Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. For those getting questions about Glasswing from their executives, give them this article.

For those getting questions about Glasswing from their executives, give them this article.

Scheduled Pinned Locked Moved Uncategorized
16 Posts 5 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • sempf@infosec.exchangeS sempf@infosec.exchange

    @cR0w When you say your risk models remain unchanged, does that mean you are not receiving pressure from management to change them due to Glass Wing, or that you already have and you're not changing them back?

    cr0w@infosec.exchangeC This user is from outside of this forum
    cr0w@infosec.exchangeC This user is from outside of this forum
    cr0w@infosec.exchange
    wrote last edited by
    #5

    @Sempf Not just Glasswing but every new AI hype comes to my team like it's some major new threat, but the only thing that seems to change is the scope and scale of individual attackers, not the state of the art. I have yet to see novel vulnerabilities or new attack paths discovered with any AI system yet. If it can only find a bunch of existing vuln classes, then it should already be addressed. If not, then the model was broken and now is a great time to update it. I don't see a difference between AI finding new things and APT69420 finding new things. Because they're not really that new. They haven't been for a while.

    1 Reply Last reply
    0
    • darkuncle@infosec.exchangeD darkuncle@infosec.exchange

      @Sempf @cR0w "We have a different question. When did zero days become the threat you were supposed to be worried about?"

      I mean, yeah, but also just because somebody is doing the basics poorly does not mean that advanced techniques are not *also* a threat. Many threats simultaneously! And some of them just became more risky and easier for attackers to leverage ...

      cr0w@infosec.exchangeC This user is from outside of this forum
      cr0w@infosec.exchangeC This user is from outside of this forum
      cr0w@infosec.exchange
      wrote last edited by
      #6

      @darkuncle @Sempf Easier for attackers means a potentially higher likelihood of occurrence, but it does not change the severity of impact. And while the likelihood does theoretically impact the risk score, for at least some orgs, it's minimal to no change when your adversaries are at the top of the field already. The rising tide of AI may be lifting all attackers' boats, but the high water mark remains the same, despite the industry continuously claiming a tsunami is coming. I just don't see it.

      rootwyrm@weird.autosR sempf@infosec.exchangeS darkuncle@infosec.exchangeD 3 Replies Last reply
      0
      • cr0w@infosec.exchangeC cr0w@infosec.exchange

        @darkuncle @Sempf Easier for attackers means a potentially higher likelihood of occurrence, but it does not change the severity of impact. And while the likelihood does theoretically impact the risk score, for at least some orgs, it's minimal to no change when your adversaries are at the top of the field already. The rising tide of AI may be lifting all attackers' boats, but the high water mark remains the same, despite the industry continuously claiming a tsunami is coming. I just don't see it.

        rootwyrm@weird.autosR This user is from outside of this forum
        rootwyrm@weird.autosR This user is from outside of this forum
        rootwyrm@weird.autos
        wrote last edited by
        #7

        @cR0w @darkuncle @Sempf if the first question asked isn't "where's the proof" then people aren't doing their jobs. And Anthropic shitting their pants on command is not proof. They claimed GPT2 was 'too dangerous to release.'

        So where's the proof?

        An un-exploitable bogus OpenBSD bug that was only validated by themselves?
        A research paper they wrote with Claude with a whole lot of fabricated crap?

        Where. Is. The. Proof?

        Answer: there is none and never will be.

        sempf@infosec.exchangeS 1 Reply Last reply
        0
        • cr0w@infosec.exchangeC cr0w@infosec.exchange

          @darkuncle @Sempf Easier for attackers means a potentially higher likelihood of occurrence, but it does not change the severity of impact. And while the likelihood does theoretically impact the risk score, for at least some orgs, it's minimal to no change when your adversaries are at the top of the field already. The rising tide of AI may be lifting all attackers' boats, but the high water mark remains the same, despite the industry continuously claiming a tsunami is coming. I just don't see it.

          sempf@infosec.exchangeS This user is from outside of this forum
          sempf@infosec.exchangeS This user is from outside of this forum
          sempf@infosec.exchange
          wrote last edited by
          #8

          @cR0w @darkuncle You should start a blog. Oh, wait.

          cr0w@infosec.exchangeC 1 Reply Last reply
          0
          • sempf@infosec.exchangeS sempf@infosec.exchange

            @cR0w @darkuncle You should start a blog. Oh, wait.

            cr0w@infosec.exchangeC This user is from outside of this forum
            cr0w@infosec.exchangeC This user is from outside of this forum
            cr0w@infosec.exchange
            wrote last edited by
            #9

            @Sempf @darkuncle

            nosirrahsec@infosec.exchangeN 1 Reply Last reply
            0
            • rootwyrm@weird.autosR rootwyrm@weird.autos

              @cR0w @darkuncle @Sempf if the first question asked isn't "where's the proof" then people aren't doing their jobs. And Anthropic shitting their pants on command is not proof. They claimed GPT2 was 'too dangerous to release.'

              So where's the proof?

              An un-exploitable bogus OpenBSD bug that was only validated by themselves?
              A research paper they wrote with Claude with a whole lot of fabricated crap?

