New York Times plays down impact of source code leak
- by nlqip
Secondary threats
The exposure of source code held in repositories like this could reveal vulnerabilities that attackers can exploit to launch further attacks, security experts warned.
“As well as the potential for risk to individuals through exposed PII [personally identifiable information], the leak also increases the risk to the NYT of further targeted intrusions through the exposure of vulnerabilities in the website’s infrastructure,” Rik Ferguson, VP of security intelligence at security vendor Forescout, told CSOonline.com.
“These vulnerabilities could then be further leveraged in various ways, for example to distribute malware, to effect further intrusions into NYT corporate infrastructure, or for denial-of-service attacks.”
Source link
lol
Secondary threats The exposure of source code held in repositories like this could reveal vulnerabilities that attackers can exploit to launch further attacks, security experts warned. “As well as the potential for risk to individuals through exposed PII [personally identifiable information], the leak also increases the risk to the NYT of further targeted intrusions through…
Recent Posts
- Applied Digital CEO Wes Cummins Talks Nvidia, Liquid Cooling, And Finding Capacity Amid ‘This Big Infrastructure Revolution’
- Intel Stock Rises After Report Says It’s An ‘Acquisition Target’
- CISA and FBI Release Updated Guidance on Product Security Bad Practices | CISA
- IBM Looks To Purchase Oracle Consultancy Amid HashiCorp Scrutiny
- Cybersecurity Snapshot: CISA Lists Security Features OT Products Should Have and Publishes AI Collaboration Playbook