Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. For those getting questions about Glasswing from their executives, give them this article.

For those getting questions about Glasswing from their executives, give them this article.

Scheduled Pinned Locked Moved Uncategorized
16 Posts 5 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • cr0w@infosec.exchangeC cr0w@infosec.exchange

    @Sempf Yeah, that's a no for me. My risk models remain unchanged.

    He is right that AI gives us the catalyst and the tools.

    sempf@infosec.exchangeS This user is from outside of this forum
    sempf@infosec.exchangeS This user is from outside of this forum
    sempf@infosec.exchange
    wrote last edited by
    #3

    @cR0w When you say your risk models remain unchanged, does that mean you are not receiving pressure from management to change them due to Glass Wing, or that you already have and you're not changing them back?

    darkuncle@infosec.exchangeD cr0w@infosec.exchangeC 2 Replies Last reply
    0
    • sempf@infosec.exchangeS sempf@infosec.exchange

      @cR0w When you say your risk models remain unchanged, does that mean you are not receiving pressure from management to change them due to Glass Wing, or that you already have and you're not changing them back?

      darkuncle@infosec.exchangeD This user is from outside of this forum
      darkuncle@infosec.exchangeD This user is from outside of this forum
      darkuncle@infosec.exchange
      wrote last edited by
      #4

      @Sempf @cR0w "We have a different question. When did zero days become the threat you were supposed to be worried about?"

      I mean, yeah, but also just because somebody is doing the basics poorly does not mean that advanced techniques are not *also* a threat. Many threats simultaneously! And some of them just became more risky and easier for attackers to leverage ...

      cr0w@infosec.exchangeC 1 Reply Last reply
      0
      • sempf@infosec.exchangeS sempf@infosec.exchange

        @cR0w When you say your risk models remain unchanged, does that mean you are not receiving pressure from management to change them due to Glass Wing, or that you already have and you're not changing them back?

        cr0w@infosec.exchangeC This user is from outside of this forum
        cr0w@infosec.exchangeC This user is from outside of this forum
        cr0w@infosec.exchange
        wrote last edited by
        #5

        @Sempf Not just Glasswing but every new AI hype comes to my team like it's some major new threat, but the only thing that seems to change is the scope and scale of individual attackers, not the state of the art. I have yet to see novel vulnerabilities or new attack paths discovered with any AI system yet. If it can only find a bunch of existing vuln classes, then it should already be addressed. If not, then the model was broken and now is a great time to update it. I don't see a difference between AI finding new things and APT69420 finding new things. Because they're not really that new. They haven't been for a while.

        1 Reply Last reply
        0
        • darkuncle@infosec.exchangeD darkuncle@infosec.exchange

          @Sempf @cR0w "We have a different question. When did zero days become the threat you were supposed to be worried about?"

          I mean, yeah, but also just because somebody is doing the basics poorly does not mean that advanced techniques are not *also* a threat. Many threats simultaneously! And some of them just became more risky and easier for attackers to leverage ...

          cr0w@infosec.exchangeC This user is from outside of this forum
          cr0w@infosec.exchangeC This user is from outside of this forum
          cr0w@infosec.exchange
          wrote last edited by
          #6

          @darkuncle @Sempf Easier for attackers means a potentially higher likelihood of occurrence, but it does not change the severity of impact. And while the likelihood does theoretically impact the risk score, for at least some orgs, it's minimal to no change when your adversaries are at the top of the field already. The rising tide of AI may be lifting all attackers' boats, but the high water mark remains the same, despite the industry continuously claiming a tsunami is coming. I just don't see it.

          rootwyrm@weird.autosR sempf@infosec.exchangeS darkuncle@infosec.exchangeD 3 Replies Last reply
          0
          • cr0w@infosec.exchangeC cr0w@infosec.exchange

            @darkuncle @Sempf Easier for attackers means a potentially higher likelihood of occurrence, but it does not change the severity of impact. And while the likelihood does theoretically impact the risk score, for at least some orgs, it's minimal to no change when your adversaries are at the top of the field already. The rising tide of AI may be lifting all attackers' boats, but the high water mark remains the same, despite the industry continuously claiming a tsunami is coming. I just don't see it.

            rootwyrm@weird.autosR This user is from outside of this forum
            rootwyrm@weird.autosR This user is from outside of this forum
            rootwyrm@weird.autos
            wrote last edited by
            #7

            @cR0w @darkuncle @Sempf if the first question asked isn't "where's the proof" then people aren't doing their jobs. And Anthropic shitting their pants on command is not proof. They claimed GPT2 was 'too dangerous to release.'

            So where's the proof?

            An un-exploitable bogus OpenBSD bug that was only validated by themselves?
            A research paper they wrote with Claude with a whole lot of fabricated crap?

            Where. Is. The. Proof?

            Answer: there is none and never will be.

            sempf@infosec.exchangeS 1 Reply Last reply
            0
            • cr0w@infosec.exchangeC cr0w@infosec.exchange

              @darkuncle @Sempf Easier for attackers means a potentially higher likelihood of occurrence, but it does not change the severity of impact. And while the likelihood does theoretically impact the risk score, for at least some orgs, it's minimal to no change when your adversaries are at the top of the field already. The rising tide of AI may be lifting all attackers' boats, but the high water mark remains the same, despite the industry continuously claiming a tsunami is coming. I just don't see it.

              sempf@infosec.exchangeS This user is from outside of this forum
              sempf@infosec.exchangeS This user is from outside of this forum
              sempf@infosec.exchange
              wrote last edited by
              #8

              @cR0w @darkuncle You should start a blog. Oh, wait.

              cr0w@infosec.exchangeC 1 Reply Last reply
              0
              • sempf@infosec.exchangeS sempf@infosec.exchange

                @cR0w @darkuncle You should start a blog. Oh, wait.

                cr0w@infosec.exchangeC This user is from outside of this forum
                cr0w@infosec.exchangeC This user is from outside of this forum
                cr0w@infosec.exchange
                wrote last edited by
                #9

                @Sempf @darkuncle

                nosirrahsec@infosec.exchangeN 1 Reply Last reply
                0
                • rootwyrm@weird.autosR rootwyrm@weird.autos

                  @cR0w @darkuncle @Sempf if the first question asked isn't "where's the proof" then people aren't doing their jobs. And Anthropic shitting their pants on command is not proof. They claimed GPT2 was 'too dangerous to release.'

