Handler on Duty: Jan Kopriva
Threat Level: green
Podcast Detail
SANS Stormcast Friday, May 15th, 2026: Website Fraud; Outlook Link Preview Bug; NGINX Vuln; Cisco 0-Day
If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9934.mp3
My Next Class
Click HERE to learn more about classes Johannes is teaching for SANS
Tearing apart website fraud to see how it works. (@sans_edu)
https://isc.sans.edu/diary/%5BGUEST%20DIARY%5D%20Tearing%20apart%20website%20fraud%20to%20see%20how%20it%20works./32958
Simple bypass of the link preview function in Outlook Junk folder
https://isc.sans.edu/diary/Simple%20bypass%20of%20the%20link%20preview%20function%20in%20Outlook%20Junk%20folder/32990
NGINX Vulnerability
https://depthfirst.com/nginx-rift
Cisco SDWan 0-Day
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa2-v69WY2SW
| Network Monitoring and Threat Detection In-Depth | Online | Arabian Standard Time | Jun 27th - Jul 2nd 2026 |
| Network Monitoring and Threat Detection In-Depth | Riyadh | Jun 27th - Jul 2nd 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Washington | Jul 13th - Jul 18th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Online | British Summer Time | Jul 27th - Aug 1st 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Las Vegas | Sep 21st - Sep 25th 2026 |
| Network Monitoring and Threat Detection In-Depth | Amsterdam | Nov 9th - Nov 14th 2026 |
| Application Security: Securing Web Apps, APIs, and Microservices | Washington | Dec 14th - Dec 18th 2026 |
Podcast Transcript
Hello and welcome to the Friday May 15th, 2026 edition of the SANS Internet Stormcenter Stormcast. My name is Johannes Ullrich recording today from San Diego, California. And this episode is brought to you by the SANS .edu Graduate Certificate Program in Penetration Testing and Ethical Hacking. Well today we have actually two diaries to talk about. The first one comes again from one of our undergraduate interns. Joshua Nicholson is writing about how to inspect a website to see if it may be fraudulent. These are often these fairly cheap consumer goods websites that offer various items at a real good price but don't really look quite legit in part because of the design and the way the sites are created. So it's always a little bit difficult to figure out if they actually offer a valid product or if they are really just interested in scamming you. Well in this particular case Joshua offers a couple of hints that point to scam sites like for example where product images were stolen from eBay listings and the like. And also then sort of as the ultimate proof Joshua actually went ahead and got a specific credit card number with a very small limit of $5 and placed an order. And in some of these cases in some of these websites well the card was immediately multi charged multiple times from multiple vendors for various amounts that were not necessarily related to the cost of the item advertised on the site. So really good work and I think that's useful kind of a sort of test of quick sanity checks on a website to figure out if it may be legitimate or not. Now going all the way and actually trying to order something using some credit card number that's probably too much for most people but even the other hints are quite good in order to order to get a sort of do a quick triage on any deal that may look a little bit too good. And Jan came across an interesting bug or dare I say vulnerability in Outlook. Outlook if you are placing a message in the junk folder has the nice property of actually removing some of the formatting from the message making it a little bit easier to see what for example links are hiding. Now Jan did just that he had a spam message in the junk folder but apparently the links were not displaying at all basically the URL that the link linked to. The issue here apparently was that these links were missing the scheme or protocol so the HTTP colon slash slash prefix it just started with the hostname followed by the remainder of the URL. While these type of links are still working basically HTTPS is then used as a default protocol in this case when you click on the link. This does make a tagline invalid URL and it looks like Outlook in the junk folder will not display these URLs because they don't match the pattern that Outlook is expecting for the URLs. This could be a problem because users are getting used to looking at the junk folder to better figure out what a particular message may be attempting to accomplish whether it is a real message or spam or phishing as in this case. And without the URL being displayed correctly this of course is just getting more difficult. The researchers from AI code security company Depth First have released a blog post with details regarding four vulnerabilities in NGINX. These vulnerabilities were disclosed to F5 and today in sync with the release of the blog post F5 also released patches for NGINX. I already have seen some of these patches also hit major Linux distributions. There are four different vulnerabilities that Depth First has uncovered. One of them particular sticks out and this serves some attention. It's a heap based buffer overflow in the mod rewrite module and this vulnerability can lead to arbitrary code execution. One caveat here is that the proof of concept being released so far only works if ASLR, the address space layout randomization is not enabled. Usually for Linux distributions this is enabled so you have a little bit extra time left here until attackers are finding the actual exploit that also supports systems with ASLR. And Depth First stated that they believe this flaw is exploitable with ASLR enabled. It may however require a good number of requests to make the exploit work. So proof of concept is released. Proof of concept doesn't quite work with common Linux distributions but well only some changes are likely required to make it work with common Linux distributions. This is definitely one of those patches that you want to get a handle on probably before the weekend if possible. But I know it's not always that easy to update your web server but again major Linux distributions have patches available. And well if you're not running NGINX and you have some extra time this Friday there is also a new critical vulnerability that was patched by Cisco in the Catalyst SD-WAN controller. It's an off-vocation bypass vulnerability that got the distinction of a perfect 10.0 CVSS score and yes it's already exploited in the wild. So definitely take a look at the advisory published by Cisco. They also have some guidance here as to what to do if you believe that you're compromised and no work around here other than applying the patch. Well this is it for today so thanks again for listening, thanks for liking, thanks for sharing this podcast with your friends. And there will be no podcast on Monday due to my travel schedule so talk to you again on Tuesday. Bye.





