, 10 tweets, 3 min read Read on Twitter
Interesting article. Naturally one cannot go into too much detail, but...depending on the Hacker (Cracker) one can easily earn a living, if they have the criminal mindset. Just 20 lines of code devasted the British Airways platform.
As you and I know, plus FS-ISAC, Artificial Intelligence will see new MALWARE attacks. It's refreshing to see 14 banks conduct war-gaming attacks on a simulated bank networks recently. Even more refreshing to see those with actual hands-on-keyboard penetration testing experience.
I once received documents and a disc showing what law enforcement and governments were doing to stem the number of attacks. I was aghast by some of their 'efforts'. Various exploits were evident. Human error was a huge factor, social engineering was a breeze.
Even current blue chip companies show a great deal of apathy, in terms of cyber-security and crime. As the recent PFEW breach proved, it is easy, even for a script kiddie to wreak havoc. With Russia wanting to 'turn off' their Internet, forming an Intranet, shows their threats.
But, as with the firewall of China, a little knowledge is a dangerous thing. One can easily get in and out, with the correct tools. I'm pleased @realDonaldTrump took note of cheap Chinese IT tools. So easy for them to plant tech in routers etc.
Quite rightly, the @NSAGov never paid the 'Shadow Crew' the ransom. But, as mentioned before, the Wikileaks Vault 7 details made a playground for script kiddies and beyond. The mindset of "I have a firewall and AV so we are safe" mentality should be long gone.
As we know, gaining root is...in effect, easy with most systems in today's connected world. From reconnaissance to attack and escalation of privileges, although electronic, is akin to humans and creatures in the wild. The sad thing is...some never see it as "A thing."
The Internet of Things will be such a hunting ground. That aside totalitarianism in Iran, and elsewhere, will see more salvos heading west and oppressing the masses. In an age where one can pivot attacks via compromised systems, it's so very easy to obfuscate the attacker/payload
Without a doubt penetration testers will be required, how many times are we going to hear "Today millions of records were stolen in a major hack...involving company XYZ." Social media has great uses, but dangerous humans don't care. To lock down health systems etc is evil!
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to David Kime
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!

This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!