ISC StormCast for Friday, January 10th, 2025


Episode Artwork
1.0x
0% played 00:00 00:00
Jan 09 2025 7 mins   530 2 0
In this episode, we explore the following stories:

"Examining Redtail: Analyzing a Sophisticated Cryptomining Malware and its Advanced Tactics"

Overview of Redtail's multi-architecture cryptomining malware exploiting vulnerabilities and deploying persistence techniques.

URL: Examining Redtail: Analyzing a Sophisticated Cryptomining Malware and its Advanced Tactics

"Information Stealer Masquerades as LDAPNightmare PoC Exploit"

A malware disguised as a PoC exploit targets users seeking to test vulnerabilities like LDAPNightmare.

URL: Information Stealer Masquerades as LDAPNightmare PoC Exploit

"How Extensions Trick CWS Search"

Research reveals how malicious browser extensions manipulate Chrome Web Store search to appear legitimate.

URL: How Extensions Trick CWS Search

"Palo Alto Networks' Expedition Vulnerabilities (PAN-SA-2025-0001)"

Multiple vulnerabilities in the deprecated Expedition tool can expose credentials and lead to unauthorized file and command execution.

URL: Palo Alto Networks' Expedition Vulnerabilities (PAN-SA-2025-0001)