Cybersecurity Podcasts
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityPodcastsSANS Stormcast Monday, January 5th, 2026: MongoBleed/React2Shell Recap; Crypto Scams; DNS Stats; Old Fortinet Vulns
SANS Stormcast Monday, January 5th, 2026: MongoBleed/React2Shell Recap; Crypto Scams; DNS Stats; Old Fortinet Vulns
Cybersecurity

SANS Internet StormCast

SANS Stormcast Monday, January 5th, 2026: MongoBleed/React2Shell Recap; Crypto Scams; DNS Stats; Old Fortinet Vulns

SANS Internet StormCast
•January 5, 2026•6 min
0
SANS Internet StormCast•Jan 5, 2026

Key Takeaways

  • •React2Shell botnets continue targeting vulnerable systems.
  • •Patch MongoDB and block internet exposure to prevent MongoBleed.
  • •Crypto scams lure victims with fake mining withdrawal fees.
  • •TShark reveals DNS resolver performance parity and NTP lookup delays.
  • •Legacy Fortinet CVE‑2020‑12812 remains unpatched on many devices.

Pulse Analysis

The episode opens with a quick status check on two persistent threats. React2Shell, a shell‑dropping payload that rides botnet traffic, is still surfacing in recent intrusion reports, reminding operators that any unpatched endpoint can become a launchpad. The discussion then shifts to MongoBleed, the critical MongoDB remote‑code‑execution flaw. Listeners are urged to apply the latest MongoDB patches and, more importantly, to remove direct internet exposure of database ports. These steps dramatically reduce the attack surface and prevent the kind of mass exploitation that dominated headlines last year.

Next, the hosts dissect a classic cryptocurrency advance‑fee scam that masquerades as a mining payout of over one bitcoin. The lure exploits greed and a lack of verification, prompting victims to wire withdrawal fees that disappear instantly. Switching gears, the team demonstrates how TShark can generate granular DNS statistics, comparing four public resolvers that showed virtually identical latency. An unexpected finding was the NTP server’s reverse‑lookup queries, which consistently lagged and inflated overall DNS response times. Disabling those lookups yielded measurable performance gains, highlighting TShark’s value for both security and operations teams.

Finally, the show revisits an older Fortinet (formerly 40NET) firewall flaw, CVE‑2020‑12812, which remains unpatched on roughly ten percent of surveyed devices. The persistence of a five‑year‑old vulnerability underscores the chronic problem of delayed firmware updates in network appliances. The hosts recommend a monthly firmware‑check calendar and physical end‑of‑life stickers on equipment to enforce timely replacements. By demanding clear vendor support timelines before purchase, organizations can avoid lingering exposure and maintain a healthier security posture across small‑business and home networks.

Episode Description

Cryptocurrency Scam Emails and Web Pages As We Enter 2026

https://isc.sans.edu/diary/Cryptocurrency%20Scam%20Emails%20and%20Web%20Pages%20As%20We%20Enter%202026/32594

https://isc.sans.edu/diary/Debugging+DNS+response+times+with+tshark/32592/

https://www.bleepingcomputer.com/news/security/over-10-000-fortinet-firewalls-exposed-to-ongoing-2fa-bypass-attacks/

Show Notes

0

Comments

Want to join the conversation?

Loading comments...