SlideShare a Scribd company logo
Open Source Insight:
You Can’t Beat Hackers and
the Pentagon Moves into Open Source
Fred Bals | Senior Content Writer/Editor
Cybersecurity News This Week
We take a deep dive into security researchers Charlie Miller and Chris Valasek’s
keynote at last week’s FLIGHT 2017 conference. What is “Hidden Cobra” and is it
targeting US aerospace, telecommunications and finance industries? Both banks
and the Pentagon are making big moves into open source. And why it’s smart to
assume that every application is an on-premise application.
The best of November’s application security and open security news (so far)
follows in this week’s edition of Open Source Insight.
• IoT Security Pros: You Can’t Beat the Hackers You
Can Only Contain Them
• It Wasn’t an Equifax Toaster That Stole 145M People’s
Personal Data
• U.S. Government Issues Alerts About Malware and Ip
Addresses Linked to North Korean Cyber Attacks
• Known Security Vulnerabilities Are a Hacker's Guide
to an IoT Breach
• The Pentagon Is Set to Make a Big Push Toward Open
Source Software Next Year
Open Source News
More Open Source News
• Banks Are Increasingly Turning to Open
Source Projects. Here's Why.
• It’s Time to Enlist Security Champions to Fuel
Agile Development
• Virgin Hyperloop One Joins GENIVI Alliance
• Assume Every Application is an On-Premises
Application
• From Consumers to Contributors: The
Evolution of Open Source in the Enterprise
via MSSP Alert: Internet of Things (IoT) security
bulls might not like this one: You can’t count on
beating the hackers — there’s too many
unsecured devices to bolt down — but you may
be able to contain them. How so? By
concentrating on the big stuff, according to
security experts Charlie Miller and Chris
Valasek, in remarks delivered at the Black Duck
Software’s Flight 2017 conference in Boston.
IoT Security Pros: You Can’t Beat the
Hackers You Can Only Contain Them
It Wasn’t an Equifax Toaster That
Stole 145M People’s Personal Data
via Black Duck blog (Fred Bals): The
good news? Bad guy hackers are lazy, and
will move on to easier pickings when
confronted with good security. The bad
news? Good security is often expensive,
and not necessarily a cost businesses are
enthusiastic about adding to product prices
and passing on to customers. Those were
key takeaways from security researchers
Charlie Miller and Chris Valasek’s keynote
at last week’s FLIGHT 2017 conference.
via TechCrunch: US-CERT, the Department of
Homeland Security team responsible for
analyzing cybersecurity threats, has posted a
warning about cyber-attacks by the North
Korean government, which it collectively refers
to as “Hidden Cobra.” The technical alert from
the FBI and Department of Homeland Security
says a remote administration tool (RAT) called
FALLCHILL has been deployed by Hidden Cobra
since 2016 to target the aerospace,
telecommunications and finance industries.
U.S. Government Issues Alerts About Malware
and Ip Addresses Linked to North Korean
Cyber Attacks
Known Security Vulnerabilities Are a
Hacker's Guide to an IoT Breach
via IoT Journal: More than 90 percent of the
software written these days integrates open-
source code. Such code is used in IoT
firmware, operating systems, network platforms
and applications. This trend will only continue
to grow because, by leveraging open-source,
developers can lower assembly costs and
quickly add innovations, thereby saving months
or years of originally required development
time. Whether software code is proprietary or
open-source, it harbors security vulnerabilities.
via the Verge: Besides cost, there are other
compelling explanations for why the military
might want to go open source. One is that
technology outside the Pentagon simply
advances faster than technology within it, and
by availing itself to open-source tools, the
Pentagon can adopt those advances almost as
soon as the new code hits the web, without
going through the extra steps of a procurement
process.
The Pentagon Is Set to Make a Big Push Toward
Open Source Software Next Year
Banks Are Increasingly Turning to
Open Source Projects. Here's Why.
via American Banker: The weakest points of most software
programs are the flaws or bugs that can be exploited by hackers
and cybercriminals. Recent case in point: the —$300 million worth
of Ether locked in Parity digital wallets because a coder was able
to poke around in Parity’s digital wallet and kill a smart contract,
thus freezing all wallets that smart contract governed. The Equifax
breach is another example: a weakness in an open source
software package called Apache Struts allowed hackers to steal
millions of sets of consumer data. (A patch was available for the
Apache software, but Equifax didn’t apply it.)
via Synopsys blog (Brendan Sheairs): A
traditional software security group (SSG) isn’t
equipped to apply security activities to Agile
development environments effectively. Applying
security to agile processes requires the injection
of security-related people, processes, and
testing activities at a sprint tempo… So how can
we inject security into Agile development?
It’s Time to Enlist Security Champions to
Fuel Agile Development
Virgin Hyperloop One Joins GENIVI Alliance
via Business Insider: The GENIVI Alliance, a collaborative community
of automakers and their suppliers developing open software for in-
vehicle infotainment (IVI) and the connected car, today announced that
Virgin Hyperloop One, the only company in the world that has built and
successfully tested a full-scale hyperloop system, has joined the
Alliance to work with the strong GENIVI ecosystem and leverage its
proven history of open source software collaboration.
via Black Duck blog (David Znidarsic): If prevention or
knowledge of an application’s required client-side
installations is important to you, you need to do a technical
analysis of what is and what is not installed; don’t rely on
marketing materials and naïve categorizations. In the
absence of such an analysis, assume every application you
use requires some type of client-side installation.
Assume Every Application is an
On-Premises Application
From Consumers to Contributors: The
Evolution of Open Source in the Enterprise
via Computer Weekly: The 11th edition of Black
Duck Software’s annual report into enterprise
open source usage revealing that 66% of the 819
respondents regularly contribute to open source
projects. Also, just under half (48%) said the
number of individual contributors within their
organisation was set to rise.
Subscribe
Stay up to date on open source security and cybersecurity –
subscribe to our blog today.
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open Source

