After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks Eduard Kovacs

Over 58,000 internet-exposed CUPS hosts can be abused for significant DDoS attacks, according to Akamai. 

The post After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks appeared first on SecurityWeek.

Read More 


Posted

in

by

Tags: