Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. For those getting questions about Glasswing from their executives, give them this article.

For those getting questions about Glasswing from their executives, give them this article.

Scheduled Pinned Locked Moved Uncategorized
16 Posts 5 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • sempf@infosec.exchangeS sempf@infosec.exchange

    @cR0w When you say your risk models remain unchanged, does that mean you are not receiving pressure from management to change them due to Glass Wing, or that you already have and you're not changing them back?

    darkuncle@infosec.exchangeD This user is from outside of this forum
    darkuncle@infosec.exchangeD This user is from outside of this forum
    darkuncle@infosec.exchange
    wrote last edited by
    #4

    @Sempf @cR0w "We have a different question. When did zero days become the threat you were supposed to be worried about?"

    I mean, yeah, but also just because somebody is doing the basics poorly does not mean that advanced techniques are not *also* a threat. Many threats simultaneously! And some of them just became more risky and easier for attackers to leverage ...

    cr0w@infosec.exchangeC 1 Reply Last reply
    0
    • sempf@infosec.exchangeS sempf@infosec.exchange

      @cR0w When you say your risk models remain unchanged, does that mean you are not receiving pressure from management to change them due to Glass Wing, or that you already have and you're not changing them back?

      cr0w@infosec.exchangeC This user is from outside of this forum
      cr0w@infosec.exchangeC This user is from outside of this forum
      cr0w@infosec.exchange
      wrote last edited by
      #5

      @Sempf Not just Glasswing but every new AI hype comes to my team like it's some major new threat, but the only thing that seems to change is the scope and scale of individual attackers, not the state of the art. I have yet to see novel vulnerabilities or new attack paths discovered with any AI system yet. If it can only find a bunch of existing vuln classes, then it should already be addressed. If not, then the model was broken and now is a great time to update it. I don't see a difference between AI finding new things and APT69420 finding new things. Because they're not really that new. They haven't been for a while.

      1 Reply Last reply
      0
      • darkuncle@infosec.exchangeD darkuncle@infosec.exchange

        @Sempf @cR0w "We have a different question. When did zero days become the threat you were supposed to be worried about?"

        I mean, yeah, but also just because somebody is doing the basics poorly does not mean that advanced techniques are not *also* a threat. Many threats simultaneously! And some of them just became more risky and easier for attackers to leverage ...

        cr0w@infosec.exchangeC This user is from outside of this forum
        cr0w@infosec.exchangeC This user is from outside of this forum
        cr0w@infosec.exchange
        wrote last edited by
        #6

        @darkuncle @Sempf Easier for attackers means a potentially higher likelihood of occurrence, but it does not change the severity of impact. And while the likelihood does theoretically impact the risk score, for at least some orgs, it's minimal to no change when your adversaries are at the top of the field already. The rising tide of AI may be lifting all attackers' boats, but the high water mark remains the same, despite the industry continuously claiming a tsunami is coming. I just don't see it.

        rootwyrm@weird.autosR sempf@infosec.exchangeS darkuncle@infosec.exchangeD 3 Replies Last reply
        0
        • cr0w@infosec.exchangeC cr0w@infosec.exchange

          @darkuncle @Sempf Easier for attackers means a potentially higher likelihood of occurrence, but it does not change the severity of impact. And while the likelihood does theoretically impact the risk score, for at least some orgs, it's minimal to no change when your adversaries are at the top of the field already. The rising tide of AI may be lifting all attackers' boats, but the high water mark remains the same, despite the industry continuously claiming a tsunami is coming. I just don't see it.

          rootwyrm@weird.autosR This user is from outside of this forum
          rootwyrm@weird.autosR This user is from outside of this forum
          rootwyrm@weird.autos
          wrote last edited by
          #7

          @cR0w @darkuncle @Sempf if the first question asked isn't "where's the proof" then people aren't doing their jobs. And Anthropic shitting their pants on command is not proof. They claimed GPT2 was 'too dangerous to release.'

          So where's the proof?

          An un-exploitable bogus OpenBSD bug that was only validated by themselves?
          A research paper they wrote with Claude with a whole lot of fabricated crap?

          Where. Is. The. Proof?

          Answer: there is none and never will be.

          sempf@infosec.exchangeS 1 Reply Last reply
          0
          • cr0w@infosec.exchangeC cr0w@infosec.exchange

            @darkuncle @Sempf Easier for attackers means a potentially higher likelihood of occurrence, but it does not change the severity of impact. And while the likelihood does theoretically impact the risk score, for at least some orgs, it's minimal to no change when your adversaries are at the top of the field already. The rising tide of AI may be lifting all attackers' boats, but the high water mark remains the same, despite the industry continuously claiming a tsunami is coming. I just don't see it.

            sempf@infosec.exchangeS This user is from outside of this forum
            sempf@infosec.exchangeS This user is from outside of this forum
            sempf@infosec.exchange
            wrote last edited by
            #8

            @cR0w @darkuncle You should start a blog. Oh, wait.

            cr0w@infosec.exchangeC 1 Reply Last reply
            0
            • sempf@infosec.exchangeS sempf@infosec.exchange

              @cR0w @darkuncle You should start a blog. Oh, wait.

              cr0w@infosec.exchangeC This user is from outside of this forum
              cr0w@infosec.exchangeC This user is from outside of this forum
              cr0w@infosec.exchange
              wrote last edited by
              #9

              @Sempf @darkuncle

              nosirrahsec@infosec.exchangeN 1 Reply Last reply
              0
              • rootwyrm@weird.autosR rootwyrm@weird.autos

                @cR0w @darkuncle @Sempf if the first question asked isn't "where's the proof" then people aren't doing their jobs. And Anthropic shitting their pants on command is not proof. They claimed GPT2 was 'too dangerous to release.'

