New York Times plays down impact of source code leak
- by nlqip
Secondary threats
The exposure of source code held in repositories like this could reveal vulnerabilities that attackers can exploit to launch further attacks, security experts warned.
“As well as the potential for risk to individuals through exposed PII [personally identifiable information], the leak also increases the risk to the NYT of further targeted intrusions through the exposure of vulnerabilities in the website’s infrastructure,” Rik Ferguson, VP of security intelligence at security vendor Forescout, told CSOonline.com.
“These vulnerabilities could then be further leveraged in various ways, for example to distribute malware, to effect further intrusions into NYT corporate infrastructure, or for denial-of-service attacks.”
Source link
lol
Secondary threats The exposure of source code held in repositories like this could reveal vulnerabilities that attackers can exploit to launch further attacks, security experts warned. “As well as the potential for risk to individuals through exposed PII [personally identifiable information], the leak also increases the risk to the NYT of further targeted intrusions through…
Recent Posts
- Security plugin flaw in millions of WordPress sites gives admin access
- Phishing emails increasingly use SVG attachments to evade detection
- Fake AI video generators infect Windows, macOS with infostealers
- T-Mobile confirms it was hacked in recent wave of telecom breaches
- GitHub projects targeted with malicious commits to frame researcher