Skip to content
WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide

WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide

Nov 19, 2025Ravie LakshmananVulnerability / Threat Intelligence A newly discovered campaign has compromised tens of thousands of outdated or end-of-life (EoL) ASUS routers worldwide, predominantly in Taiwan, the U.S., and Russia, to rope them into… 

CISA Releases New Guides to Safeguard Critical Infrastructure from Unmanned Aircraft Systems Threats

CISA Releases New Guides to Safeguard Critical Infrastructure from Unmanned Aircraft Systems Threats

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) unveiled three new guides to assist critical infrastructure owners and operators in understanding and mitigating risks associated with unmanned aircraft systems (UAS). These products are part… 

How to Use Ringfencing to Prevent the Weaponization of Trusted Software

How to Use Ringfencing to Prevent the Weaponization of Trusted Software

The challenge facing security leaders is monumental: Securing environments where failure is not an option. Reliance on traditional security postures, such as Endpoint Detection and Response (EDR) to chase threats after they have already entered…