More Related Content

PPTX
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
PDF
The Intersection Between Open Source and Cybersecurity
PDF
Software Security Assurance for DevOps
PDF
Buyer and Seller Perspectives on Open Source in Tech Contracts
PPTX
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
PPTX
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
PPT
The Case for Continuous Open Source Management
PDF
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
The Intersection Between Open Source and Cybersecurity
Software Security Assurance for DevOps
Buyer and Seller Perspectives on Open Source in Tech Contracts
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
The Case for Continuous Open Source Management
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud

What's hot (20)

PPTX
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
PDF
Open Source Security for Newbies - Best Practices
PDF
DevSecOps: The Open Source Way
PPTX
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
PPTX
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
PPTX
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
PPTX
Software Security Assurance for Devops
PPTX
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
PPTX
Software Security Assurance for DevOps
PDF
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
PPTX
Welcome & The State of Open Source Security
PPTX
Keynote - Lou Shipley
PPTX
Security in the age of open source - Myths and misperceptions
PPTX
Open Source: The Legal & Security Implications for the Connected Car
PDF
Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...
PDF
Webinar–The 2019 Open Source Year in Review
PPTX
Open Source: The Legal & Security Implications for the Connected Car
PDF
Open Source in Application Security
PDF
Collaborative Development the Gift That Keeps on Giving
PDF
Webinar–Best Practices for DevSecOps at Scale
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Security for Newbies - Best Practices
DevSecOps: The Open Source Way
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Software Security Assurance for Devops
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Software Security Assurance for DevOps
Leveraging Black Duck Hub to Maximize Focus - Entersekt's approach to automat...
Welcome & The State of Open Source Security
Keynote - Lou Shipley
Security in the age of open source - Myths and misperceptions
Open Source: The Legal & Security Implications for the Connected Car
Strategies to Reap the Benefits of Software Patents in an Open Source Softwar...
Webinar–The 2019 Open Source Year in Review
Open Source: The Legal & Security Implications for the Connected Car
Open Source in Application Security
Collaborative Development the Gift That Keeps on Giving
Webinar–Best Practices for DevSecOps at Scale

Similar to Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open Source (20)

