Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. My hot take on the vulnpocalypse:

My hot take on the vulnpocalypse:

Scheduled Pinned Locked Moved Uncategorized
6 Posts 6 Posters 1 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • sophieschmieg@infosec.exchangeS This user is from outside of this forum
    sophieschmieg@infosec.exchangeS This user is from outside of this forum
    sophieschmieg@infosec.exchange
    wrote last edited by
    #1

    My hot take on the vulnpocalypse:

    We don't have more vulnerabilities than we had before. The vulnerabilities were always there, we just didn't know they existed. But importantly, for moderately sophisticated attackers, who only have to find a relatively low number of vulns to begin with, not much has changed. Yeah it's a little bit cheaper, but finding vulns wasn't all that difficult, depending on the target. For defenders otoh, making the finding of vulns cheaper is theoretically a good thing, but we already had not enough capacity to fix the vulns found by fuzz testing and similar methods before, so this is just adding on the pile of stuff we know is broken, but can't keep up with fixing it. The net effect seems to be that we made triage more expensive. Yay.

    tess@mastodon.socialT spartan_1986@infosec.exchangeS peymano@mastodon.socialP 3 Replies Last reply
    1
    0
    • sophieschmieg@infosec.exchangeS sophieschmieg@infosec.exchange

      My hot take on the vulnpocalypse:

      We don't have more vulnerabilities than we had before. The vulnerabilities were always there, we just didn't know they existed. But importantly, for moderately sophisticated attackers, who only have to find a relatively low number of vulns to begin with, not much has changed. Yeah it's a little bit cheaper, but finding vulns wasn't all that difficult, depending on the target. For defenders otoh, making the finding of vulns cheaper is theoretically a good thing, but we already had not enough capacity to fix the vulns found by fuzz testing and similar methods before, so this is just adding on the pile of stuff we know is broken, but can't keep up with fixing it. The net effect seems to be that we made triage more expensive. Yay.

      tess@mastodon.socialT This user is from outside of this forum
      tess@mastodon.socialT This user is from outside of this forum
      tess@mastodon.social
      wrote last edited by
      #2

      @sophieschmieg I'm hoping that we can fix the initial wave of issues and then just have a higher bar for committing new code where we can find or avoid the issues before it's submitted instead of after the fact.

      timbray@cosocial.caT thief_of_fire@infosec.exchangeT 2 Replies Last reply
      0
      • tess@mastodon.socialT tess@mastodon.social

        @sophieschmieg I'm hoping that we can fix the initial wave of issues and then just have a higher bar for committing new code where we can find or avoid the issues before it's submitted instead of after the fact.

        timbray@cosocial.caT This user is from outside of this forum
        timbray@cosocial.caT This user is from outside of this forum
        timbray@cosocial.ca
        wrote last edited by
        #3

        @tess
        We've been trying for decades 😞 Maybe GenAI will help? There are still a lot of products/projects out there with lousy testing discipline/coverage though.

        @sophieschmieg

        1 Reply Last reply
        0
        • tess@mastodon.socialT tess@mastodon.social

          @sophieschmieg I'm hoping that we can fix the initial wave of issues and then just have a higher bar for committing new code where we can find or avoid the issues before it's submitted instead of after the fact.

          thief_of_fire@infosec.exchangeT This user is from outside of this forum
          thief_of_fire@infosec.exchangeT This user is from outside of this forum
          thief_of_fire@infosec.exchange
          wrote last edited by
          #4

          @tess
          Higher bar for committing code? That sounds like a bottleneck that's going to slow down sales. We don't have time to refine the code we've got! We need to push out new features, then more new products, especially since we can do that much faster now with our machine that rapidly generates vulnerable code!
          @sophieschmieg

          1 Reply Last reply
          1
          0
          • R relay@relay.infosec.exchange shared this topic
          • sophieschmieg@infosec.exchangeS sophieschmieg@infosec.exchange

            My hot take on the vulnpocalypse:

            We don't have more vulnerabilities than we had before. The vulnerabilities were always there, we just didn't know they existed. But importantly, for moderately sophisticated attackers, who only have to find a relatively low number of vulns to begin with, not much has changed. Yeah it's a little bit cheaper, but finding vulns wasn't all that difficult, depending on the target. For defenders otoh, making the finding of vulns cheaper is theoretically a good thing, but we already had not enough capacity to fix the vulns found by fuzz testing and similar methods before, so this is just adding on the pile of stuff we know is broken, but can't keep up with fixing it. The net effect seems to be that we made triage more expensive. Yay.

            spartan_1986@infosec.exchangeS This user is from outside of this forum
            spartan_1986@infosec.exchangeS This user is from outside of this forum
            spartan_1986@infosec.exchange
            wrote last edited by
            #5

            @sophieschmieg 100% agree but I’ve one recent observation to add. Mythos reporting got our C-levels’ attention in a big way. This has had other tangential benefits. For example, our purple team (of which I’m a participant) have for many, many months (nearly two years now) recommended expanding our red team and increasing the number and type of penetration tests to include the company’s new AI “employees.” That was always met with a, “it’ll interfere with business development” denial. This week they came to us and asked how long would it take to ramp up. The plan had already been laid out and all that remains is to get stakeholders’ formal approval to test their new toys. That’s now assured because they are asking for it. It’ll start next week. And while vulns may not always be patched quickly, I feel it really lowers the risk to have a few well informed mitigations in place either via code, policies or SOP. Sometimes a little fear can move the needle in significant ways.

            1 Reply Last reply
            0
            • sophieschmieg@infosec.exchangeS sophieschmieg@infosec.exchange

              My hot take on the vulnpocalypse:

              We don't have more vulnerabilities than we had before. The vulnerabilities were always there, we just didn't know they existed. But importantly, for moderately sophisticated attackers, who only have to find a relatively low number of vulns to begin with, not much has changed. Yeah it's a little bit cheaper, but finding vulns wasn't all that difficult, depending on the target. For defenders otoh, making the finding of vulns cheaper is theoretically a good thing, but we already had not enough capacity to fix the vulns found by fuzz testing and similar methods before, so this is just adding on the pile of stuff we know is broken, but can't keep up with fixing it. The net effect seems to be that we made triage more expensive. Yay.

              peymano@mastodon.socialP This user is from outside of this forum
              peymano@mastodon.socialP This user is from outside of this forum
              peymano@mastodon.social
              wrote last edited by
              #6

              @sophieschmieg @fugueish

              Mythos appears to make it significantly cheaper to find vulnerabilities — little to no expertise/sophistication required — copy & paste a prompt and wait. If so, that significantly increases the pool of attackers.

              1 Reply Last reply
              0
              Reply
              • Reply as topic
              Log in to reply
              • Oldest to Newest
              • Newest to Oldest
              • Most Votes


              • Login

              • Login or register to search.
              • First post
                Last post
              0
              • Categories
              • Recent
              • Tags
              • Popular
              • World
              • Users
              • Groups