Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Listening to cybersecurity people freak out over Mythos is so tiring.

Listening to cybersecurity people freak out over Mythos is so tiring.

Scheduled Pinned Locked Moved Uncategorized
45 Posts 35 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

    Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

    varx@defcon.socialV This user is from outside of this forum
    varx@defcon.socialV This user is from outside of this forum
    varx@defcon.social
    wrote last edited by
    #31

    @malwaretech That's the new meta strategy man. When the execs ask "What are you doing to protect against mythos?!" Just pull out the OWASP top ten.

    1 Reply Last reply
    0
    • W wouter@maly.io

      @malwaretech excellent point.

      A lot of infrastructure runs outdated software.

      But thankfully, most of these systems are not connected to the internet.

      drwho@masto.hackers.townD This user is from outside of this forum
      drwho@masto.hackers.townD This user is from outside of this forum
      drwho@masto.hackers.town
      wrote last edited by
      #32

      @Wouter @malwaretech If only that were true.

      W 1 Reply Last reply
      0
      • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

        Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

        acdha@code4lib.socialA This user is from outside of this forum
        acdha@code4lib.socialA This user is from outside of this forum
        acdha@code4lib.social
        wrote last edited by
        #33

        @malwaretech I think you're right about the hype level but I think there is something to the idea that all of the places which were gambling on obscurity as their primary defense are probably going to find that strategy looks even worse.

        1 Reply Last reply
        0
        • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

          Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

          t2r@infosec.exchangeT This user is from outside of this forum
          t2r@infosec.exchangeT This user is from outside of this forum
          t2r@infosec.exchange
          wrote last edited by
          #34

          @malwaretech The Internet being held together by string and bubble gum is not far from the truth.

          1 Reply Last reply
          0
          • pixelate@tweesecake.socialP pixelate@tweesecake.social shared this topic
          • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

            Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

            ninestonesclose@mastodon.socialN This user is from outside of this forum
            ninestonesclose@mastodon.socialN This user is from outside of this forum
            ninestonesclose@mastodon.social
            wrote last edited by
            #35

            @malwaretech so true

            1 Reply Last reply
            0
            • drwho@masto.hackers.townD drwho@masto.hackers.town

              @Wouter @malwaretech If only that were true.

              W This user is from outside of this forum
              W This user is from outside of this forum
              wouter@maly.io
              wrote last edited by
              #36

              @drwho @malwaretech
              That is a problem from a cybersecurity standpoint.

              drwho@masto.hackers.townD 1 Reply Last reply
              0
              • W wouter@maly.io

                @drwho @malwaretech
                That is a problem from a cybersecurity standpoint.

                drwho@masto.hackers.townD This user is from outside of this forum
                drwho@masto.hackers.townD This user is from outside of this forum
                drwho@masto.hackers.town
                wrote last edited by
                #37

                @Wouter @malwaretech No kidding. The entire community has been lamenting this for two decades now.

                1 Reply Last reply
                0
                • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

                  Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

                  newk@infosec.exchangeN This user is from outside of this forum
                  newk@infosec.exchangeN This user is from outside of this forum
                  newk@infosec.exchange
                  wrote last edited by
                  #38

                  @malwaretech

                  Fuck Mythos and marketing bullshit, but AI that immensely reduces time-to-exploit is real. Companies are not prepared for it.

                  1 Reply Last reply
                  0
                  • sancla@infosec.exchangeS sancla@infosec.exchange

                    @eliasp @malwaretech
                    Most like yes, but either way focus is getting stronger on supply chains.

                    Hopefully, it’ll get companies depending on open source scratching their heads abut this and get them more involved into open source.

                    Then again, corporate involvement may not always be the best influence for open source, time will tell and fingers crossed…

                    markush@chaos.socialM This user is from outside of this forum
                    markush@chaos.socialM This user is from outside of this forum
                    markush@chaos.social
                    wrote last edited by
                    #39

                    @sancla @eliasp @malwaretech it will get lots of companies drop some of their open source tools/libraries for proprietary ones, where they can then shift the blame onto some other company when things go south.