PPTX
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
PPTX
Open Source Insight: Balancing Agility and Open Source Security for DevOps
PPTX
Open Source Insight: Happy Birthday Open Source and Application Security for ...
PDF
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
PPTX
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
PPTX
Allianz Global CISO october-2015-draft
PPTX
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
PPTX
Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...
PPTX
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
PPTX
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
PPTX
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
PPTX
Open Source Insight: NVD's New Look, Struts Vuln Ransomware & Google Open So...
PPTX
Open Source Insight: HBO, Voting Machines & Car Washes Hacked & Black Hat /...
PPTX
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
PPTX
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
PPTX
Managing Open Source in Application Security and Software Development Lifecycle
PPTX
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
PPTX
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
PDF
ScotSecure 2020
PDF
Integrating DevOps and Security
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: Balancing Agility and Open Source Security for DevOps
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Allianz Global CISO october-2015-draft
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: NVD's New Look, Struts Vuln Ransomware & Google Open So...
Open Source Insight: HBO, Voting Machines & Car Washes Hacked & Black Hat /...
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Managing Open Source in Application Security and Software Development Lifecycle
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
ScotSecure 2020
Integrating DevOps and Security

More from Black Duck by Synopsys (16)

PDF
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
PDF
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
PDF
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
PDF
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
PDF
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
PDF
Open-Source- Sicherheits- und Risikoanalyse 2018
PDF
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
PDF
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
PDF
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
PDF
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
PPT
FLIGHT Amsterdam Presentation - From Protex to Hub
PDF
Open Source Rookies and Community
PPTX
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
PDF
20 Billion Reasons for IoT Security
PPTX
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
PPTX
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
Open-Source- Sicherheits- und Risikoanalyse 2018
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - From Protex to Hub
Open Source Rookies and Community
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
20 Billion Reasons for IoT Security
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Approach and Philosophy of On baking technology
PDF
Encapsulation theory and applications.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
KodekX | Application Modernization Development
PPTX
Spectroscopy.pptx food analysis technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Approach and Philosophy of On baking technology
Encapsulation theory and applications.pdf
Unlocking AI with Model Context Protocol (MCP)
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
KodekX | Application Modernization Development
Spectroscopy.pptx food analysis technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Review of recent advances in non-invasive hemoglobin estimation
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Network Security Unit 5.pdf for BCA BBA.
Dropbox Q2 2025 Financial Results & Investor Presentation
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
MIND Revenue Release Quarter 2 2025 Press Release
Chapter 3 Spatial Domain Image Processing.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open Source

