Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
When Hackers Hack Hackers
Newest First  |  Oldest First  |  Threaded View
mikeroch
100%
0%
mikeroch,
User Rank: Apprentice
2/15/2017 | 8:13:56 AM
Re: More Interesting than a Standard Exploit 192.168.1.1
Hello sir, I am absolutely agree with your saying, it is the stuff that shows human tendency, the rivalry between hackers and a piece of show off can also lead to such happenings, where hackers hack hackers.
alphaa10
100%
0%
alphaa10,
User Rank: Strategist
2/11/2017 | 6:48:41 AM
More Interesting than a Standard Exploit Story
As expected, hacker warfare demonstrates only the human tendency for turf-building and defense. What should be great consolation to civilians already hit by hackers is realization even the worst criminal operators are vulnerable, at some point, to some degree. All it takes is a persistent probe, and the rest is literally to worm through the defense perimenter.

The security story of the decade is the massive array of national resources around the world now devoted to state actor exploits-- both leading them and defending against them. By no accident, the NSA just expanded facilities with an architectural antitheis to its inscrutably dark monolith of a building in DC. The new NSA complex, located in the Utah desert, and entirely reflective white, is a virtual black hole for the world's data.

This article is a fresh perspective, but its tedious slide show format should be outlawed. When we readers see the tell-tale slide navigation controls, we already have been negatively conditioned by other slide shows. The fact we read the story, anyway, means your actual reader interest might double with a normal, single "page" article. (Yes, of course, we promise to read and click each ad-- just set them aside for us in a corner.)

Appreciate the links-- that saves us rediscovery, and a lot of time. Besides, DR sometimes offers a unique, gem of a link to richer material-- which is actually likely, since there is simply too much of the stuff to read with the same depth of attention.


Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-26250
PUBLISHED: 2020-12-01
OAuthenticator is an OAuth login mechanism for JupyterHub. In oauthenticator from version 0.12.0 and before 0.12.2, the deprecated (in jupyterhub 1.2) configuration `Authenticator.whitelist`, which should be transparently mapped to `Authenticator.allowed_users` with a warning, is instead ignored by ...
CVE-2020-28576
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version and build information.
CVE-2020-28577
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal server hostname and db names.
CVE-2020-28582
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal number of managed agents.
CVE-2020-28583
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version, build and patch information.