deleted by creator
deleted by creator
deleted by creator
TL;DR: Cofounder of open source project says super popular platform using their project needs to pay up for inane reasons. Chaos ensues.
In summary:
WP Engine is one of the most popular third party platforms built on top of WordPress.
They have a link and images on their webpage referencing that they are built on top of Wordpress (this is legal).
The former cofounder of Wordpress said that they are illegally using the Wordpress trademark.
WP Engine sends Cease and Desist.
WordPress Cofounder doubles down, blocks WP Engine and demanded WP Engine pay licensing fees for using their branding.
This pissed off a lot of people.
WP Engine sues. For a lot, including extortion, abuse of power, and asserts the cofounder of WordPress has criminally made false statements to the IRS.
The Executive Director for Wordpress resigns, presumably in solidarity with WP Engine and the community.
deleted by creator
Actively encouraging people to toss perfectly good hardware to fuel their subscription bullshit… and these guys weren’t even recently bought by a VC firm or anything?
That’s a penis dot gif
You farm the remaining humans like livestock? We mastered factory farming 100 years ago, no reason things need to change just because the animals can talk back.
(banned from /c/veganism)
Yeah, no shit, you’re the fucking CEO
From my understanding, the impetus was that F5 submitted a CVE for a vulnerability, for an optional, “beta” feature that can be enabled. Dounin did not think a CVE should be submitted, since he did not considered it to be “production” feature.
That said, the vulnerability is in shipping code, regardless of whether it is optional or not, so per industry coding practices, it should either be patched or removed entirely in order to resolve the issue.
As you yourself stated, CVSS does exactly what it says on the box. It provides a singular rating for a software vulnerability, in a vacuum. It does not prescribe to do anything more, and it does a good job doing what it sets out to do (including specifically as an input to other quantitative risk calculations).
Compare what with attack?
Your methodology heavily relies on “the analysis of cybersecurity experts”, and in particular, frequently references “exploit chains”, mappings which are not clearly defined, and appears to rely on the knowledge of the individual practitioner, rather than existing open frameworks. MITRE ATT&CK and CAPEC already provide such a mapping, as well as a list of threat actor groups leveraging tactics, techniques, and procedures (e.g., exploitation of a given CVE). Here’s a good articlewhich maps similarly to how we operate our cybersecurity program.
I think there is a lot on the mark in your article about the issues with cybersecurity today, but again, I believe that your premise that CVSS needs replacing is flawed, and I don’t think you provided a compelling case to demonstrate how/why it is flawed. If anything, I think you would agree that if organizations are exclusively using CVSS scores to prioritize remediation, they’re doing it wrong, and fighting an impossible battle. But this means the organization’s approach is wrong, not CVSS itself.
Your article stands better alone as a proposal for a methodology for quantifying risk and threat to an organization (or society?), rather than as a takedown of CVSS.
Glancing through your article, while you have correctly assessed the need for risk based prioritization of vulnerability remediation and mitigation, your central premise is flawed.
Vulnerability is not threat— CVSS is a scoring system for individual vulnerabilities, not exploit chains. For that, you’ll want to compare with ATT&CK or the legacy cyber kill chain.
Release date, 06/30/2024. Cease and desist date, 01/01/2024.
Having just researched this, I purchased the Dynalink AX3600 (DL-WRX36). While it’s not as simple as a drop in firmware reflash, it offered the best speed and performance for not significantly more effort; Wifi 6, USB 3.0 ports, and full MIMO antenna support.
I also considered the following:
According to the Bureau Of Labor Statistics, the median salary for airline captains, first-officers, second-officers, and flight engineers in the United States is $203,010 as of 2021.
The big problem is actually in certifying people qualified to take those jobs, which takes additional time and money, mostly to pay for flight time for training. It can take a few grand for just a personal pilot license, but to fly an airline, you need instrument, commercial, and Airline Transport Pilot License (ATPL) certifications, plus increasingly expensive type ratings for the various aircraft you will be flying, a minimum of 1500 hours of flight time, and multiple years at the bottom working your way through smaller regional airlines and courier services.
You can get through the commercial licensing in 12-18 months and about $40k in flight time and insurance, but that is barely enough to get your foot in the door making $50k a year, and even then, you’re still not allowed to fly parcels or passengers for money. Getting those licenses will take another 18 months and another $40-80k, again, mostly in flight time.
That said, once you have ATPL, the company will start paying for your flight time, and you will be earning a 6 figure salary. After 5 years or so and about $100k investing in your training, you should be making over $200k, and can begin to recoup those costs.
Saying “Integrates with OpenAI” in 2023 is exactly equivalent to saying “uses Web 2.0” from 20 years ago. Buzzword trash that says absolutely about how the product uses said technology.
They are literally published by Microsoft.
deleted by creator