After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks
Over 58,000 internet-exposed CUPS hosts can be abused for significant DDoS attacks, according to Akamai. The post After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks appeared first on SecurityWeek.
Over 58,000 internet-exposed CUPS hosts can be abused for significant DDoS attacks, according to Akamai.
The post After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks appeared first on SecurityWeek.
What's Your Reaction?