Follow

"Researchers have discovered at least 9,000 exposed endpoints that can be accessed and used without authentication, allowing threat actors easy access to internal networks"

bleepingcomputer.com/news/secu

Sign in to participate in the conversation
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.