
Hackers come hopping back. [Research Saturday]
CyberWire Daily
00:00
Analyzing the Malware Fritz Frog
Learn about how the peer-to-peer malware Fritz Frog infects systems, utilizing SSH brute force and log4j exploitation to deliver payloads. Discover unique tactics used by Fritz Frog to avoid detection and recommendations to protect against such botnets.
Play episode from 10:10
Transcript


