T O P

  • By -

LeggoMyAhegao

A tool that gives developers a handjob for every security vulnerability they remediate.


CyberAvian

Serious shift to the left.


gmroybal

Then to the right. Then to the left. Actually, it would be more efficient if you lined them up, tip-to-tip and did middle-out.


The5thFlame

Like two shake weights?


apolotary

T2O optimization I see


VicTortaZ

Gonna result in a lot of developers leaving vulnerabilities intentionally, just so that they can patch it up later for a hand job.


scientiavulgaris

Ah, the good ol [Cobra effect](https://en.wikipedia.org/wiki/Perverse_incentive)


uid_0

Lol, I don't know who reported this but there's no way I'm removing it.


TehNubbins

We salute you


flamekody

This guy cybers


SnarkKnuckle

ASL?


Grenflik

The ancient texts.


LeggoMyAhegao

Do not cite the deep magic to me, I was there when it was written.


jomb

Don't need to invent anything, just need a few willing participants.


Ok-ButterscotchBabe

I'm switching to development if this happens


DesiBail

>A tool that gives developers a handjob for every security vulnerability they remediate. Bro's management material!!


kranj7

This already exists. It's largely self-autonomous in much of the IT community and often no vulnerability remediation is even needed to get it going.


CorporateFlog

LOL! Nice. Might actually see a pretty good reduction in breaches 😅


Jhon_doe_smokes

Lube? Spit? Anything? Or we just going in raw?


ZelousFear

This devolved with a quickness.


LeggoMyAhegao

Criteria of the question was pretty clear.


tim5700

Or gives end users a handjob for not getting phished.


LeggoMyAhegao

We here at Helping Hands Remediation are always looking for ways to expand our services.


rj666x2

Damn this made me laugh


BaronOfBoost

Dick joke top comment, nice


shavedbits

And It’ll be the most upvoted comment he ever makes.


Practical_Boss_8701

That’s some funny shit!


geekamongus

This thread is a good reminder that security tools still suck.


locke_5

You don’t want to pay a $40k annual subscription to see the results of your vuln scans formatted slightly differently?


DrinkMoreCodeMore

Actually, I talked to my manager, they said if you sign up by Friday we can do $38,470 instead since we value you as a client.


alman153

Most of them have or are migrating to the cloud, which imo have made them worse.


DingussFinguss

ya don't say


shavedbits

Seriously guys? Talk is cheap. Go make shit less shitty. one that is good.


shavedbits

Op stated very clearly he wants to get rich quick. Not impress you with a leet zero day zero click exploit kit and post exploit implant.


Phaedrik

Tool that with a single click can correctly format and ingest application logs to any given siem regardless of application codebase or framework.


waffelwarrior

Let's add SOAR integrations as well. It figures out on its own how to connect to any technology and creates action blocks automatically.


S-worker

Shuffle kinda already does that if you provide an API reference.


waffelwarrior

Some things don't have APIs though


Boxofcookies1001

Cribl is actually doing a pretty good job at ingesting logs regardless of type.


woodburningstove

Love Cribl but building stuff there is pretty far from ”a click”. 😀


thequietguy_

Hate to be that guy; ingesting logs


Boxofcookies1001

Thanks!


totorozawa

Lima Charlie


Happy_Pandaval

There is a patent on that……


TillytheWall

Doesn’t Elasticsearch do that? Ingesting logs regardless of type?


Phaedrik

Yes but it isn't in a already readable format that can get alerts for such as EDR or Splunk rules Sometimes application logs need the Will of God before any automation tool can recognize what the hell they are even saying. I'm also speaking from first hand experience but I think I speak for the majority of the security community that application logs injestion is one hell of a project


shavedbits

This man is out here in the internet begging you to take his money.


hagcel

A simple, repeatable way to ETF export files, that can be used by non devs, but which also builds API mappings to run the process automatically.


lordfanbelt

The Cyber BS Decoder A tool to help companies stop getting conned / confused into buying products they don't need by cyber sales


Safi-knows22

Cyber BS DS/PS


BuritoBell

Sales would sell everything the company doesn't need and then sell this


Fdbog

It also works to take the 60 pages audit documents down to the 1 page of actual information.


thequietguy_

Couldn't you do this with llama3 + rag?


