
Sign up to save your podcasts
Or
"Hello! I'm a Printer! Please Let Me In!"
“Hello! I’m a printer! Please let me enter, thank you!” – It may sound absurd, but this is how attackers can trick your Linux systems through the cups-browsed service..
In this latest Threat Talk, Lieuwe-Jan Koning reveals, with ON2IT’s Rob Maas and Luca Cipriano how a seemingly harmless printer can turn into a hacker’s gateway to your network.
With open ports and weak default configurations, your Linux environment could be more exposed than you think.
🔒 Tune in to learn how these vulnerabilities can be exploited and, more importantly, what steps you can take to secure your systems. Don’t wait until it’s too late!
📊 Bonus Resource: We’ve created an in-depth infographic breaking down these hacks in detailed illustrations—an invaluable tool for all security information professionals!
https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf
🔔 Hit that subscribe button and show your support! 🔔
"Hello! I'm a Printer! Please Let Me In!"
“Hello! I’m a printer! Please let me enter, thank you!” – It may sound absurd, but this is how attackers can trick your Linux systems through the cups-browsed service..
In this latest Threat Talk, Lieuwe-Jan Koning reveals, with ON2IT’s Rob Maas and Luca Cipriano how a seemingly harmless printer can turn into a hacker’s gateway to your network.
With open ports and weak default configurations, your Linux environment could be more exposed than you think.
🔒 Tune in to learn how these vulnerabilities can be exploited and, more importantly, what steps you can take to secure your systems. Don’t wait until it’s too late!
📊 Bonus Resource: We’ve created an in-depth infographic breaking down these hacks in detailed illustrations—an invaluable tool for all security information professionals!
https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf
🔔 Hit that subscribe button and show your support! 🔔