Router reality check: 86% of default passwords have never been changed

Misconfigurations remain a popular compromise point — and routers are leading the way. According to recent survey data, 86% of respondents have never changed their router admin password, and 52% have never adjusted any factory settings. This puts attackers in the perfect position to compromise enterprise networks. Why put the time and effort into creating phishing […]

The post Router reality check: 86% of default passwords have never been changed appeared first on Security Intelligence.

Continue reading Router reality check: 86% of default passwords have never been changed

Is it possible to block entire TLDs on Ubiquity UniFi devices without a custom DNS?

I’m looking into ways to network wide block specific TLDs such as ZIP, XYZ, MOV. However I prefer to not setup a whole custom DNS specifically for this purpose. I so far did not find a solution yet. A command line option instead of through… Continue reading Is it possible to block entire TLDs on Ubiquity UniFi devices without a custom DNS?

Update your OpenWrt router! Security issue made supply chain attack possible

A security issue that could have allowed attackers to serve malicious firmware images to users has been fixed by OpenWrt Project, the organization that helms the development of the popular Linux distribution for embedded devices. About OpenWrt OpenWrt … Continue reading Update your OpenWrt router! Security issue made supply chain attack possible

IPv4 gateway changes when DNS poisoning from successful arp spoof [closed]

I’ve recently been testing my wireless LAN against common attacks, one of them being arp spoofing, and attacks stemming from a successful arp spoof, such as dns poisoning. (I use bettercap)
On all of my routers, arp spoofing works successf… Continue reading IPv4 gateway changes when DNS poisoning from successful arp spoof [closed]

The role of compromised cyber-physical devices in modern cyberattacks

Cyber-physical devices are increasingly getting compromised and leveraged by criminal groups and state-sponsored threat actors. Fyodor Yarochkin, Senior Threat Solution Architect with Trend Micro, believes that getting a better understanding of attacke… Continue reading The role of compromised cyber-physical devices in modern cyberattacks