Talk With an Expert

Internet Storm Center Tech Corner

SANS Internet Storm Center StormCast Friday, August 15, 2025

Analysing Attack with AI; Proxyware via YouTube; Xerox FreeFlow Vuln; Evaluating Zero Trust @SANS_edu

https://isc.sans.edu/podcastdetail/9572

AI and Faster Attack Analysis

A few use cases for LLMs to speed up analysis

https://isc.sans.edu/diary/AI+and+Faster+Attack+Analysis+Guest+Diary/32198

Proxyware Malware Being Distributed on YouTube Video Download Site

Popular YouTube download sites will attempt to infect users with proxyware.

https://asec.ahnlab.com/en/89574/

Xerox Freeflow Core Vulnerability

Horizon3.ai discovered XXE Injection (CVE-2025-8355) and Path Traversal (CVE-2025-8356) vulnerabilities in Xerox FreeFlow Core, a print orchestration platform. These vulnerabilities are easily exploitable and enable unauthenticated remote attackers to achieve remote code execution on vulnerable FreeFlow Core instances.

https://horizon3.ai/attack-research/attack-blogs/from-support-ticket-to-zero-day/

SANS.edu Research: Darren Carstensen Evaluating Zero Trust Network Access: A Framework for Comparative Security Testing

Not all Zero Trust Network Access (ZTNA) solutions are created equal, and despite bold marketing claims, many fall short of delivering proper Zero Trust security.

https://www.sans.edu/cyber-research/evaluating-zero-trust-network-access-framework-comparative-security-testing/

SANS Internet Storm Center StormCast Thursday, August 14, 2025

Equation Editor; Kerberos Patch; XZ-Utils Backdoor; ForitSIEM/FortiWeb patches

https://isc.sans.edu/podcastdetail/9570

CVE-2017-11882 Will Never Die

The (very) old equation editor vulnerability is still being exploited, as this recent sample analyzed by Xavier shows. The payload of the Excel file attempts to download and execute an infostealer to exfiltrate passwords via email.

https://isc.sans.edu/diary/CVE201711882+Will+Never+Die/32196

Windows Kerberos Elevation of Privilege Vulnerability

Yesterday, Microsoft released a patch for a vulnerability that had already been made public. This vulnerability refers to the privilege escalation taking advantage of a path traversal issue in Windows Kerberos affecting Exchange Server in hybrid mode.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53779

Persistent Risk: XZ Utils Backdoor Still Lurking in Docker Images

Some old Debian Docker images containing the xz-utils backdoor are still available for download from Docker Hub via the official Debian account.

https://www.binarly.io/blog/persistent-risk-xz-utils-backdoor-still-lurking-in-docker-images

FortiSIEM / FortiWeb Vulnerabilities

Fortinet patched already exploited vulnerabilities in FortiWeb and FortiSIEM

https://fortiguard.fortinet.com/psirt/FG-IR-25-152 (CVE-2025-25256)

https://fortiguard.fortinet.com/psirt/FG-IR-25-448 (CVE-2025-52970)

SANS Internet Storm Center StormCast Wednesday, August 13, 2025

Microsoft Patch Tuesday; libarchive vulnerability upgrade; Adobe Patches

https://isc.sans.edu/podcastdetail/9568

Microsoft Patch Tuesday

https://isc.sans.edu/diary/Microsoft+August+2025+Patch+Tuesday/32192

https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/

libarchive Vulnerability

A libarchive vulnerability patched in June was upgraded from a low CVSS score to a critical one. Libarchive is used by compression software across various operating systems, making this a difficult vulnerability to patch

https://www.freebsd.org/security/advisories/FreeBSD-SA-25:07.libarchive.asc

Adobe Patches

Adobe released patches for 13 different products.

https://helpx.adobe.com/security/Home.html

View Older Issues

Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.

Browse Archive