              Where. Is. The. Proof?

              Answer: there is none and never will be.

              sempf@infosec.exchangeS This user is from outside of this forum
              sempf@infosec.exchangeS This user is from outside of this forum
              sempf@infosec.exchange
              wrote last edited by
              #10

              @rootwyrm @cR0w @darkuncle I believe that is exactly correct. As I mentioned somewhere, open up a developer console on any browser on any website of any size and significance, and you'll see 7,000 vulnerabilities in the JavaScript. Absolutely none of them are exploitable for anything useful at all. They don't really matter, and I would imagine that 99.997% of the things that are showing up in this magic report are going to be exactly like that.

              cr0w@infosec.exchangeC 1 Reply Last reply
              0
              • sempf@infosec.exchangeS sempf@infosec.exchange

                @rootwyrm @cR0w @darkuncle I believe that is exactly correct. As I mentioned somewhere, open up a developer console on any browser on any website of any size and significance, and you'll see 7,000 vulnerabilities in the JavaScript. Absolutely none of them are exploitable for anything useful at all. They don't really matter, and I would imagine that 99.997% of the things that are showing up in this magic report are going to be exactly like that.

                cr0w@infosec.exchangeC This user is from outside of this forum
                cr0w@infosec.exchangeC This user is from outside of this forum
                cr0w@infosec.exchange
                wrote last edited by
                #11

                @Sempf @rootwyrm @darkuncle If even that.

                sempf@infosec.exchangeS 1 Reply Last reply
                0
                • cr0w@infosec.exchangeC cr0w@infosec.exchange

                  @Sempf @rootwyrm @darkuncle If even that.

                  sempf@infosec.exchangeS This user is from outside of this forum
                  sempf@infosec.exchangeS This user is from outside of this forum
                  sempf@infosec.exchange
                  wrote last edited by
                  #12

                  @cR0w @rootwyrm @darkuncle But out of curiosity, are you getting questions from your management? None of my clients have said a word one, and several of them are very AI focused.

                  cr0w@infosec.exchangeC rootwyrm@weird.autosR 2 Replies Last reply
                  0
                  • sempf@infosec.exchangeS sempf@infosec.exchange

                    @cR0w @rootwyrm @darkuncle But out of curiosity, are you getting questions from your management? None of my clients have said a word one, and several of them are very AI focused.

                    cr0w@infosec.exchangeC This user is from outside of this forum
                    cr0w@infosec.exchangeC This user is from outside of this forum
                    cr0w@infosec.exchange
                    wrote last edited by
                    #13

                    @Sempf @rootwyrm @darkuncle I did for a while, but then they found out I'm skeptical but back up my skepticism when asked so they stopped asking me for the most part. They ask the AI fans now.

                    1 Reply Last reply
                    0
                    • sempf@infosec.exchangeS sempf@infosec.exchange

                      @cR0w @rootwyrm @darkuncle But out of curiosity, are you getting questions from your management? None of my clients have said a word one, and several of them are very AI focused.

                      rootwyrm@weird.autosR This user is from outside of this forum
                      rootwyrm@weird.autosR This user is from outside of this forum
                      rootwyrm@weird.autos
                      wrote last edited by
                      #14

                      @Sempf @cR0w @darkuncle I'm one of the many in the ranks of the funemployed. But I'm definitely seeing a whole lot of gnashing of teeth and sky-is-falling shit from both management and from people who have absolutely no excuse for buying into LLM generated bullshit.

                      1 Reply Last reply
                      0
                      • cr0w@infosec.exchangeC cr0w@infosec.exchange

                        @Sempf @darkuncle

                        nosirrahsec@infosec.exchangeN This user is from outside of this forum
                        nosirrahsec@infosec.exchangeN This user is from outside of this forum
                        nosirrahsec@infosec.exchange
                        wrote last edited by
                        #15

                        @cR0w @Sempf @darkuncle I feel attacked.

                        1 Reply Last reply
                        0
                        • cr0w@infosec.exchangeC cr0w@infosec.exchange

                          @darkuncle @Sempf Easier for attackers means a potentially higher likelihood of occurrence, but it does not change the severity of impact. And while the likelihood does theoretically impact the risk score, for at least some orgs, it's minimal to no change when your adversaries are at the top of the field already. The rising tide of AI may be lifting all attackers' boats, but the high water mark remains the same, despite the industry continuously claiming a tsunami is coming. I just don't see it.

                          darkuncle@infosec.exchangeD This user is from outside of this forum
                          darkuncle@infosec.exchangeD This user is from outside of this forum
                          darkuncle@infosec.exchange
                          wrote last edited by
                          #16

                          @cR0w @Sempf that was nicely articulated, thanks

                          1 Reply Last reply
                          1
                          0
                          • R relay@relay.infosec.exchange shared this topic
                          Reply
                          • Reply as topic
                          Log in to reply
                          • Oldest to Newest
                          • Newest to Oldest
                          • Most Votes


                          • Login

                          • Login or register to search.
                          • First post
                            Last post
                          0
                          • Categories
                          • Recent
                          • Tags
                          • Popular
                          • World
                          • Users
                          • Groups