this post was submitted on 17 Oct 2024
184 points (100.0% liked)

Technology

59598 readers
3897 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Google Mandiant security analysts warn of a worrying new trend of threat actors demonstrating a better capability to discover and exploit zero-day vulnerabilities in software.

Specifically, of the 138 vulnerabilities disclosed as actively exploited in 2023, Mandiant says 97 (70.3%) were leveraged as zero-days.

This means that threat actors exploited the flaws in attacks before the impacted vendors knew of the bugs existence or had been able to patch them.

top 19 comments
sorted by: hot top controversial new old
[–] ByteOnBikes 50 points 1 month ago (2 children)

Tinfoil hat conspiracy coming up -- the large quantity of layoffs meant security has been tossed aside.

  1. Employed engineers not having the bandwidth, resources, time to bake in better security. Literally having to do more with less.

  2. Fired engineers may had tribal knowledge on how something worked. Now only God knows.

  3. Unemployed engineers are bored engineers. Not saying they did the deed, but maybe they discovered it.

[–] HobbitFoot@thelemmy.club 6 points 1 month ago

That would assume that security was a priority beforehand.

Google has been known to prioritize new projects over maintaining existing ones. That would generally lead to less defined security architecture as the system is less tested.

[–] sunzu2@thebrainbin.org 1 points 1 month ago (1 children)

Unstaffing is corporate MO for which they don't really suffer any consequences so they will keep doing it.

If they understaff hospitals an people die...

[–] mosiacmango@lemm.ee 4 points 1 month ago (1 children)

They already understaff hospitals. People are dying.

[–] sunzu2@thebrainbin.org 0 points 1 month ago

They understaff non critical jobs even harder

[–] lath@lemmy.world 43 points 1 month ago (1 children)

When pleasing the investors becomes top priority, everything else turns into shit.

[–] OpenStars@discuss.online 13 points 1 month ago (2 children)

So what happens when pleasing the investors becomes the only priority?

[–] CheeseNoodle@lemmy.world 9 points 1 month ago (1 children)

Short term decisions are made that ultimately collapse the company and that also turns to shit.

[–] OpenStars@discuss.online 5 points 1 month ago (1 children)

Unless they're too big to fail, and especially if they are too big to jail, e.g. Facebook, Google, etc. Or if they correctly judge the stupidity and malleability of their audience e.g. Reddit, X, etc.

[–] CheeseNoodle@lemmy.world 3 points 1 month ago

That just kicks the can down the road, can't run a company when no one can afford your product. Which is the situation we seem to be rapidly approaching.

[–] Xeroxchasechase@lemmy.world 2 points 1 month ago (1 children)

The inestors maximize their shares value. It's wonderfull

[–] OpenStars@discuss.online 4 points 1 month ago (1 children)
[–] Xeroxchasechase@lemmy.world 1 points 1 month ago (1 children)
[–] OpenStars@discuss.online 2 points 1 month ago

And that is all that matters, to them, forever moving forward 🤮.

[–] IsThisAnAI@lemmy.world 15 points 1 month ago (1 children)

This thread desperately wants Google to be at fault rather than accept that attacks are easier than ever with highly sophisticated and learning cracking models.

[–] HobbitFoot@thelemmy.club 5 points 1 month ago (1 children)

The thread, like Lemmy, is filled with software engineers and IT professionals who are angry that almost all major tech companies are destaffing and want to use this as a reason that destaffing is bad.

Security likely a shit show before, especially if more successful attacks previously were of known flaws that weren't patched.

[–] IsThisAnAI@lemmy.world 1 points 1 month ago* (last edited 1 month ago)

IDK, every project I touched while working there had some suite of static analysis cve report,, secrets scanning, as well as absurdly strict data collection policies and procedures. It was challenging to navigate at times when you had to wait on upstream fixes and crap. The only time I ever saw a fix go live quickly and to the majority of the customer base on quick rollout was for a zero day or active exploit. I'm sure there are gaps, but for as many services they offer, I never saw any crazy shit.

Google is probably one of the top 10 probed companies in the world and you don't hear about too many major breeches that originated from the tech. It's usually legal and sharing with bad partners where they fuck up.

[–] just_another_person@lemmy.world 13 points 1 month ago

Global espionage actors are being better funded, and executing longer-term plays against less expected targets.

[–] blackfire@lemmy.world 10 points 1 month ago

This is actually fantastic news it means people are patching their shit and now TA's have to spend significant resource finding new methods. For the gen pop this is good news. For nation state targets less so but thats a much smaller pool of victims.