https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike
Will these ever end?
No, as threat modeling evolves, and as IT consumers continue to use legacy IT assets, hackers will find a way to exploit them.
It all comes down to dollars. Vendors want to work on new offerings, while consumers will use legacy systems until it makes financial sense to move on.
No comments:
Post a Comment