Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Listening to cybersecurity people freak out over Mythos is so tiring.

Listening to cybersecurity people freak out over Mythos is so tiring.

Scheduled Pinned Locked Moved Uncategorized
45 Posts 35 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • sancla@infosec.exchangeS sancla@infosec.exchange

    @malwaretech I don’t care, if this puts security back on the agenda, I’ll take it…

    misusecase@twit.socialM This user is from outside of this forum
    misusecase@twit.socialM This user is from outside of this forum
    misusecase@twit.social
    wrote last edited by
    #19

    @sancla @malwaretech This is like the dozen or so times before it when dudes in the C-suite have gone all-in on some hype technology, product, or cyberattack instead of doing basic things like vulnerability and patch management. This kind of “agenda” we don’t need.

    1 Reply Last reply
    0
    • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

      Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

      guigsy@mstdn.socialG This user is from outside of this forum
      guigsy@mstdn.socialG This user is from outside of this forum
      guigsy@mstdn.social
      wrote last edited by
      #20

      @malwaretech I work in a large company that was hacked last year. Many modern systems were compromised. The RS6000 box and several of our ancient mainframes were untouched and weren't even turned off during the lockdown or recovery. Gave them a quick once over and they kept ticking like it was 1999.

      1 Reply Last reply
      0
      • gsuberland@chaos.socialG gsuberland@chaos.social

        @floe @malwaretech you know it's great when you walk into the place and someone immediately hands you a piece of paper with both the IP address and MAC address of this thing and says "do not send ANYTHING to this machine, we are terrified of breaking it"

        erikbussink@vmst.ioE This user is from outside of this forum
        erikbussink@vmst.ioE This user is from outside of this forum
        erikbussink@vmst.io
        wrote last edited by
        #21

        @gsuberland @floe @malwaretech And two days later the hired tiger team launched a full vulnerability scan against it … because … tiger team manager did not communicate. Banking system down for a few days…

        iamdannyboling@mstdn.socialI 1 Reply Last reply
        0
        • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

          Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

          mossyfoot@pdx.socialM This user is from outside of this forum
          mossyfoot@pdx.socialM This user is from outside of this forum
          mossyfoot@pdx.social
          wrote last edited by
          #22

          @malwaretech until recently, all ATMs ran a crazy version of Windows XP and now they run a crazy "IoT" version of Windows 11. Instead, of, say, something like SELinux. Something halfway sane.

          cesarb@mastodon.socialC 1 Reply Last reply
          0
          • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

            Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

            rrb@infosec.exchangeR This user is from outside of this forum
            rrb@infosec.exchangeR This user is from outside of this forum
            rrb@infosec.exchange
            wrote last edited by
            #23

            @malwaretech I think it would be kinda cool.

            1 Reply Last reply
            0
            • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

              Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

              simonzerafa@infosec.exchangeS This user is from outside of this forum
              simonzerafa@infosec.exchangeS This user is from outside of this forum
              simonzerafa@infosec.exchange
              wrote last edited by
              #24

              @malwaretech

              Well only hijack / hack mobile connection when it's really necessary like when your princess has escaped and you want to kidnap her back.

              1 Reply Last reply
              0
              • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

                Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

                jonnyt@mastodon.me.ukJ This user is from outside of this forum
                jonnyt@mastodon.me.ukJ This user is from outside of this forum
                jonnyt@mastodon.me.uk
                wrote last edited by
                #25

                @malwaretech And your company CEO's password is password.

                1 Reply Last reply
                0
                • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

                  Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

                  steff@soc.femme.catS This user is from outside of this forum
                  steff@soc.femme.catS This user is from outside of this forum
                  steff@soc.femme.cat
                  wrote last edited by
                  #26

                  @malwaretech@infosec.exchange It's awesome everyone focuses on new exploits and zero-day attacks while their company's leaders will just blithely follow any link in an e-mail sent to them.

                  drwho@masto.hackers.townD 1 Reply Last reply
                  0
                  • nav@mstdn.socialN nav@mstdn.social

                    @malwaretech I think you underestimate how ancient some of us are. I'm definitely older than anything my mobile provider owns, cos I'm older than the industry.

                    darwinwoodka@mastodon.socialD This user is from outside of this forum
                    darwinwoodka@mastodon.socialD This user is from outside of this forum
                    darwinwoodka@mastodon.social
                    wrote last edited by
                    #27

                    @nav @malwaretech

                    Indeed, all us fossils live here on Mastodon, it's the only social media we can still stand.

                    iamdannyboling@mstdn.socialI 1 Reply Last reply
                    0
                    • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

                      Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

                      W This user is from outside of this forum
                      W This user is from outside of this forum
                      wouter@maly.io
                      wrote last edited by
                      #28

                      @malwaretech excellent point.

