Cyber security news for all

More

    Social Media Gets Gist Of Software Gaps Before Authorities

    Software gaps are most likely to appear first as trending discussion topics. Even before government reporting sites recognize and report it. This pattern is prone to cause issues as it constitutes a security threat at the national level.

    This practice, however, has a backhanded advantage for the government as they can closely monitor discussions on social media regarding the software gap.

    Research has proven that up to a quarter of discussions concerning software flaws from 2015 through 17 appeared first on social media platforms before gaining access into the U.S’ repository for software failure – the National Vulnerability Database. The National system, however, did not find these vulnerabilities until 90 days after they first gained media exposure.

     

    Github In The Lead For Discussion Circulation

    Three social platforms were the focal point of the research – Twitter, GitHub, and Reddit. The study examined how discussions about the software flaws were circulating on each of them.

    Amongst all three sites, GitHub seemed the most likely to be the birthplace of all these discussions revolving around software gaps. GitHub is a popular networking and development site for programmers. Since it is in the business of software development, it is logical to believe that the discussions are actuating here.

     A Common Line – Codebase

    The inquiry highlighted that almost all commercial software codebases comprise open-source sharing. And also about 80 percent of codebases have at least one vulnerability.

    Additionally, each commercial software codebase comprises an average of at least 64 vulnerabilities. The National Vulnerability Database publicly releases vulnerabilities identified easily as Common Vulnerabilities and Exposures. And also have revealed that they are drastically expanding and are currently more than 100,000.

     Automated Or Human Created Content – Which is a lesser risk?

    The research is still ongoing, and there is a struggle in the identification of the message source – whether automated messages or media traffic generated by humans. The tendency is that a person circulating a message will most likely have effectiveness not assumed to automated bot ones.

    Although this trend is wrong, one cannot deny that the awareness of the power social media has to spread information about software gaps provides a challenge for organizations. Social media signals antedating official sources allows institutions the chance to prioritize which flaws to address with urgency carefully.

    To boot, having records of the exposure of defects and countermeasures acknowledged in online social environments can provide extra signals for organizations to implement in their open-source risk-reward determination.

    Recent Articles

    Russian Cybercriminal Behind “Cardplanet” Site Sentenced

    According to the United States Department of Justice, a Russian cybercriminal, Aleksey Burkov, 30—who operated Cardplanet site: a site that trafficked stolen card details—has...

    Hackers Used Malicious Docker Images to Mine Monero

    Researchers found malicious images on Docker Hub used for crypto mining. Palo Alto Networks' Unit  42, unraveled a crypto mining scheme which uses malicious Docker...

    NSA outlines requirements for secure collaboration services for US government telework

    The new National Security Agency (NSA) guidelines are a window of security for users. Everyone has been trying to return to their lives since...

    Cybercriminals threaten to sell off “scandalous” files swiped from Mariah Carey, Nicki Minaj, Puff Daddy’s legal eagles

    There's no escaping these cybercriminals. In a recent case of "cyber-extortion," threat actors known as REvil, are threatening to expose celebrity "dirt." These threat actors...

    Twitter apologises for exposed customers data

    In what is described as a "data security incident," sensitive details of Twitter's customers were exposed. Unlike other cases of a breach which are...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox