<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Software Leaked? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-software-leaked/m-p/5083454#M1111878</link>
    <description>&lt;P&gt;Is that an official Nahhh, or just as far as you know? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I'm way behind on getting my ASAs upgraded, so I was a bit concerned.&lt;/P&gt;&lt;P&gt;Edit: Interesting that they don't allow emojis here, even text ones. Bit of a humorless bunch I guess.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 29 Apr 2024 22:58:36 GMT</pubDate>
    <dc:creator>jaysoo</dc:creator>
    <dc:date>2024-04-29T22:58:36Z</dc:date>
    <item>
      <title>ASA Software Leaked?</title>
      <link>https://community.cisco.com/t5/network-security/asa-software-leaked/m-p/5083293#M1111873</link>
      <description>&lt;P&gt;Is there any truth to the rumor that ASA software has been leaked, encryption reverse-engineered etc.? Just wondered if it's true or nonsense. I guess this might get deleted, which would be an answer of a sort I suppose.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2024 20:57:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-software-leaked/m-p/5083293#M1111873</guid>
      <dc:creator>jaysoo</dc:creator>
      <dc:date>2024-04-29T20:57:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Software Leaked?</title>
      <link>https://community.cisco.com/t5/network-security/asa-software-leaked/m-p/5083427#M1111877</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320150"&gt;@jaysoo&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Nahhh, it doesn't seem the case so we all good for now &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2024 22:18:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-software-leaked/m-p/5083427#M1111877</guid>
      <dc:creator>Ruben Cocheno</dc:creator>
      <dc:date>2024-04-29T22:18:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Software Leaked?</title>
      <link>https://community.cisco.com/t5/network-security/asa-software-leaked/m-p/5083454#M1111878</link>
      <description>&lt;P&gt;Is that an official Nahhh, or just as far as you know? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I'm way behind on getting my ASAs upgraded, so I was a bit concerned.&lt;/P&gt;&lt;P&gt;Edit: Interesting that they don't allow emojis here, even text ones. Bit of a humorless bunch I guess.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2024 22:58:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-software-leaked/m-p/5083454#M1111878</guid>
      <dc:creator>jaysoo</dc:creator>
      <dc:date>2024-04-29T22:58:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Software Leaked?</title>
      <link>https://community.cisco.com/t5/network-security/asa-software-leaked/m-p/5083758#M1111895</link>
      <description>&lt;P&gt;The software is commercially available so it is easily obtained and studied by hostile actors as well as "white hat" hackers. When a vulnerability is discovered, it goes through a standard process for analysis, including PSIRT (Product Security Incident Response Team) and CVE (Common Vulnerabilities and Exposures) scoring if applicable. The various public notices, security advisories and release notes comprise the "official" Cisco response to this sort of thing.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2024 08:22:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-software-leaked/m-p/5083758#M1111895</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-04-30T08:22:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Software Leaked?</title>
      <link>https://community.cisco.com/t5/network-security/asa-software-leaked/m-p/5083787#M1111898</link>
      <description>&lt;P&gt;In the realm of cybersecurity, it's not uncommon for vulnerabilities to be discovered, exploits to be developed, and rumors to circulate. It's always a good idea to stay updated on security advisories from reputable sources such as the vendor's official channels &lt;A href="https://sec.cloudapps.cisco.com/security/center/publicationListing.x?product=Cisco&amp;amp;keyword=9.12&amp;amp;sort=-day_sir#~Vulnerabilities" target="_self"&gt;cisco vulnerabilities&lt;/A&gt;&amp;nbsp; , security blogs, or CVE databases to ensure you have the latest information to protect your systems.&lt;/P&gt;
&lt;P&gt;Also Advanced Persistent Threats (APTs) are a significant concern in the realm of cybersecurity. APTs involve targeted attacks by well-funded and highly skilled adversaries who aim to gain unauthorized access to systems and maintain that access over an extended period, often for espionage or sabotage purposes. These attackers typically employ a variety of sophisticated techniques, including exploiting vulnerabilities, reverse engineering encryption, and leveraging zero-day vulnerabilities.&lt;/P&gt;
&lt;P&gt;you might have miss-understood it. There is a vulnerbaitlites exposed &lt;A href="https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_attacks_event_response" target="_blank"&gt;https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_attacks_event_response&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2024 08:56:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-software-leaked/m-p/5083787#M1111898</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2024-04-30T08:56:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Software Leaked?</title>
      <link>https://community.cisco.com/t5/network-security/asa-software-leaked/m-p/5086566#M1111989</link>
      <description>&lt;P&gt;No, I didn't misunderstand anything. I had seen comments elsewhere online regarding what I asked about. I know it's common for vulnerabilities to be discovered, that's pretty much a daily thing in IT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2024 20:08:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-software-leaked/m-p/5086566#M1111989</guid>
      <dc:creator>jaysoo</dc:creator>
      <dc:date>2024-05-01T20:08:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Software Leaked?</title>
      <link>https://community.cisco.com/t5/network-security/asa-software-leaked/m-p/5086570#M1111990</link>
      <description>&lt;P&gt;Thanks for the info. I'm not a programmer, so I'm not sure if having the actual source code out there is more of problem than having a copy of the OS. I guess software can be decompiled anyway, so maybe it's a dumb question on my part, not sure.&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2024 20:12:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-software-leaked/m-p/5086570#M1111990</guid>
      <dc:creator>jaysoo</dc:creator>
      <dc:date>2024-05-01T20:12:46Z</dc:date>
    </item>
  </channel>
</rss>