  • 1. Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open Source Fred Bals | Senior Content Writer/Editor
  • 2. Cybersecurity News This Week We take a deep dive into security researchers Charlie Miller and Chris Valasek’s keynote at last week’s FLIGHT 2017 conference. What is “Hidden Cobra” and is it targeting US aerospace, telecommunications and finance industries? Both banks and the Pentagon are making big moves into open source. And why it’s smart to assume that every application is an on-premise application. The best of November’s application security and open security news (so far) follows in this week’s edition of Open Source Insight.
  • 3. • IoT Security Pros: You Can’t Beat the Hackers You Can Only Contain Them • It Wasn’t an Equifax Toaster That Stole 145M People’s Personal Data • U.S. Government Issues Alerts About Malware and Ip Addresses Linked to North Korean Cyber Attacks • Known Security Vulnerabilities Are a Hacker's Guide to an IoT Breach • The Pentagon Is Set to Make a Big Push Toward Open Source Software Next Year Open Source News
  • 4. More Open Source News • Banks Are Increasingly Turning to Open Source Projects. Here's Why. • It’s Time to Enlist Security Champions to Fuel Agile Development • Virgin Hyperloop One Joins GENIVI Alliance • Assume Every Application is an On-Premises Application • From Consumers to Contributors: The Evolution of Open Source in the Enterprise
  • 5. via MSSP Alert: Internet of Things (IoT) security bulls might not like this one: You can’t count on beating the hackers — there’s too many unsecured devices to bolt down — but you may be able to contain them. How so? By concentrating on the big stuff, according to security experts Charlie Miller and Chris Valasek, in remarks delivered at the Black Duck Software’s Flight 2017 conference in Boston. IoT Security Pros: You Can’t Beat the Hackers You Can Only Contain Them
  • 6. It Wasn’t an Equifax Toaster That Stole 145M People’s Personal Data via Black Duck blog (Fred Bals): The good news? Bad guy hackers are lazy, and will move on to easier pickings when confronted with good security. The bad news? Good security is often expensive, and not necessarily a cost businesses are enthusiastic about adding to product prices and passing on to customers. Those were key takeaways from security researchers Charlie Miller and Chris Valasek’s keynote at last week’s FLIGHT 2017 conference.
  • 7. via TechCrunch: US-CERT, the Department of Homeland Security team responsible for analyzing cybersecurity threats, has posted a warning about cyber-attacks by the North Korean government, which it collectively refers to as “Hidden Cobra.” The technical alert from the FBI and Department of Homeland Security says a remote administration tool (RAT) called FALLCHILL has been deployed by Hidden Cobra since 2016 to target the aerospace, telecommunications and finance industries. U.S. Government Issues Alerts About Malware and Ip Addresses Linked to North Korean Cyber Attacks
  • 8. Known Security Vulnerabilities Are a Hacker's Guide to an IoT Breach via IoT Journal: More than 90 percent of the software written these days integrates open- source code. Such code is used in IoT firmware, operating systems, network platforms and applications. This trend will only continue to grow because, by leveraging open-source, developers can lower assembly costs and quickly add innovations, thereby saving months or years of originally required development time. Whether software code is proprietary or open-source, it harbors security vulnerabilities.
  • 9. via the Verge: Besides cost, there are other compelling explanations for why the military might want to go open source. One is that technology outside the Pentagon simply advances faster than technology within it, and by availing itself to open-source tools, the Pentagon can adopt those advances almost as soon as the new code hits the web, without going through the extra steps of a procurement process. The Pentagon Is Set to Make a Big Push Toward Open Source Software Next Year
  • 10. Banks Are Increasingly Turning to Open Source Projects. Here's Why. via American Banker: The weakest points of most software programs are the flaws or bugs that can be exploited by hackers and cybercriminals. Recent case in point: the —$300 million worth of Ether locked in Parity digital wallets because a coder was able to poke around in Parity’s digital wallet and kill a smart contract, thus freezing all wallets that smart contract governed. The Equifax breach is another example: a weakness in an open source software package called Apache Struts allowed hackers to steal millions of sets of consumer data. (A patch was available for the Apache software, but Equifax didn’t apply it.)
  • 11. via Synopsys blog (Brendan Sheairs): A traditional software security group (SSG) isn’t equipped to apply security activities to Agile development environments effectively. Applying security to agile processes requires the injection of security-related people, processes, and testing activities at a sprint tempo… So how can we inject security into Agile development? It’s Time to Enlist Security Champions to Fuel Agile Development
  • 12. Virgin Hyperloop One Joins GENIVI Alliance via Business Insider: The GENIVI Alliance, a collaborative community of automakers and their suppliers developing open software for in- vehicle infotainment (IVI) and the connected car, today announced that Virgin Hyperloop One, the only company in the world that has built and successfully tested a full-scale hyperloop system, has joined the Alliance to work with the strong GENIVI ecosystem and leverage its proven history of open source software collaboration.
  • 13. via Black Duck blog (David Znidarsic): If prevention or knowledge of an application’s required client-side installations is important to you, you need to do a technical analysis of what is and what is not installed; don’t rely on marketing materials and naïve categorizations. In the absence of such an analysis, assume every application you use requires some type of client-side installation. Assume Every Application is an On-Premises Application
  • 14. From Consumers to Contributors: The Evolution of Open Source in the Enterprise via Computer Weekly: The 11th edition of Black Duck Software’s annual report into enterprise open source usage revealing that 66% of the 819 respondents regularly contribute to open source projects. Also, just under half (48%) said the number of individual contributors within their organisation was set to rise.
  • 15. Subscribe Stay up to date on open source security and cybersecurity – subscribe to our blog today.