tl;dr we have a synthetic dataset not correlated to actual attacks and we stand behind misleading people #DBIRhttp://blog.kennasecurity.com/2016/05/collaborative-data-science-inside-the-2016-verizon-dbir-vulnerability-section/ …
-
-
Using IDS sigs for successful exploitation is the kind of statistic that only a data scientist could love!
-
Kenna's top10 vulns match up to the top triggered sigs on every Snort install ever.pic.twitter.com/7z4W7LLo3p
- 10 more replies
New conversation -
-
-
@dguido I don't agree, this comment is unjust. They check if hosts have vulnerability, and if it has been exploited looking at IOC. -
@MarcoErmini@dguido what's the IOC for SNMP bullshit? more likely that their signature is detecting garbage and they don't realize - 1 more reply
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.