                  So where's the proof?

                  An un-exploitable bogus OpenBSD bug that was only validated by themselves?
                  A research paper they wrote with Claude with a whole lot of fabricated crap?

                  Where. Is. The. Proof?

                  Answer: there is none and never will be.

                  sempf@infosec.exchangeS This user is from outside of this forum
                  sempf@infosec.exchangeS This user is from outside of this forum
                  sempf@infosec.exchange
                  wrote last edited by
                  #10

                  @rootwyrm @cR0w @darkuncle I believe that is exactly correct. As I mentioned somewhere, open up a developer console on any browser on any website of any size and significance, and you'll see 7,000 vulnerabilities in the JavaScript. Absolutely none of them are exploitable for anything useful at all. They don't really matter, and I would imagine that 99.997% of the things that are showing up in this magic report are going to be exactly like that.

                  cr0w@infosec.exchangeC 1 Reply Last reply
                  0
                  • sempf@infosec.exchangeS sempf@infosec.exchange

                    @rootwyrm @cR0w @darkuncle I believe that is exactly correct. As I mentioned somewhere, open up a developer console on any browser on any website of any size and significance, and you'll see 7,000 vulnerabilities in the JavaScript. Absolutely none of them are exploitable for anything useful at all. They don't really matter, and I would imagine that 99.997% of the things that are showing up in this magic report are going to be exactly like that.

                    cr0w@infosec.exchangeC This user is from outside of this forum
                    cr0w@infosec.exchangeC This user is from outside of this forum
                    cr0w@infosec.exchange
                    wrote last edited by
                    #11

                    @Sempf @rootwyrm @darkuncle If even that.

                    sempf@infosec.exchangeS 1 Reply Last reply
                    0
                    • cr0w@infosec.exchangeC cr0w@infosec.exchange

                      @Sempf @rootwyrm @darkuncle If even that.

                      sempf@infosec.exchangeS This user is from outside of this forum
                      sempf@infosec.exchangeS This user is from outside of this forum
                      sempf@infosec.exchange
                      wrote last edited by
                      #12

                      @cR0w @rootwyrm @darkuncle But out of curiosity, are you getting questions from your management? None of my clients have said a word one, and several of them are very AI focused.

                      cr0w@infosec.exchangeC rootwyrm@weird.autosR 2 Replies Last reply
                      0
                      • sempf@infosec.exchangeS sempf@infosec.exchange

                        @cR0w @rootwyrm @darkuncle But out of curiosity, are you getting questions from your management? None of my clients have said a word one, and several of them are very AI focused.

                        cr0w@infosec.exchangeC This user is from outside of this forum
                        cr0w@infosec.exchangeC This user is from outside of this forum
                        cr0w@infosec.exchange
                        wrote last edited by
                        #13

                        @Sempf @rootwyrm @darkuncle I did for a while, but then they found out I'm skeptical but back up my skepticism when asked so they stopped asking me for the most part. They ask the AI fans now.

                        1 Reply Last reply
                        0
                        • sempf@infosec.exchangeS sempf@infosec.exchange

                          @cR0w @rootwyrm @darkuncle But out of curiosity, are you getting questions from your management? None of my clients have said a word one, and several of them are very AI focused.

                          rootwyrm@weird.autosR This user is from outside of this forum
                          rootwyrm@weird.autosR This user is from outside of this forum
                          rootwyrm@weird.autos
                          wrote last edited by
                          #14

                          @Sempf @cR0w @darkuncle I'm one of the many in the ranks of the funemployed. But I'm definitely seeing a whole lot of gnashing of teeth and sky-is-falling shit from both management and from people who have absolutely no excuse for buying into LLM generated bullshit.

                          1 Reply Last reply
                          0
                          • cr0w@infosec.exchangeC cr0w@infosec.exchange

                            @Sempf @darkuncle

                            nosirrahsec@infosec.exchangeN This user is from outside of this forum
                            nosirrahsec@infosec.exchangeN This user is from outside of this forum
                            nosirrahsec@infosec.exchange
                            wrote last edited by
                            #15

                            @cR0w @Sempf @darkuncle I feel attacked.

                            1 Reply Last reply
                            0
                            • cr0w@infosec.exchangeC cr0w@infosec.exchange

                              @darkuncle @Sempf Easier for attackers means a potentially higher likelihood of occurrence, but it does not change the severity of impact. And while the likelihood does theoretically impact the risk score, for at least some orgs, it's minimal to no change when your adversaries are at the top of the field already. The rising tide of AI may be lifting all attackers' boats, but the high water mark remains the same, despite the industry continuously claiming a tsunami is coming. I just don't see it.

                              darkuncle@infosec.exchangeD This user is from outside of this forum
                              darkuncle@infosec.exchangeD This user is from outside of this forum
                              darkuncle@infosec.exchange
                              wrote last edited by
                              #16

                              @cR0w @Sempf that was nicely articulated, thanks

                              1 Reply Last reply
                              1
                              0
                              • R relay@relay.infosec.exchange shared this topic
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              • Login

                              • Login or register to search.
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent
                              • Tags
                              • Popular
                              • World
                              • Users
                              • Groups