points by cbg0 1 day ago | hide | 0 comments
So around $10K for a full network takeover with Mythos in 'The Last Ones' (a 32-step simulated corporate network attack). Some limitations from the paper on arxiv (emphasis mine):

- No active defenders. Real networks have security teams monitoring for intrusions, responding to alerts, and adapting defences. Our ranges are static, for example our deployment of Elastic Defend was not configured to block or impede attack progress.

- Detections not penalised. We measured triggered security alerts but did not incorporate them into overall performance scores. A model that completes more steps while triggering many alerts may be a lesser threat than one that is able to reliably remain undetected.

- Vulnerability density varies. Our ranges are designed to have vulnerabilities; real environments are not.

- Lower artefact density than real environments. Our ranges contain fewer nodes, services, and files than typical production networks, reducing the noise a model must navigate. While substantially more complex than CTF-style evaluations, our ranges remain considerably simpler than real enterprise environments.

nomel1 day ago | | | parent | | on: 47756416
> No active defenders. Real networks have security teams monitoring for intrusions, responding to alerts, and adapting defences.

So, all the fake networks in use outside of Fortune 500?

linzhangrun19 hours ago | | | parent | | on: 47756416
The world is more of a makeshift operation than you can imagine. Don't forget what caused the Cloudflare outage that took down half the internet last year or the React vulnerabilities and all that, lol :p
dmd1 day ago | | | parent | | on: 47756416
> Real networks have security teams monitoring for intrusions, responding to alerts, and adapting defences.

I got some bad news if you really think most (even large) companies have ever once actually looked at what that big Splunk system is collecting for them.

andrewstuart21 day ago | | | parent | | on: 47759348
The great irony is that now that Splunk audit trail will probably end up being consumed by LLMs on the lookout for threat actors who are probably also using LLMs to attempt intrusions.

It's a great time to be selling GPUs.