
Risky Bulletin: Supply chain attack plants backdoor on Android tablets
Risky Bulletin
00:00
Kim Woof botnet floods I2P network
Claire Aird describes how an IoT botnet overloaded I2P while hosting its C2 infrastructure, disrupting legitimate users.
Play episode from 04:31
Transcript


