We shouldn't focus on the same method of exploiting systems. Instead we should be looking for other vulnerabilities to these systems.