![]() ![]() ![]() Salesforce’s Red Team is considered rather elite by industry standards, and they had reportedly received prior approval to speak at Defcon from Salesforce management, but approval was still pending to open-source Meatpistol (which is currently in a very rough “alpha” state but was at use internally at Salesforce). To show just how controversial hacker’s tools of the trade are, Ars Technica followed up with news that Salesforce’s “Red Team” members were fired as they stepped off stage after presenting their own internal attack tool. So the FBI detained a hacker at Defcon, but that’s not all. The FBI’s case most likely hinges upon proving Hutchins coordinated with the other hacker that sold the tool. They have to make their own tools for the job, but these tools are in a legal grey area since they can be used by black hat hackers, “black hat” denotes illegal behavior and malicious intent, and the dissemination of these tools can be considered illegal, especially if the tool is sold for profit. He’s since pleaded not guilty. ![]() Security researchers often write malicious code to discover and exploit vulnerabilities. After spending a week off the radar, friends and family discovered that his indictment alleged that he “created the Kronos malware” and the other person later sold it for $2,000 (£1,500) online. Federal prosecutors say he was a criminal.” Traveling from the UK to Las Vegas in order to attend, Marcus, a researcher at security firm Kryptos Logic, was detained by the FBI. There’s nothing that highlights the division better than this subtitle from a recent Ars Technica post written after the hacker who disarmed the recent WannaCry ransomware attack, “Marcus Hutchins was hailed as a hero. If hackers are open about their pursuits, don’t we all benefit? The Issue You might think this is generally welcome. This open, collaborative approach to vulnerability detection is crucial for public safety and security, and in this case, for maintaining the integrity of our elections. When the doors opened, newcomers saw various voting machines, some decommissioned and others that are still in use, which were setup so that they could attempt to hack and probe the machines to discover vulnerabilities. Defcon, the almost infamous hacking convention, started off well enough. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |