Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Could The Sony Attacks Happen Again? Join The Conversation
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
1/26/2015 | 9:46:02 PM
False flag?
A tiny part of me (the itty-bitty ridiculous-conspiracy-theory part) wonders if the whole thing was a false flag attack perpetrated by Sony itself as a publicity stunt for The Interview.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
1/23/2015 | 4:38:14 PM
Re: Awesome topic, great speakers
So noted, Gonz. We may not be hitting this exact topic immediately. But we've got some other great show in the pipeline, so stay tuned.  
GonzSTL
100%
0%
GonzSTL,
User Rank: Ninja
1/23/2015 | 3:20:27 PM
Re: Awesome topic, great speakers
@Marilyn: One hour was not nearly enough for that topic. It would be nice if we can revisit it with different speakers, so see other viewpoints. I thoroughly enjoyed that DR Radio episode. We need more!
Marilyn Cohodas
100%
0%
Marilyn Cohodas,
User Rank: Strategist
1/23/2015 | 1:59:54 PM
Re: Awesome topic, great speakers
The chat thread had some good comments about the significance of this event. From CrowdStrike's George Kurtz:

I think this attack will set a blue print for others.  Can you imagine an enterprise wide crypto locker.  So instead of making a political statement, the groups will say wire $10M bucks in 2 hours or you won't have any systems.  How many companies will pay?  I bet a lot.

More here. 
jries921
50%
50%
jries921,
User Rank: Ninja
1/22/2015 | 1:26:36 PM
Re: Awesome topic, great speakers
I think the question is a no-brainer; of course it will happen again.  The technology exists and vigilantism has long been rife among those who claim the right to regulate the speech, political activity, and artistic output of others.  The questions are what can be done about it and how effective contemplated measures are likely to be.

 
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
1/21/2015 | 10:41:36 PM
Re: Available After Broadcast?
All Dark Reading Radio shows are archived on the site--just visit the link to the show, and you will be able to play it back. Thank you for your interest!
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/21/2015 | 6:01:31 PM
Re: Available After Broadcast?
Yes. That is something I wonder too, is it recorded at all. It will be good to hear what other would say.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/21/2015 | 5:59:44 PM
Re: probably...
I think it is less about locking down the network but more about applying right security measure at the right place. If the administrator is willing to share their passwords you have security awareness and training issues that need to be addressed.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/21/2015 | 5:57:26 PM
Re: Awesome topic, great speakers
Yes, I was wondering their point of view. Obviously this subject does not go away because of lack of information and disagreement between government and experts on security.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/21/2015 | 5:55:07 PM
No, not really
Sorry I missed this. Exciting subject. While I doubt that Sonny attack would happen again as it was executed and impact of it, I am sure we will experience far more serious security breaches. Cyberattacks are just starting with this level of sophistication and it involves governments any more. So wait and see.
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.