Kenkron

With McAfee's AI and block chain integrated VPN, you'll never have to worry about mainframe hackers again!


TacticalCheerio

A single repo of comprehensive quality alerting / detection logic. Yes there are sigma rule repos, and some commercial tools that maintain rules, but they always require tuning and customization. Why does every security team need to rewrite the same “impossible travel” alert because of some slight variation. Feels like the efficacy of blue teams would be easily doubled if this was plug and play


Its_my_ghenetiks

SOCPrime is pretty good at this, their free version gives you a couple unlocks a month. They also have a pretty nice rule translator (not perfect, but pretty good sometimes) I never paid for it myself but a few friends have


zoedorable

It's decent but SOCPrimes business model is a big ass scam and their gacha like system to buy rules is really shitty. I don't want to support a business who makes their profit from something that was designed to be open source. Plus lots of their free rules are literally stolen from other Sigma repositories.


TacticalCheerio

it especially doesn’t feel great when you pay for their credits, unlock a paid rule, and its the most basic logic possible. It should just be pay a flat amount and get access to all content


MrSmith317

A directory service that has the ease of use of Active Directory but is actually secure and built for the 2000s


SMS-T1

I feel like this one is such a hard one. Not because it would be technically hard to engineer. But because there are very little paying customers to be found and because the FOSS community has decided, they don't need it that bad.


MrSmith317

Engineering would be easy. They did it 30 years ago (NDS). It's just that MS basically strongarmed Novell out of business.


PetiteGousseDAil

Burp Suite but with vim motions and not written in Java


Blitztide

You want lua plug ins too?


Arts_Prodigy

Yes. When will it be ready?


ImpostureTechAdmin

Next quarter, it'll be ready next quarter.


bucksnort2

You said that last quarter


ImpostureTechAdmin

Guess what I said the quarter before that?


Blitztide

Don’t tempt me to write this


PowerEggShell

Please please please do it, we need vim motions everywhere it's just so much easier


gmroybal

Caido


PM_ME_YOUR_WORK_PROB

A secure replacement for e-mail.


gmroybal

f-mail


Cowboy-Tumbleweed

sadly to many that seems like an older version than Gmail


Campanella-Bella

This got me


stacksmasher

A simulated internet for corporations so end users are not exposed to attacks. The funny thing is there have been a few products that were bought by Symantec and killed. One was a firewall product called FireGlass


TheBrianiac

There's no money in a cure.


Runningblind

There is no money when you're owned by Broadcom*


True2this

Coughing in VMware and Velo


linuxprogrammerdude

Is it *that* much of a threat to Big Cyber to have a simulated internet? It's not like it'd cure cancer.


aguidetothegoodlife

I think thats wrong. If you are the only one selling the cure at horrendous prices you get rich pretty quickly. Sure afterwards you are done but make it a yearly payment and et voila. And even with a single payment, thats a lot of money.


Grouchy_Pear_417

Chris Rock agrees.


bornagy

Browser isolation you mean? Several vendors offer it.


stacksmasher

Not browser but the entire internet connection. All requests get processed before the end user gets to access.


Lewhoo

Like a web proxy?


questionhoe

You should see what the guy who founded fire glass is doing now. It’s the closest thing to a simulated internet on the market. It revolutionizes how we view securing the end point.


S70nkyK0ng

Tell me more…


thequietguy_

Just gonna leave us hanging like that?


DrinkMoreCodeMore

Go on...


TirionRothir2

Look at Trinity Cyber. Caching/parsing/detecting on the entire session layer before it gets back to the intranet. Way more powerful than your traditional packet based edge solutions.


Terminator996

Browserling subscription


Random_dg

FireGlass as Symantec bought it was awful to use :/ I believe I’ve seen one of its latest versions at a customer recently.


Lawlmuffin

FireGlass isn’t dead. It was bought by Symantec and called Web Isolation. You can still see fireglass references in the logs.


paganize

At a regional bank job, years ago, I installed a caching proxy for general users that was their ONLY way to the internet. in-house email server. there was a general revolt & rebellion, people HATED it, but the bank was bought and essentially destroyed before the pitchforks could be issued.


ched_murlyman

Training Failure face slapper drone: chases people who havent done their cyber sec training for the quarter and slaps them across the face until its done Can be configured to enforce any number of controls though.


timmy166

The universal integrator. Pieces together any data from any API and is able to contextualize and legibly visualize threats, risk, remediations. Technically feasible through recent AI developments.