                So where's the proof?

                An un-exploitable bogus OpenBSD bug that was only validated by themselves?
                A research paper they wrote with Claude with a whole lot of fabricated crap?

                Where. Is. The. Proof?

                Answer: there is none and never will be.

                sempf@infosec.exchangeS This user is from outside of this forum
                sempf@infosec.exchangeS This user is from outside of this forum
                sempf@infosec.exchange
                wrote last edited by
                #10

                @rootwyrm @cR0w @darkuncle I believe that is exactly correct. As I mentioned somewhere, open up a developer console on any browser on any website of any size and significance, and you'll see 7,000 vulnerabilities in the JavaScript. Absolutely none of them are exploitable for anything useful at all. They don't really matter, and I would imagine that 99.997% of the things that are showing up in this magic report are going to be exactly like that.

                cr0w@infosec.exchangeC 1 Reply Last reply
                0
                • sempf@infosec.exchangeS sempf@infosec.exchange

                  @rootwyrm @cR0w @darkuncle I believe that is exactly correct. As I mentioned somewhere, open up a developer console on any browser on any website of any size and significance, and you'll see 7,000 vulnerabilities in the JavaScript. Absolutely none of them are exploitable for anything useful at all. They don't really matter, and I would imagine that 99.997% of the things that are showing up in this magic report are going to be exactly like that.

                  cr0w@infosec.exchangeC This user is from outside of this forum
                  cr0w@infosec.exchangeC This user is from outside of this forum
                  cr0w@infosec.exchange
                  wrote last edited by
                  #11

                  @Sempf @rootwyrm @darkuncle If even that.

                  sempf@infosec.exchangeS 1 Reply Last reply
                  0
                  • cr0w@infosec.exchangeC cr0w@infosec.exchange

                    @Sempf @rootwyrm @darkuncle If even that.

                    sempf@infosec.exchangeS This user is from outside of this forum
                    sempf@infosec.exchangeS This user is from outside of this forum
                    sempf@infosec.exchange
                    wrote last edited by
                    #12

                    @cR0w @rootwyrm @darkuncle But out of curiosity, are you getting questions from your management? None of my clients have said a word one, and several of them are very AI focused.

                    cr0w@infosec.exchangeC rootwyrm@weird.autosR 2 Replies Last reply
                    0
                    • sempf@infosec.exchangeS sempf@infosec.exchange

                      @cR0w @rootwyrm @darkuncle But out of curiosity, are you getting questions from your management? None of my clients have said a word one, and several of them are very AI focused.

                      cr0w@infosec.exchangeC This user is from outside of this forum
                      cr0w@infosec.exchangeC This user is from outside of this forum
                      cr0w@infosec.exchange
                      wrote last edited by
                      #13

                      @Sempf @rootwyrm @darkuncle I did for a while, but then they found out I'm skeptical but back up my skepticism when asked so they stopped asking me for the most part. They ask the AI fans now.

                      1 Reply Last reply
                      0
                      • sempf@infosec.exchangeS sempf@infosec.exchange

                        @cR0w @rootwyrm @darkuncle But out of curiosity, are you getting questions from your management? None of my clients have said a word one, and several of them are very AI focused.

                        rootwyrm@weird.autosR This user is from outside of this forum
                        rootwyrm@weird.autosR This user is from outside of this forum
                        rootwyrm@weird.autos
                        wrote last edited by
                        #14

                        @Sempf @cR0w @darkuncle I'm one of the many in the ranks of the funemployed. But I'm definitely seeing a whole lot of gnashing of teeth and sky-is-falling shit from both management and from people who have absolutely no excuse for buying into LLM generated bullshit.

                        1 Reply Last reply
                        0
                        • cr0w@infosec.exchangeC cr0w@infosec.exchange

                          @Sempf @darkuncle

                          nosirrahsec@infosec.exchangeN This user is from outside of this forum
                          nosirrahsec@infosec.exchangeN This user is from outside of this forum
                          nosirrahsec@infosec.exchange
                          wrote last edited by
                          #15

                          @cR0w @Sempf @darkuncle I feel attacked.

                          1 Reply Last reply
                          0
                          • cr0w@infosec.exchangeC cr0w@infosec.exchange

                            @darkuncle @Sempf Easier for attackers means a potentially higher likelihood of occurrence, but it does not change the severity of impact. And while the likelihood does theoretically impact the risk score, for at least some orgs, it's minimal to no change when your adversaries are at the top of the field already. The rising tide of AI may be lifting all attackers' boats, but the high water mark remains the same, despite the industry continuously claiming a tsunami is coming. I just don't see it.

                            darkuncle@infosec.exchangeD This user is from outside of this forum
                            darkuncle@infosec.exchangeD This user is from outside of this forum
                            darkuncle@infosec.exchange
                            wrote last edited by
                            #16

                            @cR0w @Sempf that was nicely articulated, thanks

                            1 Reply Last reply
                            1
                            0
                            • R relay@relay.infosec.exchange shared this topic
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            • Login

                            • Login or register to search.
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent
                            • Tags
                            • Popular
                            • World
                            • Users
                            • Groups