What in today’s tech environment makes below the operating system vulnerabilities a risk worth worrying about?

The surface area for below the operating system vulnerabilities just continues to proliferate more and more and more. From an education standpoint that would be fascinating research, but it also depends on who's issuing grants, because if no one wants to study that or pay someone to study that, then it's never going to get done.

31 views
4 comments
1 upvotes
Related Tags
Anonymous Author
The surface area for below the operating system vulnerabilities just continues to proliferate more and more and more. From an education standpoint that would be fascinating research, but it also depends on who's issuing grants, because if no one wants to study that or pay someone to study that, then it's never going to get done.
0 upvotes
Anonymous Author
I think where this gets extraordinarily interesting is in the Azure/GCP/AWS environments. That has a material impact on me. And I think all of us in some way, shape or form are in the cloud, whether we want to be or not. That's what we do. We are SaaS. And if AWS comes out tomorrow and says, "Hey, there's a kernel level, firmware level issue on every service that we have. And we don't know how long it's been going on and we're not sure what information has been leaked.. that would be Spectre/Meltdown on steroids, right? That's going to be a bad day, it’s not going to be fun. That's that vertical risk, it's not sprawling so much left to right as it is up and down, because we are so ingrained in GCP and AWS and Azure. If those services go down, our services go down.
0 upvotes
Anonymous Author
There's certainly been an uptick in the vulnerability research and discovery of vulnerabilities in below the operating system areas. It was a relatively obscure research area even 10 years ago, other than for nation state actors, but in the broad public community that has been growing. And even in the past year or so multiple substantial vulnerabilities, not only in IOT devices, but PCs and servers, and even the cloud infrastructure have been found. There was a report several weeks ago by Steve Mancini, who's at a company that focuses on below the operating system security issues. He's not only the CISO, but he runs the threat and intelligence team. They published a report on the malware trick bot and it doing discovery and the potential for it to play with things in the firmware. And there's been other discoveries in the UEFI area of vulnerabilities.  You're even seeing more security companies now, startups starting to focus in that area because the real threat researchers, the real hardcore hardware security folks are seeing the threats because they've been working them in the companies that they've supported in the hardware ecosystem, but they don't see that the market has been addressing it well enough. So they're going and creating their own startups to try and get better security development, life cycle, better detection and mitigation of maliciousness and stuff.
1 upvotes
Anonymous Author
As more and more is connected/integrated, there are no true ‘safe spaces’ from risk and vulnerability anymore. If there’s a gap, it’ll be found.
0 upvotes