                      A lot of infrastructure runs outdated software.

                      But thankfully, most of these systems are not connected to the internet.

                      drwho@masto.hackers.townD 1 Reply Last reply
                      0
                      • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

                        Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

                        drwho@masto.hackers.townD This user is from outside of this forum
                        drwho@masto.hackers.townD This user is from outside of this forum
                        drwho@masto.hackers.town
                        wrote last edited by
                        #29

                        @malwaretech Can I quote you on that?

                        1 Reply Last reply
                        0
                        • steff@soc.femme.catS steff@soc.femme.cat

                          @malwaretech@infosec.exchange It's awesome everyone focuses on new exploits and zero-day attacks while their company's leaders will just blithely follow any link in an e-mail sent to them.

                          drwho@masto.hackers.townD This user is from outside of this forum
                          drwho@masto.hackers.townD This user is from outside of this forum
                          drwho@masto.hackers.town
                          wrote last edited by
                          #30

                          @steff @malwaretech And all six hundred AWS instances have port 22/tcpb exposed on public IP addresses, and use password authentication.

                          1 Reply Last reply
                          0
                          • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

                            Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

                            varx@defcon.socialV This user is from outside of this forum
                            varx@defcon.socialV This user is from outside of this forum
                            varx@defcon.social
                            wrote last edited by
                            #31

                            @malwaretech That's the new meta strategy man. When the execs ask "What are you doing to protect against mythos?!" Just pull out the OWASP top ten.

                            1 Reply Last reply
                            0
                            • W wouter@maly.io

                              @malwaretech excellent point.

                              A lot of infrastructure runs outdated software.

                              But thankfully, most of these systems are not connected to the internet.

                              drwho@masto.hackers.townD This user is from outside of this forum
                              drwho@masto.hackers.townD This user is from outside of this forum
                              drwho@masto.hackers.town
                              wrote last edited by
                              #32

                              @Wouter @malwaretech If only that were true.

                              W 1 Reply Last reply
                              0
                              • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

                                Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

                                acdha@code4lib.socialA This user is from outside of this forum
                                acdha@code4lib.socialA This user is from outside of this forum
                                acdha@code4lib.social
                                wrote last edited by
                                #33

                                @malwaretech I think you're right about the hype level but I think there is something to the idea that all of the places which were gambling on obscurity as their primary defense are probably going to find that strategy looks even worse.

                                1 Reply Last reply
                                0
                                • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

                                  Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

                                  t2r@infosec.exchangeT This user is from outside of this forum
                                  t2r@infosec.exchangeT This user is from outside of this forum
                                  t2r@infosec.exchange
                                  wrote last edited by
                                  #34

                                  @malwaretech The Internet being held together by string and bubble gum is not far from the truth.

                                  1 Reply Last reply
                                  0
                                  • pixelate@tweesecake.socialP pixelate@tweesecake.social shared this topic
                                  • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

                                    Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

                                    ninestonesclose@mastodon.socialN This user is from outside of this forum
                                    ninestonesclose@mastodon.socialN This user is from outside of this forum
                                    ninestonesclose@mastodon.social
                                    wrote last edited by
                                    #35

                                    @malwaretech so true

                                    1 Reply Last reply
                                    0
                                    • drwho@masto.hackers.townD drwho@masto.hackers.town

                                      @Wouter @malwaretech If only that were true.

                                      W This user is from outside of this forum
                                      W This user is from outside of this forum
                                      wouter@maly.io
                                      wrote last edited by
                                      #36

                                      @drwho @malwaretech
                                      That is a problem from a cybersecurity standpoint.

                                      drwho@masto.hackers.townD 1 Reply Last reply
                                      0
                                      • W wouter@maly.io

                                        @drwho @malwaretech
                                        That is a problem from a cybersecurity standpoint.

                                        drwho@masto.hackers.townD This user is from outside of this forum
                                        drwho@masto.hackers.townD This user is from outside of this forum
                                        drwho@masto.hackers.town
                                        wrote last edited by
                                        #37

                                        @Wouter @malwaretech No kidding. The entire community has been lamenting this for two decades now.

                                        1 Reply Last reply
                                        0
                                        • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

                                          Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

                                          newk@infosec.exchangeN This user is from outside of this forum
                                          newk@infosec.exchangeN This user is from outside of this forum
                                          newk@infosec.exchange
                                          wrote last edited by
                                          #38

                                          @malwaretech

                                          Fuck Mythos and marketing bullshit, but AI that immensely reduces time-to-exploit is real. Companies are not prepared for it.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups