<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Management-Plane on microsegment.io</title>
    <link>https://microsegment.io/tags/management-plane/</link>
    <description>Recent content in Management-Plane on microsegment.io</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Wed, 08 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://microsegment.io/tags/management-plane/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Management Consoles: The Keys to the Kingdom</title>
      <link>https://microsegment.io/post/2026-04-08-management-consoles-keys-to-the-kingdom/</link>
      <pubDate>Wed, 08 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://microsegment.io/post/2026-04-08-management-consoles-keys-to-the-kingdom/</guid>
      <description>&lt;h2 id=&#34;the-wrong-thing-is-still-trusted&#34;&gt;The Wrong Thing Is Still Trusted&lt;/h2&gt;&#xA;&lt;p&gt;Defenders keep hardening endpoints, tuning detections, and buying more visibility.&lt;/p&gt;&#xA;&lt;p&gt;Meanwhile, attackers keep going after the systems that already have permission to touch everything.&lt;/p&gt;&#xA;&lt;p&gt;That is the real problem with management consoles.&lt;/p&gt;&#xA;&lt;p&gt;When a laptop gets compromised, you have an incident.&lt;/p&gt;&#xA;&lt;p&gt;When a management console gets compromised, you may have a change-control&#xA;problem, an identity problem, a visibility problem, and a lateral movement&#xA;problem all at once.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Hard Truths #1: Your Security Tools Are the Attack Surface</title>
      <link>https://microsegment.io/post/2026-03-26-hard-truths-1-security-tools-attack-surface/</link>
      <pubDate>Thu, 26 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://microsegment.io/post/2026-03-26-hard-truths-1-security-tools-attack-surface/</guid>
      <description>&lt;h2 id=&#34;the-pattern-nobody-wants-to-see&#34;&gt;The Pattern Nobody Wants to See&lt;/h2&gt;&#xA;&lt;p&gt;This month alone, four major security vendors had their management infrastructure turned into attack vectors. Not the endpoints they protect. The management consoles that control them.&lt;/p&gt;&#xA;&lt;p&gt;Let that sink in.&lt;/p&gt;&#xA;&lt;h3 id=&#34;the-incidents&#34;&gt;The Incidents&lt;/h3&gt;&#xA;&lt;p&gt;&lt;strong&gt;Cisco Secure Firewall Management Center&lt;/strong&gt; - CVE-2026-20131, CVSS 10.0. Unauthenticated remote code execution as root. The Interlock ransomware group exploited this as a zero-day for &lt;strong&gt;36 days&lt;/strong&gt; before Cisco even disclosed it. Amazon&amp;rsquo;s threat intelligence team caught them exploiting it since January 26. The attackers had custom RATs, recon scripts, proxy infrastructure - the full playbook. All through a firewall management console.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
