Did you get slammed? The Slammer worm was the fastest moving in Internet history. It impaired important systems in the U.S. government and private sector, delayed operations at a major airline and several media organizations, knocked cash machines offline, and interfered with 911 and other emergency services. It now looks like whoever launched the worm based the attack code on an exploit program that David Litchfield, a well-respected software security specialist, wrote to test the vulnerability.Litchfield did nothing out of the routine. His company, NGS, discovered a flaw in a Microsoft SQL Server program last year. Litchfield reported it to Microsoft, which issued a patch for the vulnerability in July. Speaking at a security conference on August 1, he mentioned the vulnerability and released his code to the audience. Litchfield had to know what we all know: A great many IT departments do not update their system patches as often as they should. Now, everyone knows the outcome. Litchfield has acknowledged that we got away lucky. At the end of January analysts at London-based Mi2g Ltd. estimated that Slammer accounted for damages of $945 million to $1.15 billion. Had the worm carried a malevolent payload, Litchfield says, things would be much worse. Security experts like Litchfield operate in a delicate and powerful space. Their knowledge of software vulnerabilities is typically used for good, yielding patches that make business safe from crooks. But it can also be used for ill, putting at risk hundreds of millions of dollars and even human life. With that in mind Litchfield has said hes unsure whether hell ever publish an exploit program again. But some experts, like those at GreyMagic Software, have complained that even when vendors are aware of vulnerabilities, they can take several months to come up with patches. Going public with flaws early on, they say, is one way to light a fire under vendors who might otherwise drag their feet. According to a Boston Globe story last week, Litchfield has received hundreds of e-mails from colleagues in security, urging him to continue publishing what he finds. Having the knowledge out there will push both vendors and users to act expeditiously, they say.What do you say? Should security pros share their discoveries of flaws only with the vendors who can fix them? Should they have to wait a certain amount of time after patches are issued before going public with code? Or should they tell all, and let the good and nefarious forces fight it out? Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe