Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Darkly)
  • No Skin
Collapse
Brand Logo
  1. Home
  2. Uncategorized
  3. Tip to CISOs - every time you hear the phrase "defenders need to move at machine speed", drink.

Tip to CISOs - every time you hear the phrase "defenders need to move at machine speed", drink.

Scheduled Pinned Locked Moved Uncategorized
9 Posts 7 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • Kevin BeaumontG This user is from outside of this forum
    Kevin BeaumontG This user is from outside of this forum
    Kevin Beaumont
    wrote last edited by
    #1

    Tip to CISOs - every time you hear the phrase "defenders need to move at machine speed", drink. It's AI sales speak for "buy our magic box".

    Kevin BeaumontG ⠠⠵ avukoA 2 Replies Last reply
    1
    0
    • Kevin BeaumontG Kevin Beaumont

      Tip to CISOs - every time you hear the phrase "defenders need to move at machine speed", drink. It's AI sales speak for "buy our magic box".

      Kevin BeaumontG This user is from outside of this forum
      Kevin BeaumontG This user is from outside of this forum
      Kevin Beaumont
      wrote last edited by
      #2

      Yes, it's true, some attackers use GenAI tools to make phishing emails or spit out Powershell. Based on existing attacks. That your existing controls should cover, as it's a repeat of existing attacks.

      Vendors just need to do their jobs, not milk customers like it's a farm.

      Misuse CaseM SheogorathS AtanasA 3 Replies Last reply
      0
      • Kevin BeaumontG Kevin Beaumont

        Yes, it's true, some attackers use GenAI tools to make phishing emails or spit out Powershell. Based on existing attacks. That your existing controls should cover, as it's a repeat of existing attacks.

        Vendors just need to do their jobs, not milk customers like it's a farm.

        Misuse CaseM This user is from outside of this forum
        Misuse CaseM This user is from outside of this forum
        Misuse Case
        wrote last edited by
        #3

        @GossiTheDog >> Vendors just need to do their jobs, not milk customers like it's a farm.

        As far as they’re concerned that *is* their job.

        1 Reply Last reply
        0
        • Kevin BeaumontG Kevin Beaumont

          Yes, it's true, some attackers use GenAI tools to make phishing emails or spit out Powershell. Based on existing attacks. That your existing controls should cover, as it's a repeat of existing attacks.

          Vendors just need to do their jobs, not milk customers like it's a farm.

          SheogorathS This user is from outside of this forum
          SheogorathS This user is from outside of this forum
          Sheogorath
          wrote last edited by
          #4

          @GossiTheDog But Kevin, think of the shareholders!

          1 Reply Last reply
          0
          • Kevin BeaumontG Kevin Beaumont

            Tip to CISOs - every time you hear the phrase "defenders need to move at machine speed", drink. It's AI sales speak for "buy our magic box".

            ⠠⠵ avukoA This user is from outside of this forum
            ⠠⠵ avukoA This user is from outside of this forum
            ⠠⠵ avuko
            wrote last edited by
            #5

            @GossiTheDog that magic box will contain a couple of new files, mostly ending in .png and .ico because of a recent buy, and stacks of often decades old and unmaintained open source python, perl and bash with some glue code from the first startup developers who threw it together years ago running on a years old Linux or freeBSD OS.

            Doing regex matching and some string parsing.

            But you’ll recognise the name and logo, so you’ll feel good about it.

            Dr. Christopher KunzC 1 Reply Last reply
            0
            • ⠠⠵ avukoA ⠠⠵ avuko

              @GossiTheDog that magic box will contain a couple of new files, mostly ending in .png and .ico because of a recent buy, and stacks of often decades old and unmaintained open source python, perl and bash with some glue code from the first startup developers who threw it together years ago running on a years old Linux or freeBSD OS.

              Doing regex matching and some string parsing.

              But you’ll recognise the name and logo, so you’ll feel good about it.

              Dr. Christopher KunzC This user is from outside of this forum
              Dr. Christopher KunzC This user is from outside of this forum
              Dr. Christopher Kunz
              wrote last edited by
              #6

              @avuko @GossiTheDog Don't forget that the magic box will have at least two different webservers installed, one proxying for the other, introducing funny double encoding bugs, RewriteMaps that fork shell scripts and all of their legacy bugs.

              That's enterprise functionality!

              768kB 🚴☕🇬🇧🇺🇦🇵🇸7 1 Reply Last reply
              0
              • Dr. Christopher KunzC Dr. Christopher Kunz

                @avuko @GossiTheDog Don't forget that the magic box will have at least two different webservers installed, one proxying for the other, introducing funny double encoding bugs, RewriteMaps that fork shell scripts and all of their legacy bugs.

                That's enterprise functionality!

                768kB 🚴☕🇬🇧🇺🇦🇵🇸7 This user is from outside of this forum
                768kB 🚴☕🇬🇧🇺🇦🇵🇸7 This user is from outside of this forum
                768kB 🚴☕🇬🇧🇺🇦🇵🇸
                wrote last edited by
                #7

                @christopherkunz @avuko @GossiTheDog no healthy upstream

                Dr. Christopher KunzC 1 Reply Last reply
                0
                • 768kB 🚴☕🇬🇧🇺🇦🇵🇸7 768kB 🚴☕🇬🇧🇺🇦🇵🇸

                  @christopherkunz @avuko @GossiTheDog no healthy upstream

                  Dr. Christopher KunzC This user is from outside of this forum
                  Dr. Christopher KunzC This user is from outside of this forum
                  Dr. Christopher Kunz
                  wrote last edited by
                  #8

                  @768kb @avuko @GossiTheDog No healthy downstream either. All unhealthy (and possibly backdoored).

                  1 Reply Last reply
                  0
                  • Kevin BeaumontG Kevin Beaumont

                    Yes, it's true, some attackers use GenAI tools to make phishing emails or spit out Powershell. Based on existing attacks. That your existing controls should cover, as it's a repeat of existing attacks.

                    Vendors just need to do their jobs, not milk customers like it's a farm.

                    AtanasA This user is from outside of this forum
                    AtanasA This user is from outside of this forum
                    Atanas
                    wrote last edited by
                    #9

                    @GossiTheDog Too late. Customers have already outsourced their thinking to the vendor.

                    1 Reply Last reply
                    0
                    • R ActivityRelay shared this topic
                    Reply
                    • Reply as topic
                    Log in to reply
                    • Oldest to Newest
                    • Newest to Oldest
                    • Most Votes


                    • Login

                    • Don't have an account? Register

                    • Login or register to search.
                    Powered by NodeBB Contributors
                    • First post
                      Last post
                    0
                    • Categories
                    • Recent
                    • Tags
                    • Popular
                    • World
                    • Users
                    • Groups