
Hackers Exploiting Cisco RV VPN Routers
Security researchers have found critical vulnerabilities in Cisco Small Business RV VPN routers. The bugs could allow attackers to take control of the router with root privileges, get access to customer data, and conduct DDOS attacks.
Why are they even still used? Well, the RV series of VPN appliances is affordable and functional. They can easily connect remote workers to a company network with no hassle. Each appliance has a built-in firewall, VPN, encryption, and authentication features.
Cisco disclosed 15 vulnerabilities affecting their RV product line this week. Some of the bugs can be exploited alone, but others can be chained together to lead to a variety of bad outcomes. These issues remain unpatched at the time of writing.
According to Cisco, the bugs affect products that the company makes. Cisco’s advisory said: “An attacker could exploit these vulnerabilities by sending malicious packets to the affected systems.”
- Execute arbitrary

How To Configure Unifi UDM Pro Controller 7.0.22 VPN Access
In this tutorial you will learn how to configure a Unifi UDM Pro Controller 7.0.22 VPN access. I will take you through the process of configuring a VPN Connection and a VPN user on Unifi Controller version 7.0.22 on your UDM Pro and then we will finish with configuring the Windows 11 VPN client.
Let’s start by logged into your UDM PRO Controller 7.0.22.
- Click on Settings
- Now click on VPN
- For VPN Server mark sure its enabled.
- For Pre-shared Key, you can use the default or type your own.
- For Server Address, choose ether wan port or set a static IP Address manually. I will be using (WAN1).
- Now under User Authentication, click on Create a new user.
- You should now see a popup to enter a username and password, afterwards click on the Create User button. Create additional user accounts that you wish to provide

How To Install And Configure Windows Server DHCP Role
In this tutorial you will learn How To Install And Configure Windows Server DHCP Role. We will be using Windows Server 2019 however the concept is the same with Windows Server 2022.
Introduction
The Windows Server DHCP (Dynamic Host Configuration Protocol) role plays a crucial role in managing IP addresses on a network. By automating IP assignment and configuration, DHCP simplifies network administration and ensures efficient connectivity. This guide will walk you through the process of installing and configuring the DHCP role on your Windows Server. From initial setup to advanced configurations, you’ll gain the knowledge and skills needed to effectively manage IP address allocation. Get ready to streamline your network infrastructure and enhance connectivity with this comprehensive tutorial.
Let’s get started with the Installation of the DHCP Role
1.Log into your Windows Server.
2. If not already opened, open up Server Manager.
3. Click Add roles and features… Read the rest

How to Configure Unifi UDM PRO DHCP Relay To Use Windows Server DHCP
In this tutorial you will learn How to Configure Unifi UDM PRO DHCP Relay To Use Windows Server DHCP. This will come handy when you want your Windows Server to be the DHCP provider. This tutorial is based on Unifi Controller version 6.5.55.
Let’s get started.
First make sure you are running the latest controller version. At the time of this publication, it is 6.5.55. I will be progressing through this tutorial under the impression you already have a Windows DHCP Server already running. If that is not configured click: How To Install And Configure Windows DHCP Server.
1. Log into your UDM Pro using unifi.ui.com or its IP address.
2. Access the Unifi Controller and click Settings
3. Click on Networks. Now you should be presented with all your current networks maybe even just the Default LAN if your UDM Pro is coming right out of the … Read the rest

Windows Update deploying malware powered by GitHub C2 Server
According to a report from Malwarebytes on Thursday, North Korean cyber-espionage group’s latest attack was found to be very similar to other attacks from the group. Malwarebytes analysts have discovered that the APT group has been using a new technique that involves spear phishing to steal user data and cryptocurrency.
The focus of the phishing campaign is consistent with the APT group’s style – they impersonate big, global brands. In this case, they pretended to be a huge military and defense company.
Korean hackers are rampaging. They are one of the most active cyber-attackers in the world. The US considers them to be a huge threat. They have been caught red handed attacking companies and stealing secrets for years. Their leader is Lazarus, who has been active since at least 2009. This group is responsible for many cyber attacks, including the WannaCry ransomware attack that has been in the news.… Read the rest

