HomeCII/OTSecurity Conferences Ensure Accountability

Security Conferences Ensure Accountability

Published on

spot_img

In August, during a presentation at Black Hat USA, a security researcher unveiled the vulnerabilities in Microsoft guest accounts that allowed unauthorized access to sensitive corporate data. The researcher also demonstrated how Power Platform could be exploited to create internal phishing applications and establish persistent backdoors even if the hacked user was deleted. These security flaws continue to pose a threat to organizations, as mitigating them falls under the responsibility of Microsoft customers who must monitor and strengthen their own environments.

Prior to this presentation, the security researcher faced a dilemma regarding what information to share. They were aware of the potential risks of disclosing these vulnerabilities, as it could potentially alert hackers to their existence. However, considering that these issues were already being exploited in the wild, it was crucial to level the playing field and provide security teams with the knowledge and tools to protect their organizations.

This predicament is not unique to the researcher in question. Several other researchers have faced similar choices, where they must decide between remaining silent or educating the public about unresolved security issues. By sharing their findings, these researchers aim to raise awareness and drive action towards addressing these vulnerabilities.

The landscape of security research has significantly changed over time. Gone are the days when researchers would reveal zero-day vulnerabilities on stages like Black Hat or DEF CON. While this shift is generally positive, as it fosters collaboration between researchers and vendors, it has also led to a loss of certain dynamics within the security community. However, vendors now recognize that security researchers play a crucial role in improving the overall security of their products and services.

Most researchers today follow a responsible disclosure route. They engage with the vendor, allowing them time to address the vulnerabilities before making them public. Nevertheless, researchers often choose to disclose the vulnerabilities because they believe vendors are not adequately addressing the issues within a reasonable timeframe. In the past, security researchers would expose vulnerabilities publicly, putting pressure on vendors to fix them promptly.

Today, the balance of power between researchers and vendors is unequal. Researchers often find themselves pitted against vast enterprises with abundant resources, strong media presence, and legal teams. This power dynamic can dissuade vendors from promptly addressing vulnerabilities, prioritizing avoiding PR crises over improving customer security. Though certain organizations support researchers in navigating these challenges, the situation can feel like a David versus Goliath battle.

One of the main issues with the current system of vulnerability disclosure is that organizations hold complete decision-making power without transparency. While the Common Vulnerabilities and Exposures (CVE) system exists, its issuance is primarily at the vendor’s discretion. Cloud service providers present an even more daunting challenge, with many refusing to issue CVEs and lacking transparency regarding discovered and fixed security issues in their services.

To maintain integrity within the community, it is necessary to discuss problems openly. This approach has proven effective in various contexts, such as open source software development, challenging security by obscurity, and fostering open government initiatives. However, some believe that the pendulum has swung too far in favor of vendors, leading them to prioritize short-term visibility concerns over long-term customer trust and ecosystem security.

While vendor security teams are making efforts to address reported vulnerabilities and build stronger relationships with researchers, they require additional support. Urgency to fix issues can be challenging to generate when organizations feel they control the situation while their customers remain at risk.

Security conferences serve as platforms where researchers can push vendors in the right direction. By publicly sharing information, researchers provide a means to hold vendors accountable and allow the entire community to assess the current state of security. These conferences act as a catalyst for change, fostering collaboration and ensuring that the security of organizations and the wider ecosystem remain a top priority.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...