router

  1. Friend

    Your router is under the gun: the botnet "7777" is actively increasing its power

    Researchers warn of a new wave of digital attacks. Security researchers from Team Cymru have revealed a noticeable expansion in the activity of the 7777 botnet, first noticed in October 2023 and named after the use of TCP port 7777 on infected routers. Recent studies have shown that this botnet...
  2. Tomcat

    Gamers, please note: the TP-Link Archer C5400X gaming router is vulnerable to hacker attacks

    Rather, update the firmware so that cyber villains do not interfere with your online victories. A serious vulnerability has been identified in the TP-Link Archer C5400X gaming router, which leads to remote code execution on vulnerable devices by sending specially generated requests. The...
  3. Father

    Cuttlefish: A stealthy marine spy right in your router

    No password will escape the sophisticated digital cuttlefish. A new type of malware, called "Cuttlefish", was discovered in routers in large enterprises and small offices. It monitors all information passing through infected devices and steals credentials. Black Lotus Labs reports that...
  4. Brother

    Anonymous VPN router powered by pfSense

    So, we have a tunnel to the VPN provider and we want to be sure that all traffic, including DNS requests, goes only through this tunnel, and if it is unavailable, users should in no case go directly through the provider's network. Installed pfSense CE version 2.5.2, registration on CyberGhost...
  5. Hacker

    How to protect your router from hacking

    What can you get by hacking a Wi-Fi router? It is curious that most users understand the danger of hacking their computer, since an attacker can gain access to their personal data, photos, passwords. It is very important to understand that hacking a router is a precursor to hacking a computer...
  6. Carder

    Anonymous Virtual Router

    Managing a virtual router is a pleasure: - Everything is clear and simple and you don't need to go into the brains of some box to change the IP address or register the IP address of a new ssh/socks/vpn/tor there, since network switching is done by clicking in another window of the virtual...
Top