Android Malware steals your money, then wipes your phone
For years, malware has been an issue for computers. While there are different levels of severity, it is extremely dangerous when targeting your smartphone.
Apple’s closed ecosystem is incredibly protective. It has few checks and balances. As a result, it’s very difficult for hackers to infiltrate Apple products and leave malware behind. Unfortunately, Android is the opposite. Its open nature makes it easy for hackers to infiltrate, leaving Android users vulnerable to malicious code.
A new version of a virus has been discovered. Read on to find out how a Brazillian malware became a powerful threat.
Here’s the back story
A Remote Access Trojan (RAT) known as BRATA has been around since 2019. At the time, it was used as spyware and exclusively targeted Android users in Brazil. It was able to capture a victim’s screen in real-time.
In early 2016, a malware called BRATA spread online. It masqueraded as … Read the rest

How To Configure Ubuntu Desktop 20.04 To Access Unifi UDM Pro VPN Tunnel
In this tutorial you will learn how to configure Ubuntu Desktop 20.04 to access Unifi UDM Pro VPN tunnel. You will then be able to use your Ubuntu Desktop 20.04 to VPN into your UDM Pro and browse and access your network files or even remote access other systems on the network.
If you need assistance on creating a Unifi UDM Pro VPN tunnel, click here.
How to install VPN client software on Ubuntu Desktop 20.04
- Log into your Ubuntu Desktop 20.04 and open up the Terminal.
- Elevate your Terminal Access
sudo -s
3. We will now need to install the L2TP VPN package.
sudo apt install network-manager-l2tp network-manager-l2tp-gnome
4. You need to restart your computer to see “Layer 2 Tunneling Protocol (L2TP)” in your VPN access manager.
5. Log back onto your Ubuntu Desktop 20.04 and from here we will use the GUI.
6. Click on your network icon … Read the rest

Complete VestaCP Setup Guide for Ubuntu 18
In this Complete VestaCP Setup Guide for Ubuntu 18 I will show you how to install Ubuntu 18 with all of its updates, Setup VestaCP and configure Name Server and domains. We will also do some security hardening, add SSL’s and update to the latest MariaDB and PHP versions. Finally I will also show you how to configure backups to an external source.
Consider using HestiaCP and Ubuntu 20 as VestaCP has been fading away.
Prerequisites
- Register a Domain to use for your VPS server. I will be using GoDaddy.com as my domain registrar. In my case I have purchased the domain PatricksWebsiteHosting.com for this tutorial.
- Choose and purchase a VPS from a VPS provider. Many factors come into play here but I will be using a2hosting.com they seem to have fair pricing and they provide lots of storage. You could also use your own server at home but it

New UEFI Bootkit called MoonBounce
Researchers have discovered a sophisticated new type of malware that targets UEFI and its called MoonBounce. The Bootkit or also known as rootkit malware is suspected to be associated with (advanced persistent threat 41). APT41 is a group of hackers who have been robbing businesses for many years.
Researchers at Kaspersky Labs discovered a new type of malware. This is the third known type that infects UEFI firmware. The first two types were FinFisher and ESPecter.
- The malware is injected into the SPI flash part of the motherboard, signifying that it cannot be removed even after hard disk replacement.
- The injection is stored in the CORE_DXE component, which is called during the early boot sequence of UEFI.
- Once the MoonBounce rootkit malware makes its way inside the OS, it may reach out to a server to obtain further payloads.
- Additionally, the infection chain does not leave any evidence and works

How To Open And Forward Ports On Unifi UDM PRO
In this tutorial you will learn how to open and forward ports to an internal LAN IP on your Unifi UDM Pro using Unifi Controller version 6.5.55. In the latest releases of the Unifi Controller, they have simplified the process for us and with a few simple steps you can quickly forward the ports you need.
Let’s get started.
First make sure you are running the latest controller version. At the time of this publication, it is 6.5.55.
- Log into your UDM Pro using unifi.ui.com or its IP address.
- Access the Unifi Controller and click Settings
- Click on Advanced Features and afterwards you will be presented with a page where you can apply your network rules.
- Now scroll down, locate and click on Advanced Gateway Settings.
- You should now be presented with the Advanced Gateway Settings Page.
- Click on the Create new Port Forwarding button.
- In the Port Forwarding window