Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I'm putting together a webinar on modern vulnerability management and I'm REALLY trying to drive a point home

I'm putting together a webinar on modern vulnerability management and I'm REALLY trying to drive a point home

Scheduled Pinned Locked Moved Uncategorized
5 Posts 3 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • sawaba@infosec.exchangeS This user is from outside of this forum
    sawaba@infosec.exchangeS This user is from outside of this forum
    sawaba@infosec.exchange
    wrote last edited by
    #1

    I'm putting together a webinar on modern vulnerability management and I'm REALLY trying to drive a point home

    So naturally, I bought 3 old Sonicwall firewalls

    gordondraper@infosec.exchangeG gnyman@infosec.exchangeG 2 Replies Last reply
    0
    • sawaba@infosec.exchangeS sawaba@infosec.exchange

      I'm putting together a webinar on modern vulnerability management and I'm REALLY trying to drive a point home

      So naturally, I bought 3 old Sonicwall firewalls

      gordondraper@infosec.exchangeG This user is from outside of this forum
      gordondraper@infosec.exchangeG This user is from outside of this forum
      gordondraper@infosec.exchange
      wrote last edited by
      #2

      @sawaba confused, yes there will be vulns there, but how does that lead to vuln management process… identification, prioritisation triage, remediation… how does having a “blinkin lights” lead you to a satisfactory outcome? Or is that the point… patches can fail due to badly written patches that don’t fully remediate the problem?

      sawaba@infosec.exchangeS 2 Replies Last reply
      1
      0
      • R relay@relay.infosec.exchange shared this topic
      • sawaba@infosec.exchangeS sawaba@infosec.exchange

        I'm putting together a webinar on modern vulnerability management and I'm REALLY trying to drive a point home

        So naturally, I bought 3 old Sonicwall firewalls

        gnyman@infosec.exchangeG This user is from outside of this forum
        gnyman@infosec.exchangeG This user is from outside of this forum
        gnyman@infosec.exchange
        wrote last edited by
        #3

        @sawaba worst thing is probably that there is a second hand market for these... is someone buying and installing them? IMO they should be treated as the asbestos of the 2000 🙂

        1 Reply Last reply
        0
        • gordondraper@infosec.exchangeG gordondraper@infosec.exchange

          @sawaba confused, yes there will be vulns there, but how does that lead to vuln management process… identification, prioritisation triage, remediation… how does having a “blinkin lights” lead you to a satisfactory outcome? Or is that the point… patches can fail due to badly written patches that don’t fully remediate the problem?

          sawaba@infosec.exchangeS This user is from outside of this forum
          sawaba@infosec.exchangeS This user is from outside of this forum
          sawaba@infosec.exchange
          wrote last edited by
          #4

          @gordondraper the context you're missing is that a third of ransom payments went to Akira, who is just successfully using one Sonicwall vuln over and over for the past 2 years.

          250,000+ vulnerabilities out there, but harm/losses only come from a few dozen every year.

          I bought the Sonicwalls to demonstrate how the attackers think:

          1. find a reliable exploit
          2. are there lots of exposed targets?
          3. if yes, start hitting them and profit
          4. next week: are there still lots of exposed targets?
          5. if yes, GOTO 3
          1 Reply Last reply
          0
          • gordondraper@infosec.exchangeG gordondraper@infosec.exchange

            @sawaba confused, yes there will be vulns there, but how does that lead to vuln management process… identification, prioritisation triage, remediation… how does having a “blinkin lights” lead you to a satisfactory outcome? Or is that the point… patches can fail due to badly written patches that don’t fully remediate the problem?

            sawaba@infosec.exchangeS This user is from outside of this forum
            sawaba@infosec.exchangeS This user is from outside of this forum
            sawaba@infosec.exchange
            wrote last edited by
            #5

            @gordondraper in other words, we're worried about Mythos, but folks aren't patching their network infrastructure and that's one of the main ways they're getting popped

            1 Reply Last reply
            1
            0
            Reply
            • Reply as topic
            Log in to reply
            • Oldest to Newest
            • Newest to Oldest
            • Most Votes


            • Login

            • Login or register to search.
            • First post
              Last post
            0
            • Categories
            • Recent
            • Tags
            • Popular
            • World
            • Users
            • Groups