After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks

Over 58,000 internet-exposed CUPS hosts can be abused for significant DDoS attacks, according to Akamai. 

The post After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks appeared first on SecurityWeek.

Read more: After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks

Story added 2. October 2024, content source with full text you can find at link above.