Security News
If they fall for this social-engineering trick, of course Vid Beware using your web browser's autofill feature to log into your broadband router via Wi-Fi. If the login attempt is sent over...
Researchers uncover botnet pouncing on security holes More than 7,500 Mikrotik routers have been compromised with malware that logs and transmits network traffic data to an unknown control server.…
Using a known vulnerability, the threat actor is listening to a variety of ports.
Last month we reported about a widespread crypto-mining malware campaign that hijacked over 200,000 MikroTik routers using a previously disclosed vulnerability revealed in the CIA Vault 7 leaks....
TP-Link announced the upcoming launch of the Archer C2700, a next level AC2600 Dual-Band WiFi Router that utilizes Intel technology to provide WiFi at speeds up to 1733Mbps on the 5GHz band and...
An industrial router made by Australian telecommunications equipment company NetComm Wireless is affected by several serious vulnerabilities that can be exploited remotely to take control of...
Remotely Exploitable Software Vulnerabilities To Blame For HijackingCybercriminals in Brazil have capitalized on older vulnerabilities in D-Link routers for financially motivated phishing attacks....
Daniel Crowley, research baron for X-Force Red at IBM, and Jennifer Savage, security researcher at Threatcare, show an exploited demo based on vulnerabilities found in the Meshlium router at Black Hat.
A massive cryptojacking campaign that relies on compromised MikroTik routers serves users with pages injected with the Coinhive mining script. It seems that the attacker initially mainly focused...
Attackers managed to infect tens of thousands of MikroTik network routers in Brazil with code that injects the CoinHive in-browser crypto-mining script into web traffic. read more