Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Tip to CISOs - every time you hear the phrase "defenders need to move at machine speed", drink.

Tip to CISOs - every time you hear the phrase "defenders need to move at machine speed", drink.

Scheduled Pinned Locked Moved Uncategorized
9 Posts 7 Posters 14 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • gossithedog@cyberplace.socialG This user is from outside of this forum
    gossithedog@cyberplace.socialG This user is from outside of this forum
    gossithedog@cyberplace.social
    wrote last edited by
    #1

    Tip to CISOs - every time you hear the phrase "defenders need to move at machine speed", drink. It's AI sales speak for "buy our magic box".

    gossithedog@cyberplace.socialG avuko@infosec.exchangeA 2 Replies Last reply
    1
    0
    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

      Tip to CISOs - every time you hear the phrase "defenders need to move at machine speed", drink. It's AI sales speak for "buy our magic box".

      gossithedog@cyberplace.socialG This user is from outside of this forum
      gossithedog@cyberplace.socialG This user is from outside of this forum
      gossithedog@cyberplace.social
      wrote last edited by
      #2

      Yes, it's true, some attackers use GenAI tools to make phishing emails or spit out Powershell. Based on existing attacks. That your existing controls should cover, as it's a repeat of existing attacks.

      Vendors just need to do their jobs, not milk customers like it's a farm.

      misusecase@twit.socialM sheogorath@microblog.shivering-isles.comS atanase@mastodon.socialA 3 Replies Last reply
      0
      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

        Yes, it's true, some attackers use GenAI tools to make phishing emails or spit out Powershell. Based on existing attacks. That your existing controls should cover, as it's a repeat of existing attacks.

        Vendors just need to do their jobs, not milk customers like it's a farm.

        misusecase@twit.socialM This user is from outside of this forum
        misusecase@twit.socialM This user is from outside of this forum
        misusecase@twit.social
        wrote last edited by
        #3

        @GossiTheDog >> Vendors just need to do their jobs, not milk customers like it's a farm.

        As far as they’re concerned that *is* their job.

        1 Reply Last reply
        0
        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

          Yes, it's true, some attackers use GenAI tools to make phishing emails or spit out Powershell. Based on existing attacks. That your existing controls should cover, as it's a repeat of existing attacks.

          Vendors just need to do their jobs, not milk customers like it's a farm.

          sheogorath@microblog.shivering-isles.comS This user is from outside of this forum
          sheogorath@microblog.shivering-isles.comS This user is from outside of this forum
          sheogorath@microblog.shivering-isles.com
          wrote last edited by
          #4

          @GossiTheDog But Kevin, think of the shareholders!

          1 Reply Last reply
          0
          • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

            Tip to CISOs - every time you hear the phrase "defenders need to move at machine speed", drink. It's AI sales speak for "buy our magic box".

            avuko@infosec.exchangeA This user is from outside of this forum
            avuko@infosec.exchangeA This user is from outside of this forum
            avuko@infosec.exchange
            wrote last edited by
            #5

            @GossiTheDog that magic box will contain a couple of new files, mostly ending in .png and .ico because of a recent buy, and stacks of often decades old and unmaintained open source python, perl and bash with some glue code from the first startup developers who threw it together years ago running on a years old Linux or freeBSD OS.

            Doing regex matching and some string parsing.

            But you’ll recognise the name and logo, so you’ll feel good about it.

            christopherkunz@chaos.socialC 1 Reply Last reply
            0
            • avuko@infosec.exchangeA avuko@infosec.exchange

              @GossiTheDog that magic box will contain a couple of new files, mostly ending in .png and .ico because of a recent buy, and stacks of often decades old and unmaintained open source python, perl and bash with some glue code from the first startup developers who threw it together years ago running on a years old Linux or freeBSD OS.

              Doing regex matching and some string parsing.

              But you’ll recognise the name and logo, so you’ll feel good about it.

              christopherkunz@chaos.socialC This user is from outside of this forum
              christopherkunz@chaos.socialC This user is from outside of this forum
              christopherkunz@chaos.social
              wrote last edited by
              #6

              @avuko @GossiTheDog Don't forget that the magic box will have at least two different webservers installed, one proxying for the other, introducing funny double encoding bugs, RewriteMaps that fork shell scripts and all of their legacy bugs.

              That's enterprise functionality!

              768kb@mastodon.social7 1 Reply Last reply
              0
              • christopherkunz@chaos.socialC christopherkunz@chaos.social

                @avuko @GossiTheDog Don't forget that the magic box will have at least two different webservers installed, one proxying for the other, introducing funny double encoding bugs, RewriteMaps that fork shell scripts and all of their legacy bugs.

                That's enterprise functionality!

                768kb@mastodon.social7 This user is from outside of this forum
                768kb@mastodon.social7 This user is from outside of this forum
                768kb@mastodon.social
                wrote last edited by
                #7

                @christopherkunz @avuko @GossiTheDog no healthy upstream

                christopherkunz@chaos.socialC 1 Reply Last reply
                0
                • 768kb@mastodon.social7 768kb@mastodon.social

                  @christopherkunz @avuko @GossiTheDog no healthy upstream

                  christopherkunz@chaos.socialC This user is from outside of this forum
                  christopherkunz@chaos.socialC This user is from outside of this forum
                  christopherkunz@chaos.social
                  wrote last edited by
                  #8

                  @768kb @avuko @GossiTheDog No healthy downstream either. All unhealthy (and possibly backdoored).

                  1 Reply Last reply
                  0
                  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                    Yes, it's true, some attackers use GenAI tools to make phishing emails or spit out Powershell. Based on existing attacks. That your existing controls should cover, as it's a repeat of existing attacks.

                    Vendors just need to do their jobs, not milk customers like it's a farm.

                    atanase@mastodon.socialA This user is from outside of this forum
                    atanase@mastodon.socialA This user is from outside of this forum
                    atanase@mastodon.social
                    wrote last edited by
                    #9

                    @GossiTheDog Too late. Customers have already outsourced their thinking to the vendor.

                    1 Reply Last reply
                    0
                    • R relay@relay.an.exchange shared this topic
                    Reply
                    • Reply as topic
                    Log in to reply
                    • Oldest to Newest
                    • Newest to Oldest
                    • Most Votes


                    • Login

                    • Login or register to search.
                    • First post
                      Last post
                    0
                    • Categories
                    • Recent
                    • Tags
                    • Popular
                    • World
                    • Users
                    • Groups