After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks

Over 58,000 internet-exposed CUPS hosts can be abused for significant DDoS attacks, according to Akamai.  The post After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks appeared first on SecurityWeek.

Oct 2, 2024 - 14:00
 0  0
After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks

Over 58,000 internet-exposed CUPS hosts can be abused for significant DDoS attacks, according to Akamai. 

The post After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks appeared first on SecurityWeek.

What's Your Reaction?

like

dislike

love

funny

angry

sad

wow