arstechnica , 2 months ago Cisco firewall 0-days under attack for 5 months by resourceful nation-state hackers Perimeter devices ought to prevent network hacks. Why are so many devices allowing attacks? https://arstechnica.com/security/2024/04/cisco-firewall-0-days-under-attack-for-5-months-by-resourceful-nation-state-hackers/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social
Cisco firewall 0-days under attack for 5 months by resourceful nation-state hackers
Perimeter devices ought to prevent network hacks. Why are so many devices allowing attacks?
https://arstechnica.com/security/2024/04/cisco-firewall-0-days-under-attack-for-5-months-by-resourceful-nation-state-hackers/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social
apicultor , 2 months ago @arstechnica >Perimeter devices ought to prevent network hacks. Why are so many devices allowing attacks? Because of shitty engineering and nobody giving a fuck about doing things right. It just isn't more exciting than that. Sorry. A great recent example is the shoddy Python in Palo Alto devices (CVE-2024-3400), and of course being run as root because why not: https://labs.watchtowr.com/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400/
@arstechnica >Perimeter devices ought to prevent network hacks. Why are so many devices allowing attacks?
Because of shitty engineering and nobody giving a fuck about doing things right.
It just isn't more exciting than that. Sorry.
A great recent example is the shoddy Python in Palo Alto devices (CVE-2024-3400), and of course being run as root because why not: https://labs.watchtowr.com/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400/