Cybersecurity

IZ1H9 Campaign Enhances Its Arsenal with Scores of Exploits

The campaign leverages multiple vulnerabilities, including command injection, remote code execution, and arbitrary command execution, to gain control of targeted devices and incorporate them into the botnet.