Abyssec is following a full vulnerability disclosure strategy. Since 1993 and the formation of the Bugtraq mailing...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
list, there has been a significant disagreement regarding how vulnerabilities should be disclosed; the list was formed to discuss vulnerabilities regardless of the vendor response in order to pressure vendors into patching their software. One of Abyssec's goals in using full disclosure is to pressure software developers to fix their code faster than exploit writers can develop exploits, but, given the current speed exploits are developed, this is probably a losing battle for software developers. Abyssec is planning on releasing more details than are commonly released in order to assist security professionals with determining the amount of risk these vulnerabilities pose to their organizations, as well as with developing effective mitigation strategies. Promoting their company, however, is the most likely long-term result of the "Month of Bugs" campaign.
While some may question Abyssec's motivation, the fact that they are openly sharing the results of their findings -- rather than selling the vulnerabilities to the highest bidder on the black market -- will help improve information security, since all enterprises can freely use the information to make informed decisions. The stakes of employing such vulnerability disclosure tactics are high; however, until the vulnerabilities are patched, they're left wide open to exploitation by malicious attackers . If the researchers worked with software developers prior to announcing a vulnerability, they could help minimize these high costs to end users and also satisfy their goals.
Dig Deeper on Vulnerability Risk Assessment
Related Q&A from Nick Lewis
An HTTPS session with a reused nonce is vulnerable to the Forbidden attack. Expert Nick Lewis explains how the attack works, and how to properly ...continue reading
The Irongate malware has been discovered to have similar functionality to Stuxnet. Expert Nick Lewis explains how enterprises can protect their ICS ...continue reading
APT groups have been continuously exploiting a flaw in Microsoft Office, despite it having been patched. Expert Nick Lewis explains how these attacks...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.