Thousands of MikroTik Routers Hijacked for Eavesdropping
Using a known vulnerability, the threat actor is listening to a variety of ports. Continue reading Thousands of MikroTik Routers Hijacked for Eavesdropping
Collaborate Disseminate
Using a known vulnerability, the threat actor is listening to a variety of ports. Continue reading Thousands of MikroTik Routers Hijacked for Eavesdropping
A new malicious campaign has compromised more than 40,000 machines globally to monetize via traffic hijacking and cryptomining.
Continue reading Operation Prowli Profits On Weak IoT Devices, Servers
A serious vulnerability in the TCP implementation in Linux systems can be used identify hosts communicating over the protocol and attack that traffic. Continue reading Serious TCP Bug in Linux Systems Allows Traffic Hijacking