<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[I&#x27;m putting together a webinar on modern vulnerability management and I&#x27;m REALLY trying to drive a point home]]></title><description><![CDATA[<p>I'm putting together a webinar on modern vulnerability management and I'm REALLY trying to drive a point home</p><p>So naturally, I bought 3 old Sonicwall firewalls</p>]]></description><link>https://board.circlewithadot.net/topic/6c2242f5-5ba0-4994-90ef-5ad2fd0ed784/i-m-putting-together-a-webinar-on-modern-vulnerability-management-and-i-m-really-trying-to-drive-a-point-home</link><generator>RSS for Node</generator><lastBuildDate>Fri, 01 May 2026 11:51:24 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/6c2242f5-5ba0-4994-90ef-5ad2fd0ed784.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 28 Apr 2026 19:11:37 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to I&#x27;m putting together a webinar on modern vulnerability management and I&#x27;m REALLY trying to drive a point home on Thu, 30 Apr 2026 16:43:14 GMT]]></title><description><![CDATA[<p><span><a href="/user/gordondraper%40infosec.exchange">@<span>gordondraper</span></a></span> in other words, we're worried about Mythos, but folks aren't patching their network infrastructure and that's one of the main ways they're getting popped</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/sawaba/statuses/116494656777672003</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/sawaba/statuses/116494656777672003</guid><dc:creator><![CDATA[sawaba@infosec.exchange]]></dc:creator><pubDate>Thu, 30 Apr 2026 16:43:14 GMT</pubDate></item><item><title><![CDATA[Reply to I&#x27;m putting together a webinar on modern vulnerability management and I&#x27;m REALLY trying to drive a point home on Thu, 30 Apr 2026 16:42:20 GMT]]></title><description><![CDATA[<p><span><a href="/user/gordondraper%40infosec.exchange">@<span>gordondraper</span></a></span> the context you're missing is that a third of ransom payments went to Akira, who is just successfully using one Sonicwall vuln over and over for the past 2 years.</p><p>250,000+ vulnerabilities out there, but harm/losses only come from a few dozen every year.</p><p>I bought the Sonicwalls to demonstrate how the attackers think:</p><ol><li>find a reliable exploit</li><li>are there lots of exposed targets?</li><li>if yes, start hitting them and profit</li><li>next week: are there still lots of exposed targets?</li><li>if yes, GOTO 3</li></ol>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/sawaba/statuses/116494653236465832</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/sawaba/statuses/116494653236465832</guid><dc:creator><![CDATA[sawaba@infosec.exchange]]></dc:creator><pubDate>Thu, 30 Apr 2026 16:42:20 GMT</pubDate></item><item><title><![CDATA[Reply to I&#x27;m putting together a webinar on modern vulnerability management and I&#x27;m REALLY trying to drive a point home on Thu, 30 Apr 2026 07:56:52 GMT]]></title><description><![CDATA[<p><span><a href="/user/sawaba%40infosec.exchange">@<span>sawaba</span></a></span> worst thing is probably that there is a second hand market for these... is someone buying and installing them? IMO they should be treated as the asbestos of the 2000 <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f642.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--slightly_smiling_face" style="height:23px;width:auto;vertical-align:middle" title=":-)" alt="🙂" /></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/gnyman/statuses/116492586986740539</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/gnyman/statuses/116492586986740539</guid><dc:creator><![CDATA[gnyman@infosec.exchange]]></dc:creator><pubDate>Thu, 30 Apr 2026 07:56:52 GMT</pubDate></item><item><title><![CDATA[Reply to I&#x27;m putting together a webinar on modern vulnerability management and I&#x27;m REALLY trying to drive a point home on Tue, 28 Apr 2026 21:01:02 GMT]]></title><description><![CDATA[<p><span><a href="/user/sawaba%40infosec.exchange">@<span>sawaba</span></a></span> confused, yes there will be vulns there, but how does that lead to vuln management process… identification, prioritisation triage, remediation… how does having a “blinkin lights” lead you to a satisfactory outcome? Or is that the point… patches can fail due to badly written patches that don’t fully remediate the problem?</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/gordondraper/statuses/116484345863184893</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/gordondraper/statuses/116484345863184893</guid><dc:creator><![CDATA[gordondraper@infosec.exchange]]></dc:creator><pubDate>Tue, 28 Apr 2026 21:01:02 GMT</pubDate></item></channel></rss>