Handler on Duty: Brad Duncan
Threat Level: green
Podcast Detail
SANS Stormcast Thursday, March 26th, 2026: Apple Patches; SmatApeSG Update; Trivy/LiteLLM/TeamPCP Update; Google Accelerates Quantum Save Crypto Rollout
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9866.mp3
Apple Patches; SmatApeSG Update; Trivy/LiteLLM/TeamPCP Update; Google Accelerates Quantum Save Crypto Rollout
00:00
My Next Class
Click HERE to learn more about classes Johannes is teaching for SANS
Apple Patches (almost) everything again. March 2026 edition.
https://isc.sans.edu/diary/Apple%20Patches%20%28almost%29%20everything%20again.%20March%202026%20edition./32830
SmartApeSG campaign pushes Remcos RAT, NetSupport RAT, StealC, and Sectop RAT (ArechClient2)
https://isc.sans.edu/diary/SmartApeSG%20campaign%20pushes%20Remcos%20RAT%2C%20NetSupport%20RAT%2C%20StealC%2C%20and%20Sectop%20RAT%20%28ArechClient2%29/32826
Trivy/LiteLLM/TeamPCP Updates
https://www.sans.org/webcasts/when-security-scanner-became-weapon
https://rosesecurity.dev/2026/03/24/sha-pinning-is-not-enough.html
Google Moves Up Quantum Crypto Deadline
https://blog.google/innovation-and-ai/technology/safety-security/cryptography-migration-timeline/
| Application Security: Securing Web Apps, APIs, and Microservices | Orlando | Mar 29th - Apr 3rd 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Apr 20th - Apr 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | San Diego | May 11th - May 16th 2026 |
| Network Monitoring and Threat Detection In-Depth | Online | Arabian Standard Time | Jun 20th - Jun 25th 2026 |
| Network Monitoring and Threat Detection In-Depth | Riyadh | Jun 20th - Jun 25th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 13th - Jul 18th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Online | British Summer Time | Jul 27th - Aug 1st 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 21st - Sep 26th 2026 |
Podcast Transcript
Hello and welcome to the Thursday, March 26, 2026 edition of the SANS Internet Storm Center's Stormcast. My name is Johannes Ullrich, recording today from Jacksonville, Florida. And this episode is brought to you by the SANS.edu Graduate Certificate Program in Purple Team Operations. Well, let's start with Apple patches. They actually came out yesterday, but due to the relatively large lightLLM and Privi story, we didn't really have time for them yesterday. So Apple patched, as usual, everything, covering 85 different vulnerabilities across their different operating systems with the usual overlap between them. For iOS, we actually also got patches for the last version, so iOS 18. Mac OS, well, a total of three versions, so the current one 26, as well as 15 and 14. The remaining operating system we only got for the current version. Now, a little bit odd case here with watchOS. We got updates for two more versions, but the updates there state that they don't fix any security issues. So the security issues affecting watchOS 26 may not affect these older versions, or they just haven't gotten around yet to patch them. Remember, there was this big hoopla lately about some newer Apple malware that used some vulnerabilities that were patched before. So these are not recent vulnerabilities, but in the past they have been more used sort of in these more sophisticated spyware, government malware kind of packages. They're now used more widely, and that's overall always sort of a trend where, you know, what used to be sort of a more sophisticated and limited vulnerability or exploit a couple of years ago, they tend to trickle down to sort of become more mass exploits. So definitely make sure that you keep your systems up to date. None of the vulnerabilities being patched here is labeled as being already exploited. Well, I have a quick update to the Lite LLM Team PCP Privy story from yesterday. Just a couple of items, actually two items. First of all, after I recorded yesterday, I actually learned that Sands had a special webcast today. The webcast has been archived and I added a link to the show notes. I was able to add a link to yesterday's show notes, but well, it was too late when I found out to actually mention it in the show itself. Well, Ken Hartman and Eric Johnson are talking about these attacks and about sort of the entire supply chain attack issue. And then we also got an email from Michael Rosenfeld, who wrote a nice blog post about some of the issues around, you know, pinning to a particular a git hash, like pinning to these SHA hashes, what you have to be aware of here, that you're doing it correctly and are still not vulnerable to it. And then just a general comment, one of the number one things that you need to do if you ran Lite LLM or any one of these affected products here is you need to be able to rotate your credentials. You should do that even if you just have a suspicion, if you aren't sure if you had that actual vulnerable version, you should still rotate your credentials, even well, probably if you don't think you're affected at all, it may be a good idea to rotate your credentials, just to know that you can actually do it. Because it's not easy. Remember how one of the problems here was that, you know, initially some of the credentials weren't completely rotated at the first compromise. It's not easy to do it correctly. You'll only do it right if you sort of automate it, if you do it routinely. And that's why it shouldn't really be one of those sort of special things that you're doing. I know it is, and I know it's not easy. I mentioned secrets management yesterday. That's sort of one of the things that you really have to get under control for these attacks. Team PCP, actually PCP, not PNP. I think I call them sometimes a little bit wrong here. But Team PCP, they actually mentioned to some journalists who were able to get in contact with them, that they have something like 300 gigabytes of credentials. So like I said, this is just the tip of the iceberg now. And basically they have too much credentials now. They need to sort of go through them and filter out which ones are worth actually, you know, attacking further. So that's just a quick sort of add on here to yesterday's story. Heather Atkins and Sophie Schmeick with Google published a blog post stating that, well, Google is now aiming to move to quantum safe cryptography by 2029. They moved up their timeline here somewhat basically accelerated the switch over looking at well, sort of the current threat landscape, essentially. Of course, Google has been involved in quantum computing for quite a while and has been practicing it has had quantum computers on site been working with them. So they certainly do have some understanding of the capabilities of the systems and how they are currently evolving. I've talked last year about some of the breakthroughs of that came like from Microsoft and such. On the other hand, you also have to understand that Google has to work with a fairly accelerated timeline here, because a lot of others are essentially waiting on Google to implement things like quantum safe algorithms in operating systems like Android in Chrome, which already supports it, of course. So they must be sort of at the forefront here. They also sort of explain that in their blog post. But what this really means for you is that, you know, with the industry leaders like Google kind of moving ahead with that, you probably will have the tools you need to switch over to quantum safe algorithms, shortly after that. I would say, you know, 30 to 30, 2030 to 2032 is probably when you can sort of set your own goal to switch to quantum safe algorithms or at least to offer them your customers, because by then, you know, given that 2029, a lot of operating systems will contain those algorithms, you will have a good chance to find the industry support that you need in order to switch over. Well, and this is it for today. So thanks for listening. Thanks for liking and thanks for subscribing to this podcast. And as always, talk to you again tomorrow. Bye. Bye. Bye. Bye.





