Abyssec is following a full vulnerability disclosure strategy. Since 1993 and the formation of the Bugtraq mailing
list, there has been a significant disagreement regarding how vulnerabilities should be disclosed; the list was formed to discuss vulnerabilities regardless of the vendor response in order to pressure vendors into patching their software. One of Abyssec's goals in using full disclosure is to pressure software developers to fix their code faster than exploit writers can develop exploits, but, given the current speed exploits are developed, this is probably a losing battle for software developers. Abyssec is planning on releasing more details than are commonly released in order to assist security professionals with determining the amount of risk these vulnerabilities pose to their organizations, as well as with developing effective mitigation strategies. Promoting their company, however, is the most likely long-term result of the "Month of Bugs" campaign.
While some may question Abyssec's motivation, the fact that they are openly sharing the results of their findings -- rather than selling the vulnerabilities to the highest bidder on the black market -- will help improve information security, since all enterprises can freely use the information to make informed decisions. The stakes of employing such vulnerability disclosure tactics are high; however, until the vulnerabilities are patched, they're left wide open to exploitation by malicious attackers . If the researchers worked with software developers prior to announcing a vulnerability, they could help minimize these high costs to end users and also satisfy their goals.
Dig deeper on Vulnerability Risk Assessment
Related Q&A from Nick Lewis, Enterprise Threats
Expert Nick Lewis explains how to avoid a detrimental VPN bypass flaw that allows malicious apps to infiltrate Android devices.continue reading
Expert Nick Lewis explains how to keep call center employees from getting duped by social engineering scams and pretexting.continue reading
Researchers reportedly succeeded in extracting decryption keys using sound-based attacks. Is this a threat enterprises should worry about?continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.