Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Could The Sony Attacks Happen Again? Join The Conversation
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Joe Stanganelli
Joe Stanganelli,
User Rank: Ninja
1/26/2015 | 9:46:02 PM
False flag?
A tiny part of me (the itty-bitty ridiculous-conspiracy-theory part) wonders if the whole thing was a false flag attack perpetrated by Sony itself as a publicity stunt for The Interview.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
1/23/2015 | 4:38:14 PM
Re: Awesome topic, great speakers
So noted, Gonz. We may not be hitting this exact topic immediately. But we've got some other great show in the pipeline, so stay tuned.  
GonzSTL
GonzSTL,
User Rank: Ninja
1/23/2015 | 3:20:27 PM
Re: Awesome topic, great speakers
@Marilyn: One hour was not nearly enough for that topic. It would be nice if we can revisit it with different speakers, so see other viewpoints. I thoroughly enjoyed that DR Radio episode. We need more!
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
1/23/2015 | 1:59:54 PM
Re: Awesome topic, great speakers
The chat thread had some good comments about the significance of this event. From CrowdStrike's George Kurtz:

I think this attack will set a blue print for others.  Can you imagine an enterprise wide crypto locker.  So instead of making a political statement, the groups will say wire $10M bucks in 2 hours or you won't have any systems.  How many companies will pay?  I bet a lot.

More here. 
jries921
jries921,
User Rank: Ninja
1/22/2015 | 1:26:36 PM
Re: Awesome topic, great speakers
I think the question is a no-brainer; of course it will happen again.  The technology exists and vigilantism has long been rife among those who claim the right to regulate the speech, political activity, and artistic output of others.  The questions are what can be done about it and how effective contemplated measures are likely to be.

 
Kelly Jackson Higgins
Kelly Jackson Higgins,
User Rank: Strategist
1/21/2015 | 10:41:36 PM
Re: Available After Broadcast?
All Dark Reading Radio shows are archived on the site--just visit the link to the show, and you will be able to play it back. Thank you for your interest!
Dr.T
Dr.T,
User Rank: Ninja
1/21/2015 | 6:01:31 PM
Re: Available After Broadcast?
Yes. That is something I wonder too, is it recorded at all. It will be good to hear what other would say.
Dr.T
Dr.T,
User Rank: Ninja
1/21/2015 | 5:59:44 PM
Re: probably...
I think it is less about locking down the network but more about applying right security measure at the right place. If the administrator is willing to share their passwords you have security awareness and training issues that need to be addressed.
Dr.T
Dr.T,
User Rank: Ninja
1/21/2015 | 5:57:26 PM
Re: Awesome topic, great speakers
Yes, I was wondering their point of view. Obviously this subject does not go away because of lack of information and disagreement between government and experts on security.
Dr.T
Dr.T,
User Rank: Ninja
1/21/2015 | 5:55:07 PM
No, not really
Sorry I missed this. Exciting subject. While I doubt that Sonny attack would happen again as it was executed and impact of it, I am sure we will experience far more serious security breaches. Cyberattacks are just starting with this level of sophistication and it involves governments any more. So wait and see.
Page 1 / 2   >   >>


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-42003
PUBLISHED: 2022-10-02
In FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.
CVE-2022-42004
PUBLISHED: 2022-10-02
In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.
CVE-2022-42002
PUBLISHED: 2022-10-01
SonicJS through 0.6.0 allows file overwrite. It has the following mutations that are used for updating files: fileCreate and fileUpdate. Both of these mutations can be called without any authentication to overwrite any files on a SonicJS application, leading to Arbitrary File Write and Delete.
CVE-2022-39268
PUBLISHED: 2022-09-30
### Impact In a CSRF attack, an innocent end user is tricked by an attacker into submitting a web request that they did not intend. This may cause actions to be performed on the website that can include inadvertent client or server data leakage, change of session state, or manipulation of an end use...
CVE-2022-34428
PUBLISHED: 2022-09-30
Dell Hybrid Client prior to version 1.8 contains a Regular Expression Denial of Service Vulnerability in the UI. An adversary with WMS group admin access could potentially exploit this vulnerability, leading to temporary denial-of-service.