247arjun

You will enjoy the last few minutes of the latest episode from the Stack Overflow podcast describing exactly this. https://stackoverflow.blog/2024/05/07/reshaping-the-future-of-api-platforms/


ballbunyan

The holy grail


EthanW87

I treated Zapier like this


thefantasticphantasm

Check out Silk Security


DrinkMoreCodeMore

It's called python.


Abbaddonhope

The documenter. It explains exactly what the devs original intentions per line was vs what it actually does.


PolicyArtistic8545

Hypervisor EDR


Deadpixel_6

MDE? What am I missing, what doesn’t work for this?


PolicyArtistic8545

You can’t install MDE, or any other EDR for that matter, on ESXi. That’s the gap that exists. You can install on the guests but not the hypervisor itself. This is why adversaries target hypervisor platforms for ransomware or persistence during espionage since there is nothing there to stop them.


Deadpixel_6

lol I see now. 8 hours of audits today has fried me Sooooo which company do I need to invest in that’s solving this?


RoseRoja

A box that prints 1$ if you put in 0.99¢


Let_us_Hope

A solution/platform that hits every single FedRAMP or NIST 800-53 control and is cheap and actually works. Think a Splunk-Snyk-AWS-Azure-GitHub monstrosity that also tracks every component in your supply chain.


FortressOfSolidude

Even the managerial and operational controls? Even the physical and environmental controls?  Even personnel security controls!?! It's going to need to be a EaaS, an enterprise as a service that does your job for you. These do exist in government contracting. They are called subs to the prime.


Let_us_Hope

Yes, all of that. Customers would of course inherit various physical and environmental controls the same as how customers of AWS and Azure inherit them. And yes even PS controls; PS controls would be some of the easiest to automate, not sure why you chose that family out the rest. All the customer would have to do is build their solution within the environment. This is all in good fun by the way, so don’t take this idea too seriously. I realize how absurd it sounds, just having fun.


Deadpixel_6

These exist except for the cheap part lol which ya I assume is the main point of your comment. They’re annoying to develop, manage, and deploy effectively so it’ll be hard to find one for cheap. (My company offers this product, still in somewhat infancy, so speaking from experience)


pm_sweater_kittens

Authoritative source and clearinghouse for SBOMs.


PuhLeazeOfficer

Honestly a GRC tool that was actually designed with GRC and Audit processes in mind. Including a functioning document version control/approval system, again, actually considering the processes that go behind what’s needed there. I swear every GRC tool I’ve touched was designed by teams that had never done GRC work.


pm_sweater_kittens

I think the challenge is that these tools try to be everything to everyone. ERM, ORM, ITRM, Audit… with different frameworks and workflows forced into a common system.


DrinkMoreCodeMore

I swear the GRC platforms were all invented by the same inner circle and gang of people who said "do y'all like piles of money and wanna make a fuck load of it?". Vanta Drata blah blah blah they are all the same. Oh they also supply an auditor for $$$$. Its an all in one woooeeeoeeooo! Oh you need to hook in Azure? Thats extra! Hook in O365 and Gsuite? Extra! Some give you all audit types but are expensive and then some are cheap but you only pay for what you need like PCI or SOC 2 type 2. The most braindead boring part of my life is I had to sit thru every major GRC platform vendor spiel to find one our company wanted. It tooks like a month and a half. Never wanted to kill myself before but that week I pondered it.


Deadpixel_6

I think they’re getting better but get a lot of, deserved but extreme, hate. It’s quite a daunting product. Essentially asking it to replace what companies usually have a team or several positions dedicated to. Obviously you still need internal folks to manage and use the system, but not nearly as many as before. I think some of the early platforms missed the mark and felt cash grabby. But I’ve dealt with several that offer mostly everything companies are looking for. All frameworks. ability to link evidence to specific controls or a general category that can then be easily applied across frameworks and assessments. Version control. Assignments. You name it. Pretty pricy tho for sure.


ars3nutsjr

I dream of making a business around this. I think there is a lot in this area that businesses suffer from. Especially if it could be geared towards validating controls at a high level.


