Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Sony Hacked By N. Korea, Hacktivists, Ex-Employee, Or All Of The Above?
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 3   >   >>
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
12/31/2014 | 12:03:56 PM
Re: N Korea
Yep, those simulated events/fire drills are very valuable and IR companies highly recommend businesses practice them.
Ed Telders
50%
50%
Ed Telders,
User Rank: Apprentice
12/31/2014 | 11:58:11 AM
Re: N Korea
Yes indeed.  In a previous role many years ago I conducted a Business Continuity exercise for my company.  The Public Affairs team was very confident in their relationships with the media and their ability to handle the crisis communications for an event.  So we put them to the test.  I hired some Journalism students from the local university, had them using commercial grade video cameras (tells you how long ago this was) and microphones.  They were given the assignment to simply act as they really would pursuing a story and had them interview the public affairs team, in the room designated for press releases.  They had no script, they simply did exactly what a real live media team would do to cover a story.  Later we had the public affairs team review the tape and critique their own performance.  It was an eye opening experience for them.  They immediately reworked and refined their methods and procedures so that they would be better prepared for the real thing.   Its one thing to create an incident response procedure, it's another thing to actually do it.  Getting some "near reality" exercises improves their abilities as it would for any other team in a disaster scenario.  If more companies spent time exercising their response they would perform better when the real thing happens.  It also gives them the opportunity to find any flaws and weaknesses in their current response procedures and refine them.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
12/31/2014 | 11:55:10 AM
Re: N Korea
I would have to agree. The amount of pre-compiled inside pieces leans toward the idea that inside intelligence was provided. I will be interested to see how this progresses.
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
12/31/2014 | 11:41:34 AM
Re: N Korea
@Ed Telders That would be really intriguing IF it was done correctly and Sony was willing to share its lessons learned, etc.

It's yet another example of how a detailed incident response plan (including PR, public disclosure strategy/plan) is crucial to a company's image and how something like this can take on a life of its own in the media if you don't have a good game plan.
Ed Telders
50%
50%
Ed Telders,
User Rank: Apprentice
12/31/2014 | 11:32:54 AM
Re: N Korea
Kelly, actually, you may really be on to something here.  Of course all the facts are not out yet but most of them will eventually become known.  The right movie, docu-drama, or expose, done well, could really do us a great and needed service.  Given that this happened to the entertainment industry what better source for turning this really tough issue into a public forum.  The media can capture the imagination, fire the interest, and feed the need for some real awareness.  I don't mean another silly comedy movie, but one that really highlights the issues, risks, and importantly the abilities of our  cyber-adversaries.  Maybe it'll wake some folks up !!   
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
12/31/2014 | 8:48:47 AM
Re: N Korea
@Rafer33 Like, totally. ;-)
shakeeb
50%
50%
shakeeb,
User Rank: Apprentice
12/31/2014 | 2:01:20 AM
Re: N Korea
@Kelly – I am just waiting to see who was involved in this and how they did it. Seen it as a movie will be wonderful than having it as a script. 
shakeeb
50%
50%
shakeeb,
User Rank: Apprentice
12/31/2014 | 1:34:04 AM
Re: N Korea
I'm sure an ex-employee should be part of it, at least helping the hackers with a backdoor. 
Technocrati
50%
50%
Technocrati,
User Rank: Ninja
12/30/2014 | 9:38:58 PM
Re: N Korea
@Kelly   Agreed !  : ) 
Rafer33
0%
100%
Rafer33,
User Rank: Apprentice
12/30/2014 | 7:34:39 PM
Re: N Korea
"Epic breach".....learn to write....my God are you 16??
<<   <   Page 2 / 3   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25596
PUBLISHED: 2020-09-23
An issue was discovered in Xen through 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen's sanitization paths injects a #GP fault, and incorrectly delivers it twice to the guest. T...
CVE-2020-25597
PUBLISHED: 2020-09-23
An issue was discovered in Xen through 4.14.x. There is mishandling of the constraint that once-valid event channels may not turn invalid. Logic in the handling of event channel operations in Xen assumes that an event channel, once valid, will not become invalid over the life time of a guest. Howeve...
CVE-2020-25598
PUBLISHED: 2020-09-23
An issue was discovered in Xen 4.14.x. There is a missing unlock in the XENMEM_acquire_resource error path. The RCU (Read, Copy, Update) mechanism is a synchronisation primitive. A buggy error path in the XENMEM_acquire_resource exits without releasing an RCU reference, which is conceptually similar...
CVE-2020-25599
PUBLISHED: 2020-09-23
An issue was discovered in Xen through 4.14.x. There are evtchn_reset() race conditions. Uses of EVTCHNOP_reset (potentially by a guest on itself) or XEN_DOMCTL_soft_reset (by itself covered by XSA-77) can lead to the violation of various internal assumptions. This may lead to out of bounds memory a...
CVE-2020-25600
PUBLISHED: 2020-09-23
An issue was discovered in Xen through 4.14.x. Out of bounds event channels are available to 32-bit x86 domains. The so called 2-level event channel model imposes different limits on the number of usable event channels for 32-bit x86 domains vs 64-bit or Arm (either bitness) ones. 32-bit x86 domains...