• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Security Affairs newsletter Round 243
  • US authorities charged Dridex gang members for stealing over $100 Million
  • Vietnam-linked Ocean Lotus hacked BMW and Hyundai networks
  • Russia-linked Gamaredon group targets Ukraine officials
  • VMware addresses ESXi issue disclosed at the Tianfu Cup hacking competition
  • CVE-2019-14899 flaw allows hijacking VPN connections on Linux, Unix systems
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Posts tagged "MikroTik"

MikroTik

DoS flaw in several MikroTik Routers exploited in attacks

A vulnerability could be exploited by attackers to trigger a denial-of-service...

April 6, 2019  By Pierluigi Paganini

Evolution of threat landscape for IoT devices – H1 2018

Security experts from Kaspersky have published an interesting report...

September 19, 2018  By Pierluigi Paganini

Other 3,700 MikroTik Routers compromised in cryptoJacking campaigns

Thousands of unpatched MikroTik Routers are involved in new cryptocurrency...

September 11, 2018  By Pierluigi Paganini

Experts warn of 7,500+ MikroTik Routers that are hijacking owners’ traffic

The security firm Qihoo 360 Netlab discovered more than 7,500 MikroTik...

September 4, 2018  By Pierluigi Paganini

Experts discovered remotely exploitable buffer overflow vulnerability in MikroTik RouterOS

Security experts at Core Security have disclosed the details of a buffer...

March 19, 2018  By Pierluigi Paganini



Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Necessary Always Enabled