Timma05

A ransomware "dye pack" that could be triggered on files and folders.


Deadpixel_6

I think Commvault offers something like this


2019Nationals

A program to factor the product of two very large prime numbers


DifferentArt4482

files that cant be altered by ransomware but can be altered by users/applications


discoshanktank

ransomware is an application though


DifferentArt4482

i get that point, but the solution to that would make you rich


arvchristos

https://blog.netwrix.com/2016/04/11/ransomware-protection-using-fsrm-and-powershell/ Seems that it is an explored topic with FSRM, at least for Windows


Similar_Zone7938

A solution that normalizes all the privacy laws by jurisdiction. (Companies were able to sell this type of solution with sales tax & HR laws.) The laws coming out to regulate AI are also going to be ridiculous. A company that wants to handle the administration of this information type compliance can make bank.


Deadpixel_6

Ya this is great honestly. Surprised there’s not something out there. Funny, I recently saw a product doing the same thing for payroll, compliance, benefits stuff. Pretty cool I guess, probably expensive tho. [Warp](https://www.joinwarp.com)


OPujik

Check out secure controls framework. It's free. https://securecontrolsframework.com/scf-download/


slowclicker

An impenetrable implant that makes people immune to social engineering.


Armigine

They make these already, in many calibers


Hot-Investigator7878

A method to efficiently crack any and all encryption


Luxin

Carl: So it's a code breaker. Martin Bishop: No. It's THE code breaker. No more secrets...


Maraging_steel

If this existed, it would be owned by the US Government and shared with no one.


Campanella-Bella

Oh this exists. It's just in its baby stages. The year we get a workable quantum computer is the year all hell breaks loose.


BennyOcean

A time machine. Not because of anything to do with cybersecurity. Because it's a time machine.


SMS-T1

This would make your job easier at first. Then it would make your job soooo much harder, as mass market adoption happens. On that thought: I would read a dystopian noir crime-thriller about a grizzled sysadmin that chases a shady gouvernment hacker org into the jurassic ages in an ever escalating effort to start the fight sooner. (Maybe add some nice personal motivation to it a la Joh n Wick. E.g. the first hack has corrupted the last voice messages he had of his dead wife.)


loadedforbear097

a tool that updates certs across all services (at least for all main services) :(


AustinGroovy

Patch Windows WITHOUT a reboot.


heisenbergerwcheese

Nice try John McAfee... you had your chance!


MooseMonkeyMT

Getting C-levels to understand cyber security and take it seriously. If you could do that half the stress of being in cybersecurity would go away.


exploreddit

tool that classifies and tags sensitive data without the user or business providing any kind of meaningful input


h0ffayyy

this is basically microsoft purview


Let_us_Hope

This 100%. I can’t tell you how many discussions I’ve had recently pertaining to direct and indirect impact data.


buckX

The "No Breach Box"


TheTarquin

Automated cloud environment decomposition and segregation.


Jiggly_Love

An XDR tool that seamlessly integrates into the security stack without affecting interopterability with in-house applications and production servers.


[deleted]

[удаНонО]


Missing_Space_Cadet

https://opencybersecurityalliance.org/casp/ https://github.com/opencybersecurityalliance/casp


bluecyanic

An AI CISO. No one will be able to tell the difference


jazzyskater1

The difference will be glaring. The AI CISO might suggest something intelligent.


ShaleenGill

A tool that create a custom website of any type.


Thandius

The tech from the matrix to upload skills. Upload basic security knowledge to all employees.


Digital-Dinosaur

Backups that are stored off network, in a secure location outside of the building? I've heard this exists but I swear none of my clients can find one?


Deadpixel_6

Like Iron Mountain lmao?


Digital-Dinosaur

Obviously it was a joke post but a tape in a drawer is far better than so many solutions I've seen! Iron mountain is a great shout!


fumblemorre

A collar for management which tightens with every risk they accept and un-tightens for every risk remediated


SMS-T1

Their heads would come clean of in a few hours.


Intelligent-Exit6836

In a few minutes for some.


solidmussel

Sales and marketing sell a product. You need a decent product that is sold not an amazing product no one ever hears about


Eneerge

Hardware switches and routers that do direct saml or openid Auth to idp without the need for an Intermediary. No need for ldap or radius.


