hive-image-via-wikileaks
Threat and Vulnerability Management

Could WikiLeaks dumping CIA code create the next WannaCry or NotPetya?

In an age of nation-state level cyberwarfare, countries with the best hacking tools are the new military powers. The US has been aggressive in efforts to find new and powerful vulnerabilities to exploit, and slow in disclosing them to technology vendors. But it has also not been effective in keeping those secrets from falling into the hands of hackers such as the Shadow Brokers and whistle-blower sites such as WikiLeaks and the Intercept.

Which raises the question: how much damage can such leaks do, and should the likes of WikiLeaks be disclosing them in the first place?

 

Vault 7 showed capabilities, Vault 8 shows actual code

With Vault 7, WikiLeaks documented many of the CIA’s activities and capabilities. Though it led to revelations about how the intelligence agency could hack all manner of devices and systems – from cars and smart TVs to web browsers and Operating Systems, it never outlined explicitly how these attacks were done.

To continue reading...


PREVIOUS ARTICLE

« How to stop embarrassing enterprise website downtime

NEXT ARTICLE

Discover ten top blockchain projects »
author_image
Dan Swinhoe

Dan is a journalist at CSO Online. Previously he was Senior Staff Writer at IDG Connect.

  • twt
  • twt
  • twt
  • Mail

Recommended for You

Trump hits partial pause on Huawei ban, but 5G concerns persist

Phil Muncaster reports on China and beyond

FinancialForce profits from PSA investment

Martin Veitch's inside track on today’s tech trends

Future-proofing the Middle East

Keri Allan looks at the latest trends and technologies

Poll

Do you think your smartphone is making you a workaholic?