Discussion
Loading...

Post

Log in
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Tom Sellers
Tom Sellers
@TomSellers@infosec.exchange  ·  activity timestamp yesterday

Hey, security vendors.. this is a bullshit anti-pattern. This vendor and others like it intentionally leave out the impacted vendor, products, technologies, and environments. There is zero context here. Readers would need to follow the link or independently research the CVE to see if they care.

Security practitioners see it for what it is: Fear based traffic farming.

It isn't a good look and many of us will never trust anything you say or send you traffic.

A note, I do work for a security vendor. We don't do this and I would absolutely call out our (awesome) marketing or research teams if we did.

#Security #cybersecurity #zeroday #threatintel

Screenshot of a Mastodon post by Yazoul Alerts which lists a CVE, its impacts, and provides a link for more detail. It contains no information about the vendor, product, types of technology, or enviroments that are impacted.
Screenshot of a Mastodon post by Yazoul Alerts which lists a CVE, its impacts, and provides a link for more detail. It contains no information about the vendor, product, types of technology, or enviroments that are impacted.
Screenshot of a Mastodon post by Yazoul Alerts which lists a CVE, its impacts, and provides a link for more detail. It contains no information about the vendor, product, types of technology, or enviroments that are impacted.
  • Copy link
  • Flag this post
  • Block

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.2-alpha.34 no JS en
Automatic federation enabled
Log in
Instance logo
  • Explore
  • About
  • Members
  • Code of Conduct