You must log in or # to comment.
Not really shocking that a device sitting at the network edge and inspecting every packet coming through would be susceptible to wormable exploits. I think the entire IT industry is on the verge of a reckoning about the risk of having a “god mode” device on the network, the highest of high value targets, sitting right on the edge.
And here I thought everyone had migrated mail off-premise already. Last gasps of a legacy methodology.
Who covers the cost of the replacement?