Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Internet Storm Center Tech Corner

SANS Internet Storm Center StormCast Friday, June 13, 2025

Honeypot Scripts; EchoLeak MSFT Copilot Vuln; Thunderbolt mailbox URL Vuln

https://isc.sans.edu/podcastdetail/9492

Automated Tools to Assist with DShield Honeypot Investigations

https://isc.sans.edu/diary/Automated+Tools+to+Assist+with+DShield+Honeypot+Investigations+Guest+Diary/32038

EchoLeak: Zero-Click Microsoft 365 Copilot Data Leak

Microsoft fixed a vulnerability in Copilot that could have been abused to exfiltrate data from Copilot users. Copilot mishandled instructions an attacker included in documents inspected by Copilot and executed them.

https://www.aim.security/lp/aim-labs-echoleak-blogpost

Thunderbolt Vulnerability

Thunderbolt users may be tricked into downloading arbitrary files if an email includes a mailbox:/// URL.

https://www.mozilla.org/en-US/security/advisories/mfsa2025-49/

SANS Internet Storm Center StormCast Thursday, June 12, 2025

Quasar RAT; Windows 11 24H2 Delay; SMB Client Vuln PoC; ConnectWise Signing Keys; KDE Telnet code exec

https://isc.sans.edu/podcastdetail/9490

Quasar RAT Delivered Through Bat Files

Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT.

https://isc.sans.edu/diary/Quasar+RAT+Delivered+Through+Bat+Files/32036

Delayed Windows 11 24H2 Rollout

Microsoft slightly throttled the rollout of windows 11 24H2 due to issues stemming from the patch Tuesday fixes.

https://learn.microsoft.com/en-us/windows/release-health/windows-message-center#3570

An In-Depth Analysis of CVE-2025-33073

Patch Tuesday fixed an already exploited SMB client vulnerability. A blog by Synacktiv explains the nature of the issue and how to exploit it.

https://www.synacktiv.com/en/publications/ntlm-reflection-is-dead-long-live-ntlm-reflection-an-in-depth-analysis-of-cve-2025

ConnectWise Rotating Signing Certificates

ConnectWise is rotating signing certificates after a recent compromise, and will release a new version of its Screen share software soon to harden its configuration.

https://www.connectwise.com/company/trust/advisories

KDE Telnet URL Vulnerability

The Konsole delivered as part of KDE may be abused to execute arbitrary code via ÒtelnetÓ URLs.

https://kde.org/info/security/advisory-20250609-1.txt

SANS Internet Storm Center StormCast Wednesday, June 11, 2025

Microsoft Patch Tuesday; Acrobat Patches

https://isc.sans.edu/podcastdetail/9488

Microsoft Patch Tuesday

Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today.

https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+June+2025/32032

Adobe Vulnerabilities

Adobe released patches for 7 different applications. Two significant ones are Adobe Commerce and Adobe Acrobat Reader. All vulnerabilities patched for Adobe Commerce can only be exploited by an authenticated user. The Adobe Acrobat Reader vulnerabilities are exploited by a user opening a crafted PDF, and the exploit may execute arbitrary code.

https://helpx.adobe.com/security/Home.html

View Older Issues

Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.

Browse Archive
M365 Copilot AI Prompt Injection Attack Patched; Salesforce Misconfigurations Risk Data Leaks; Patch Tuesday: Microsoft and Adobe