(no title)
overthrow | 2 years ago
Microsoft says 70% https://www.zdnet.com/article/microsoft-70-percent-of-all-se...
Google says 70% https://www.chromium.org/Home/chromium-security/memory-safet...
overthrow | 2 years ago
Microsoft says 70% https://www.zdnet.com/article/microsoft-70-percent-of-all-se...
Google says 70% https://www.chromium.org/Home/chromium-security/memory-safet...
FreakLegion|2 years ago
Genbox|2 years ago
I would say that breaches often are related to RCE that ultimately derives from buffer exploitation. They are notoriously difficult to detect with forensics techniques, so they might not be discovered and tracked.
tthun|2 years ago
mschuster91|2 years ago
Depends what your definition of "attacks" is, to be precise: is an event where an adversary places a malicious ad with code exploiting a browser 0day counted as one attack or as X attacks with X being the number of infected machines?
Additionally, the same segmentation (with the same split) applies if you only count large-scale hacks against organizations as attacks, or if you're counting infected machines of everyday common people as attacks as well. Basically, if you're counting attacks on organizations, you're correct as the majority entrypoint there is social engineering and outdated exploitable software/appliances reachable from the public internet or a compromised partner connected to the victim's network.
Hasz|2 years ago
This is why you see so many whitepapers trying to quantify things like consumer trust, reputational damage, regulatory, impact, etc. If there is a true cost to the damage, the investment in prevention can be made and compared with other requests, like new features, scope, etc.
ranger_danger|2 years ago
worthless-trash|2 years ago
NikolaNovak|2 years ago
overthrow|2 years ago