Please turn on your JavaScript for this page to function normally.
MikroTik
![Mikrotik](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/26130436/mikrotik1-400x200.jpg)
MikroTik vulnerability could be used to hijack 900,000 routers (CVE-2023-30799)
A privilege escalation vulnerability (CVE-2023-30799) could allow attackers to commandeer up to 900,000 MikroTik routers, says VulnCheck researcher Jacob Baines. While …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101457/biohazard-400x200.jpg)
Trickbot uses compromised MikroTik routers as C2 communication proxies
MikroTik routers are getting compromised to serve as communication proxies for Trickbot malware, to enable Trickbot-affected devices to communicate with their their C2 server …
![router](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100046/router-400x200.jpg)
MikroTik routers with default credentials can be easily compromised
If you own a MikroTik router and you haven’t updated its RouterOS in the last month, you should do so now: Tenable Research has released details about four …
![Monero](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102212/monero-400x200.jpg)
Compromised MikroTik routers power extensive cryptojacking campaign
A massive cryptojacking campaign that relies on compromised MikroTik routers serves users with pages injected with the Coinhive mining script. It seems that the attacker …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD