCast Monday, August 11, 2025

Fake Tesla Preorders; Bad USB Cameras; Win-DoS Epidemic

https://isc.sans.edu/podcastdetail/9564

Google Paid Ads for Fake Tesla Websites

Someone is setting up fake Tesla lookalike websites that attempt to collect credit card data from unsuspecting users trying to preorder Tesla products.

https://isc.sans.edu/diary/Google+Paid+Ads+for+Fake+Tesla+Websites/32186

Compromising USB Devices for Persistent Stealthy Access

USB devices, like Linux-based web cams, can be compromised to emulate malicious USB devices like keyboards that inject malicious commands.

https://eclypsium.com/blog/badcam-now-weaponizing-linux-webcams/

Win-DoS Epidemic: A crash course in abusing RPC for Win-DoS & Win-DDoS

Internet-exposed DCs can be used in very powerful DoS attacks.

https://defcon.org/html/defcon-33/dc-33-speakers.html#content_60389

View Older Issues

Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.

Browse Archive