Lee Duna@lemmy.nz to Technology@beehaw.orgEnglish · 1 year agoCloudflare DDoS protections ironically bypassed using Cloudflarewww.bleepingcomputer.comexternal-linkmessage-square3fedilinkarrow-up1107arrow-down10cross-posted to: cybersecurity@infosec.pub
arrow-up1107arrow-down1external-linkCloudflare DDoS protections ironically bypassed using Cloudflarewww.bleepingcomputer.comLee Duna@lemmy.nz to Technology@beehaw.orgEnglish · 1 year agomessage-square3fedilinkcross-posted to: cybersecurity@infosec.pub
minus-squareconciselyverbose@kbin.sociallinkfedilinkarrow-up9·1 year agoIt could still be a problem for an enterprise client where individuals could exfiltrate or accidentally leak target IPs. A lot of security flaws like this don't automatically compromise a system, but can be used in combination with other elements for an attack. Identifying it means they have the ability to resolve it and come up with an action plan for an attack if long term mitigations will take time though.
It could still be a problem for an enterprise client where individuals could exfiltrate or accidentally leak target IPs.
A lot of security flaws like this don't automatically compromise a system, but can be used in combination with other elements for an attack.
Identifying it means they have the ability to resolve it and come up with an action plan for an attack if long term mitigations will take time though.