Today, Open Source technologies are present in almost all products and services offered by the largest technology and Internet companies around the world. According to research by Black Duck, 96% of software used by enterprises today contains open components. Complex open source projects (such as Hadoop or Docker) are critical to the creation of modern solutions, as evidenced by the fact that thousands of highly skilled engineers sacrifice their time to create critical components.
Unfortunately, the nature of Open Source is not without its drawbacks — experts often find bugs and vulnerabilities in open source software that have gone undetected for decades. Despite the existence of vulnerability-catching programs, such as Google Patch Rewards, Facebook Whitehat, and the Google Vulnerability Reward Program, a significant portion of them still escape the attention of the tech-savvy public.
As the ZDNet portal writes, not all bugs and macedonia whatsapp data are equally dangerous. Thus, the Chaos "vulnerability" discovered by GoSecure can be considered harmless. The mechanism of the "virus" that used it is noteworthy: it required server administrators to change SSH and root passwords if they did not meet "Chaos security standards" to more complex ones. However, there have already been many cases when open source systems and software interspersed with it have encountered real problems.
A similar story surfaced in 2014 with the American credit bureau Equifax. The company became the victim of a data leak of 145.5 million Americans, who “shared” with the attackers their social security numbers, dates of birth, home addresses, and driver’s license data. Equifax identified the open source project Apache Struts, whose server software the company used, as the culprit of the leak. In response to the accusations, the Apache Struts Project Management Committee stated that Equifax’s servers were hacked either because it failed to close a vulnerability on its servers, although a patch for it existed, or because hackers penetrated the victim’s network through an unspecified vulnerability (the so-called zero-day vulnerability).
Well done, lieutenant! You will go far! I express my
-
- Posts: 730
- Joined: Mon Dec 23, 2024 3:13 am