June 8, 2023, 8:17 p.m. | BrianKrebs

Krebs on Security krebsonsecurity.com

It's not often that a zero-day vulnerability causes a network security vendor to urge customers to physically remove and decommission an entire line of affected hardware -- as opposed to just applying software updates. But experts say that is exactly what transpired this week with Barracuda Networks, as the company struggled to combat a sprawling malware threat which appears to have undermined its email security appliances in such a fundamental way that they can no longer be safely updated with …

barracuda barracuda networks caitlin condon customers cve-2023-2868 email email security email security gateway experts hardware international computer science institute latest warnings mandiant network networks network security nicholas weaver patching rapid7 remove security security vendor software software updates time to patch updates vendor vulnerability zero-day zero-day vulnerability

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC