In 2018, several malware campaigns targeted and succeed to infect millions of low-cost routers (malwares e.g., VPN-Filter, Navidade, and SonarDNS). These routers were used, then, for all sort of cybercrimes: from DDoS attacks to ransomware. MikroTik routers are a peculiar example of low-cost routers. These routers are used to provide both last mile access to home users and are used in core network infrastructure. Half of the core routers used in one of the biggest Internet exchanges in the world are MikroTik devices. The problem is that vulnerable firmwares (RouterOS) used in homeusers houses are also used in core networks. In this paper, we are the first to quantify the problem that infecting MikroTik devices would pose to the Internet. Ba...
Attacks on Internet of Things (IoT) devices, exploiting inherent vulnerabilities, have intensified ...
Many different network and host-based security solutions have been developed in the past to counter ...
A very significant increase in the spread of malware has resulted in malware analysis. A recent appr...
Attacks targeting network infrastructure devices pose a threat to the security of the internet. An a...
The number of Internet of Things devices, small low-powered devices with internet connectivity, is u...
Attacks on Internet of Things (IoT) devices, exploiting inherent vulnerabilities, have intensified o...
With the arrival of the Internet of Things (IoT), more devices appear online with default credential...
Open-source honeypots are a vital component in the protection of networks and the observation of tre...
With the arrival of the Internet of Things (IoT), more devices appear online with default credential...
The cybersecurity landscape is constantly evolving, meaning threat actors continually find and devel...
Honeypots have been implemented in network security for years now, from the simplesystems where they...
Defending industrial control systems (ICS) in the cyber domain is both helped and hindered by bespok...
The Internet of Things is becoming more and more popular. From surveillance video cameras to interne...
The role of the Internet is continuously increasing and many technical, commercial, and business tra...
Day by day, more and more people are using internet all over the world. It is becoming apart of ever...
Attacks on Internet of Things (IoT) devices, exploiting inherent vulnerabilities, have intensified ...
Many different network and host-based security solutions have been developed in the past to counter ...
A very significant increase in the spread of malware has resulted in malware analysis. A recent appr...
Attacks targeting network infrastructure devices pose a threat to the security of the internet. An a...
The number of Internet of Things devices, small low-powered devices with internet connectivity, is u...
Attacks on Internet of Things (IoT) devices, exploiting inherent vulnerabilities, have intensified o...
With the arrival of the Internet of Things (IoT), more devices appear online with default credential...
Open-source honeypots are a vital component in the protection of networks and the observation of tre...
With the arrival of the Internet of Things (IoT), more devices appear online with default credential...
The cybersecurity landscape is constantly evolving, meaning threat actors continually find and devel...
Honeypots have been implemented in network security for years now, from the simplesystems where they...
Defending industrial control systems (ICS) in the cyber domain is both helped and hindered by bespok...
The Internet of Things is becoming more and more popular. From surveillance video cameras to interne...
The role of the Internet is continuously increasing and many technical, commercial, and business tra...
Day by day, more and more people are using internet all over the world. It is becoming apart of ever...
Attacks on Internet of Things (IoT) devices, exploiting inherent vulnerabilities, have intensified ...
Many different network and host-based security solutions have been developed in the past to counter ...
A very significant increase in the spread of malware has resulted in malware analysis. A recent appr...