Digital threat management company RiskIQ found hundreds of thousands of fringe network or remote access solutions from Cisco, Microsoft, Citrix, or IBM, where high and critical severity security vulnerabilities were discovered. The researchers say monitoring these new assets and the issues they re vulnerable to requires a new type of technology that looks at an organization s digital presence from the outside-in Even if fixes are available, attackers will keep scanning for vulnerable targets because they know that companies have a time to patch that represents a window of opportunity.
Source: https://www.bleepingcomputer.com/news/security/vulnerable-perimeter-devices-a-huge-attack-surface/

