TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

N. Korean hackers breached 10 defense contractors in South for months

65 点作者 hassanahmad大约 1 年前

6 条评论

everdrive大约 1 年前
That's the primary thing a contractor does: get breached. They also cost the same as an employee, but are usually less talented or at least less integrated within the organization. Somehow, the moment you become an executive, contractors become an appealing option due to some unknowable black magic.
评论 #40148483 未加载
评论 #40148487 未加载
评论 #40148523 未加载
评论 #40148743 未加载
评论 #40148495 未加载
spxneo大约 1 年前
despite being allies, big reason why Americans do not trust or share sensitive information with South Korea-whatever they share always ends up in North Korea and China<p>but perhaps the biggest enablers of these security lapses aren&#x27;t just the shoddy cybersecurity management but the political environment<p>anytime you try to fix or address an issue, the opposition party will take contrarian stance without merit.<p>no political party in america will disagree with the events of 9&#x2F;11 yet in south korea disagreeing&#x2F;contrarian stance is the default because they have premature understanding of what democracy is (ex. <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;ROKS_Cheonan_sinking" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;ROKS_Cheonan_sinking</a> - imagine if a major American political party started refuting the events of 9&#x2F;11 and defending Al Qaeda!)<p>so its no wonder that stuff like this will result in no arrests and waste valuable tax dollars.
评论 #40149058 未加载
评论 #40149974 未加载
评论 #40149128 未加载
resource_waste大约 1 年前
I have no idea what to do about tech security. The holes will seemingly always exist unless we go back to safety critical code.<p>Its far easier to be a hacker than a programmer of the same economic&#x2F;political influence. You can take the second or third tier of programmers and they will be able to get you into a system.<p>My only thought is to only prevent non-anonymous entry, require some real world presence, and have capachas between commands... This doesnt scale.
评论 #40148767 未加载
HenryBemis大约 1 年前
&gt; ..outsourcing relationships with them..<p>One of my latest gigs was on Third-Party Security. For years and years companies (especially banks) were giving little to no attention to third-party security&#x2F;privacy. I&#x27;ve happily seen that over the past 5 years most (mega-big) banks have taken it &quot;all the way up to 11&quot;.<p>Hackers are smart people, why hack company X with 50 people on their SOC and not hack a vendor that is lazy and clumsy? (and in some cases it&#x27;s 5 guys with laptops behind a cheap never-hardened router in some random country)
评论 #40148728 未加载
评论 #40148603 未加载
vondur大约 1 年前
Serious question, how hard would it be to block all data from North Korea, or do they piggy back on other networks?
评论 #40148784 未加载
评论 #40148879 未加载
评论 #40148721 未加载
verisimi大约 1 年前
So simple for police to establish the location of hackers....
评论 #40148590 未加载
评论 #40148428 未加载