Comment by GaryNumanVevo
3 months ago
Most of the compromised devices are routers or IoT devices, functionally no compute power to do anything interesting except spam IPs with requests.
3 months ago
Most of the compromised devices are routers or IoT devices, functionally no compute power to do anything interesting except spam IPs with requests.
No comments yet
Contribute on Hacker News ↗