mastodon.bida.im is part of the decentralized social network powered by Mastodon.
Un'istanza mastodon antifascista. autogestita, italofona con base a Bologna. Rispettosa di privacy e anonimato.

Server stats:

903
active users

Learn more

#ax1800

0 posts0 participants0 posts today
Redhotcyber<p>La botnet Mirai utilizza la vulnerabilità del router TP-Link Archer AX21 per attacchi DDoS</p><p>Gli aggressori stanno attivamente sfruttando la <a href="https://mastodon.bida.im/tags/vulnerabilit%C3%A0" class="mention hashtag" rel="tag">#<span>vulnerabilità</span></a> CVE-2023-1389 nei router <a href="https://mastodon.bida.im/tags/WiFi" class="mention hashtag" rel="tag">#<span>WiFi</span></a> <a href="https://mastodon.bida.im/tags/TPLink" class="mention hashtag" rel="tag">#<span>TPLink</span></a> Archer A21 (<a href="https://mastodon.bida.im/tags/AX1800" class="mention hashtag" rel="tag">#<span>AX1800</span></a>), scoperta durante la competizione <a href="https://mastodon.bida.im/tags/Pwn2Own" class="mention hashtag" rel="tag">#<span>Pwn2Own</span></a> lo scorso dicembre. I dispositivi compromessi con successo vengono utilizzati per effettuare attacchi <a href="https://mastodon.bida.im/tags/DDoS" class="mention hashtag" rel="tag">#<span>DDoS</span></a>.</p><p>Questa <a href="https://mastodon.bida.im/tags/vulnerabilit%C3%A0" class="mention hashtag" rel="tag">#<span>vulnerabilità</span></a> è stata dimostrata per la prima volta al Pwn2Own Toronto 2022, quando due team separati hanno violato un dispositivo utilizzando diversi <a href="https://mastodon.bida.im/tags/approcci" class="mention hashtag" rel="tag">#<span>approcci</span></a> di <a href="https://mastodon.bida.im/tags/attacco" class="mention hashtag" rel="tag">#<span>attacco</span></a> (è stato effettuato l’accesso alle interfacce <a href="https://mastodon.bida.im/tags/LAN" class="mention hashtag" rel="tag">#<span>LAN</span></a> e <a href="https://mastodon.bida.im/tags/WAN" class="mention hashtag" rel="tag">#<span>WAN</span></a>). </p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/la-botnet-mirai-utilizza-la-vulnerabilita-del-router-tp-link-archer-ax21-per-attacchi-ddos/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/la-botnet</span><span class="invisible">-mirai-utilizza-la-vulnerabilita-del-router-tp-link-archer-ax21-per-attacchi-ddos/</span></a></p>
Tarnkappe.info<p>📬 TP-Link-Router: Botnetz-Malware nutzt Sicherheitslücke aktiv aus<br><a href="https://social.tchncs.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.tchncs.de/tags/AX1800" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AX1800</span></a> <a href="https://social.tchncs.de/tags/Botnetz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnetz</span></a> <a href="https://social.tchncs.de/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> <a href="https://social.tchncs.de/tags/FirmwareUpdate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FirmwareUpdate</span></a> <a href="https://social.tchncs.de/tags/mirai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mirai</span></a> <a href="https://social.tchncs.de/tags/router" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>router</span></a> <a href="https://social.tchncs.de/tags/Schwachstelle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Schwachstelle</span></a> <a href="https://social.tchncs.de/tags/Sicherheitsl%C3%BCcke" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sicherheitslücke</span></a> <a href="https://social.tchncs.de/tags/TPLink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPLink</span></a> <a href="https://social.tchncs.de/tags/ValveSourceEngine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ValveSourceEngine</span></a> <a href="https://social.tchncs.de/tags/ZeroDayInitiative" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDayInitiative</span></a> <a href="https://tarnkappe.info/artikel/it-sicherheit/malware/tp-link-router-botnetz-malware-nutzt-sicherheitsluecke-aktiv-aus-273536.html" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tarnkappe.info/artikel/it-sich</span><span class="invisible">erheit/malware/tp-link-router-botnetz-malware-nutzt-sicherheitsluecke-aktiv-aus-273536.html</span></a></p>