www.paloaltonetworks.com → Leader in Cybersecurity Protection & Software for the Modern Enterprises - Palo Alto Networks
Thanks, I will avoid them.
Submitted 1 year ago by Joker@sh.itjust.works to technology@lemmy.world
https://www.thestack.technology/palo-alto-networks-zero-day-exploited/
www.paloaltonetworks.com → Leader in Cybersecurity Protection & Software for the Modern Enterprises - Palo Alto Networks
Thanks, I will avoid them.
“urging customers to pull their management interfaces off the public internet or restrict them to known IP addresses.”
Sounds more like pebkac and less of a big deal. Management interface should be in your management VLAN, plus I don’t know another vendor that can touch them in terms of security features.
They’re spamming all web logs too with an advertisement for their services in the user agent. I decided to ban them from all my websites because the logs took up too much space.
Yeah fuck them.
thejml@lemm.ee 1 year ago
Why would you EVER put management interfaces on the public internet? What terrible decisions led them down that path? VPN is so quick and easy at a minimum.
cyberpunk007@lemmy.ca 1 year ago
Once I read this I just stopped lol. You almost deserve to be explored if you do this, this is like security 101.
jdeath@lemm.ee 1 year ago
zero trust?
catloaf@lemm.ee 1 year ago
Management interfaces shouldn’t even be accessible from the general LAN.
qjkxbmwvz@startrek.website 1 year ago
The network gear I manage is only accessible via VPN, or from a trusted internal network…
…and by “my network” I mean my home network (a router and a few managed switches and access points). If a doofus like me can set it up for my home, I’d think that actual companies would be able to figure it out, too.
Evotech@lemmy.world 1 year ago
I know right, 99% of these caves are against management interfaces too