cybersecurity
“We have been working on fixes for the last three weeks and hope to have them available soon. We are removing support for the old CUPS browse protocol completely”
Some 300,000 endpoints may be publicly exposed to RCE, but these are likely to be largely desktops not servers.
An attacker would need to craft a malicious container and run it "either directly (for example in services allowing shared GPU resources) or indirectly through a supply chain or social engineering attack"
"The activity shows how Generative AI is accelerating attacks and lowering the bar for cybercriminals to infect endpoints."
"One of the most rapidly growing expense line items" -- with Zscaler and CyberArk among the vendors getting paid.