Threat and Vulnerability Management

Could WikiLeaks dumping CIA code create the next WannaCry or NotPetya?

In an age of nation-state level cyberwarfare, countries with the best hacking tools are the new military powers. The US has been aggressive in efforts to find new and powerful vulnerabilities to exploit, and slow in disclosing them to technology vendors. But it has also not been effective in keeping those secrets from falling into the hands of hackers such as the Shadow Brokers and whistle-blower sites such as WikiLeaks and the Intercept.

Which raises the question: how much damage can such leaks do, and should the likes of WikiLeaks be disclosing them in the first place?


Vault 7 showed capabilities, Vault 8 shows actual code

With Vault 7, WikiLeaks documented many of the CIA’s activities and capabilities. Though it led to revelations about how the intelligence agency could hack all manner of devices and systems – from cars and smart TVs to web browsers and Operating Systems, it never outlined explicitly how these attacks were done.

To continue reading...


« How to stop embarrassing enterprise website downtime


Discover ten top blockchain projects »
Dan Swinhoe

Dan is a journalist at CSO Online. Previously he was Senior Staff Writer at IDG Connect.

  • twt
  • twt
  • twt
  • Mail