securityaffairs.com
A new Linux Botnet abuses IaC Tools to spread .........
A Linux botnet uses Tor through a network of proxies using the Socks5 protocol, abuses legitimate DevOps tools, and other emerging techniques
Pierluigi Paganini