Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Crowdsourcing & Cyber Security: Who Do You Trust?
Newest First  |  Oldest First  |  Threaded View
RyanSepe
RyanSepe,
User Rank: Ninja
6/29/2014 | 5:58:02 PM
Re: From FOSS Came Crowdsourcing
I agree with you and have alluded to many of the same principles in another article posted. A higher emphasis needs to be put on penetration testing from a party that does not have malicious intent. Many of the security safeguards today are preventative or corrective meaning that they are both to some capacity reactive.

As you say, we need to think like the "dark side" and try to uncover threats and new intrusion methodologies before users of malicious intent do. This is one of the only ways I can see us alleviating some of the potential dangers of zero days.
RetiredUser
RetiredUser,
User Rank: Ninja
6/25/2014 | 1:38:34 AM
From FOSS Came Crowdsourcing
Well, maybe crowdsourcing wasn't strictly borne from the Free and Open Source Software (FOSS) communities, but it's improved because of them, I believe. I also believe strongly in this model, and I would argue that all along, hackers have been doing this, albeit some on the cyber crime side of things. Often the "everyman" of the enterprise community needs to evolve to think more like the dark side. I wouldn't say that crowdsourcing is beating the enemy because it is a superior methodology to what the hacker and cracker communities (yes, and old ones, at that) are doing, but rather it is moving computer internet security forward because the enterprise is finally catching up with the enemy.

As systems, component applications, their source code and vulnerabilities become more "open" (apologies to Richard Stallman for using the "o" word), everyone is empowered through the ability to make improvements, fix vulnerabilities and share the burden across the community.  One of the killers of the old guard of enterprise models was that everything was closed off, and while each IT silo was on its own, crackers and hackers the world over were sharing tech, exploits and trading anecdotes, strengthening the community and making it more deadly.

About time we got on board and evolved to their level.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
6/24/2014 | 3:57:35 PM
Good overview on pluses & minuses of crowdsourcing cyber security
Nice blog, Bob. I wonder if you'd care to expand on which "hows" you mention present th greatest challenges for crowdsourcing security. They also sound quite formidable to me! 


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Black Hat USA 2022 Attendee Report
Black Hat attendees are not sleeping well. Between concerns about attacks against cloud services, ransomware, and the growing risks to the global supply chain, these security pros have a lot to be worried about. Read our 2022 report to hear what they're concerned about now.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-2846
PUBLISHED: 2022-08-16
A vulnerability classified as problematic was found in Calendar Event Multi View Plugin. This vulnerability affects unknown code of the file /wp/?cpmvc_id=1&cpmvc_do_action=mvparse&f=datafeed&calid=1&month_index=1&method=adddetails&id=2. The manipulation leads to cross-site r...
CVE-2022-2847
PUBLISHED: 2022-08-16
A vulnerability, which was classified as critical, has been found in SourceCodester Guest Management System. This issue affects some unknown processing of the file /guestmanagement/front.php. The manipulation of the argument rid leads to sql injection. The attack may be initiated remotely. The explo...
CVE-2021-39035
PUBLISHED: 2022-08-16
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially lead...
CVE-2021-39085
PUBLISHED: 2022-08-16
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the b...
CVE-2021-39086
PUBLISHED: 2022-08-16
IBM Sterling File Gateway 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the syst...