Hackers use more than 80 publicly available vulnerabilities to infect devices.
Over the past three months, the hackers behind the CatDDoS botnet have exploited more than 80 known vulnerabilities in various software products to infect devices and integrate them into their network to conduct...