I am sharing this because people ask me often about how to get into information security and how to improve a career. In this post, I describe my personal career and learning path including recommendations for books and more learning material. This may not be perfect to other people, for me it just worked. In later posts, I will give some recommendations for a more idealized learning path for different careers, for example as a penetration tester or a forensics specialist.
, MikroTik Routers hijacked for cryptocurrency mining • Penetration Testing
Author Guidelines. Publication Ethics. Editorial Team. Contact Us. Visitor Stats. Author Fees.
MicroTik RouterOS < 6.43rc3 - Remote Root
Attracting more than a half-million annual readers, this is the security community's go-to destination for technical breakdowns of the latest threats, critical vulnerability disclosures and cutting-edge research. After a quick look I saw that this is not your average garden variety website compromise , but that these were all MikroTik network devices. This could be a bizarre coincidence, but on further inspection I saw that all of these devices were using the same CoinHive sitekey, meaning that they all ultimately mine into the hands of one entity. I looked for the CoinHive site-key used on those devices, and saw that the attacker indeed mainly focused on Brazil.
Talk to our experienced security team about your concerns. For each test we assign a team with skills best suited to your application stack. All findings are assessed and validated to ensure the report contains only issues with potential for real impact. Results will contain detailed description of how your team can reproduce and confirm the findings crucial in order to fix them!