• melroy@kbin.melroy.org
    link
    fedilink
    arrow-up
    1
    arrow-down
    1
    ·
    1 day ago

    The botnet is most likely build by exploiting vulnerable routers or cameras. Adding these devices to a overall botnet. What do you think?