Time for cybersecurity teams to stop cleaning up someone else’s vulnerability mess