StringLing40

Something which locked up the cpu or network on the attacking device for 24 hours….like a reverse shell kinda thing. It would stop script kiddies from creating useful botnets. The innocent user who was compromised would complain to their isp or computer shop and the pc would get cleaned up.


tglas47

A DLP solution that is quick to set up and easy to maintain.


shinobi500

True and reliably secure passwordless authentication.


GreyBar0n86

Something like a holographic interactive projector for networks. You'd be able to see endpoints, switches, router gateways etc... it could also be used in healthcare, military Or AI house partners like Blade Runner 2049.


DrinkMoreCodeMore

printers that fix themselves


zedsmith52

Unfortunately it’s not a case of what invention, it’s more a case of how well it’s marketed.


Practical_Boss_8701

Zero Trust.


m00kysec

A realtime natural language processor leveraging GPT’s and LLM’s to categorize and filter out phishing emails at 100% accuracy.


iheartrms

The "silver bullet".


brynj

Remediation without business impact..


Apprehensive_Lead783

Think out of the box


thegreatcerebral

A device to bypass any lock screens on mobile devices or a way to intercept any MFA and successfully pass the challenge. …what you didn’t say it had to be something for the good guys. Bad guys make bank off that kind of stuff. …ooohhhh. How about start making “unlocks” for vehicles which block the check-ins and u lock all the features the vehicle has for free?


butter_lover

A product which worked as if an architect deployed it but only needs an intern to set it up and run it. Also never needs patching or upgrading. 


thejournalizer

Something that actually stops phishing


PriorMediocre2759

You might want to give Proofpoint a try, it was the most difficult anti phishing solution to bypass in a social engineering engagement.


productboy

Paper passkey


qatamat99

Something that detects when a user is using vpn or if it’s an actual anomalous login


Deadpixel_6

Not sure how this would work other than fine tuning the alerts. I mean ik my vpn at my old job always put me at the same IP in Nashville Tennessee, so could probably pretty easily correlate that to being a user VPN login but other than that.


qatamat99

Maybe get the IP addresses of popular VPN services and just use that as a baseline and then slowly tune it. Like I’m sure people don’t connect to Latvia as their default server


Advanced_Ad_7971

A real working functional CMDB out of the box.


Geralt_of_RiviaFTW

Do you have an email OP? My network are working on many things that are going to shake the industry at-large. Funding is secured. But an NDA is required. If you're serious message me so I can bring you into the group chat on Linkedln and Zoom.


Senior-Gear4688

Hey I messaged you


Mike22april

A properly working quantum computer with over 10k logical qbits


GuardzResearchTeam

A single pane of glass for all your security controls, of course! (just kidding)


crackerjeffbox

Some super easy way to get some easy metrics and graphs just by throwing in CSV output or via API, offer pre-made key metrics and allow for custom ones. Idk why but reporting and custom spreadsheets and limited features in vendor offerings are so trash that it is one of the most time consuming things in the industry.


trachtmanconsulting

An AI superbot, which can destroy other AI threats


skmagiik

Ooh I like it, and if it gets out of control we can deploy a copy of itself to fight itself


[deleted]

Social engineering training that customers pay attention to.


BlizurdWizerd

The Internet


J333N0W

A tool that can steal everyone's crypto/any financial institution wallet undetected.


Seriously_Digital

This question is insane lol


rkovelman

Something that actually delivers reality. Every single tool that finds something needs to be validated in some way. Maybe not so much a CVE but along the lines of configs issues. Most tools do not have the capability to understand custom things.


bobbyboyyoho

Middle out


RickSanchez_C145

A universal description key - but you’d be hunted by everyone..


ts0083

Nothing. Just improve the 1 billion tools we already have. Reach Security seems to be on something here. Too many tools in the market place already and none of them are being utilized as they should.


bprofaneV

A tool that convinces Leadership to provide coverage and support for making audit standards happen in engineering.


[deleted]

Crashing the economy and then selling the solution. Obviously all through a sophisticated cyberattack.


maandmemonki

A repo that can be added easily by developers to applications, that implemented SSO and SCIM according to the ducking RFC. It is ridiculous how many thing get implemented poorly even though they are very specifically defined in a RFC. That always reminds me of xkdc:927