                    1 Reply Last reply
                    0
                    • mossyfoot@pdx.socialM mossyfoot@pdx.social

                      @malwaretech until recently, all ATMs ran a crazy version of Windows XP and now they run a crazy "IoT" version of Windows 11. Instead, of, say, something like SELinux. Something halfway sane.

                      cesarb@mastodon.socialC This user is from outside of this forum
                      cesarb@mastodon.socialC This user is from outside of this forum
                      cesarb@mastodon.social
                      wrote last edited by
                      #40

                      @mossyfoot @malwaretech As recently as this week, I used an ATM which had that "please activate Windows" watermark visible in the corner of the screen. (At least the other bank AFAIK uses Linux for its ATMs, replacing the OS/2 they used previously.)

                      mossyfoot@pdx.socialM 1 Reply Last reply
                      0
                      • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

                        Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

                        beasts@social.mythic-beasts.comB This user is from outside of this forum
                        beasts@social.mythic-beasts.comB This user is from outside of this forum
                        beasts@social.mythic-beasts.com
                        wrote last edited by
                        #41

                        @malwaretech be fair! We secured BGP with lots of crypto, but then left an XSS exploit in the crypto control panel allowing your entire network to get de-routed with one mis-click. https://mxsasha.eu/posts/ripe-ncc-rpki-exploit-chain/

                        1 Reply Last reply
                        0
                        • cesarb@mastodon.socialC cesarb@mastodon.social

                          @mossyfoot @malwaretech As recently as this week, I used an ATM which had that "please activate Windows" watermark visible in the corner of the screen. (At least the other bank AFAIK uses Linux for its ATMs, replacing the OS/2 they used previously.)

                          mossyfoot@pdx.socialM This user is from outside of this forum
                          mossyfoot@pdx.socialM This user is from outside of this forum
                          mossyfoot@pdx.social
                          wrote last edited by
                          #42

                          @cesarb @malwaretech oh wow. I haven't seen an OS/2 warp machine in a long time.

                          1 Reply Last reply
                          0
                          • darwinwoodka@mastodon.socialD darwinwoodka@mastodon.social

                            @nav @malwaretech

                            Indeed, all us fossils live here on Mastodon, it's the only social media we can still stand.

                            iamdannyboling@mstdn.socialI This user is from outside of this forum
                            iamdannyboling@mstdn.socialI This user is from outside of this forum
                            iamdannyboling@mstdn.social
                            wrote last edited by
                            #43

                            @darwinwoodka @nav @malwaretech

                            Indeed, 'tis true.

                            jakobtougaard@mastodon.onlineJ 1 Reply Last reply
                            0
                            • erikbussink@vmst.ioE erikbussink@vmst.io

                              @gsuberland @floe @malwaretech And two days later the hired tiger team launched a full vulnerability scan against it … because … tiger team manager did not communicate. Banking system down for a few days…

                              iamdannyboling@mstdn.socialI This user is from outside of this forum
                              iamdannyboling@mstdn.socialI This user is from outside of this forum
                              iamdannyboling@mstdn.social
                              wrote last edited by
                              #44

                              @ErikBussink @gsuberland @floe @malwaretech

                              "We're being scanned, Captain."
                              "Shut it down. Shut it all down."
                              🫡 🖖

                              1 Reply Last reply
                              0
                              • iamdannyboling@mstdn.socialI iamdannyboling@mstdn.social

                                @darwinwoodka @nav @malwaretech

                                Indeed, 'tis true.

                                jakobtougaard@mastodon.onlineJ This user is from outside of this forum
                                jakobtougaard@mastodon.onlineJ This user is from outside of this forum
                                jakobtougaard@mastodon.online
                                wrote last edited by
                                #45

                                @IAmDannyBoling @darwinwoodka @nav @malwaretech
                                One of my classmates in high school borrowed his dad's "portable" phone now and then. It looked like this one:

                                Link Preview Image
                                1 Reply Last reply
                                0
                                Reply
                                • Reply as topic
                                Log in to reply
                                • Oldest to Newest
                                • Newest to Oldest
                                • Most Votes


                                • Login

                                • Login or register to search.
                                • First post
                                  Last post
                                0
                                • Categories
                                • Recent
                                • Tags
                                • Popular
                                • World
                                • Users
                                • Groups