The MikroCloud Blog

Stay up to date with the latest posts and updates from the MikroCloud team.

Host Uptime Kuma on MikroTik RouterOS with Docker 🧐

Host Uptime Kuma on MikroTik RouterOS with Docker 🧐

Uptime Kuma, a self-hosted monitoring tool, offers an intuitive and feature-rich platform for tracking and alerting on the uptime of various network services. Deploying Uptime Kuma on a MikroTik router with an ARM CPU, through Docker containers, can enhance your network management toolkit directly from your routing device. This post will guide you through setting up Uptime Kuma on MikroTik RouterOS, leveraging the power of Docker technology.

The Essential 8: Australia's Proactive Approach to Cybersecurity

The Essential 8: Australia's Proactive Approach to Cybersecurity

With cyber threats becoming more sophisticated, the need for robust and adaptive security measures has never been more critical. In response to this growing challenge, the Australian Cyber Security Centre (ACSC) introduced the Essential Eight Maturity Model — a comprehensive framework designed to guide organizations in enhancing their cybersecurity defenses.

Understanding CVE-2023-30799 - Permission Elevation Vulnerability in RouterOS

Understanding CVE-2023-30799 - Permission Elevation Vulnerability in RouterOS

Recently, a significant vulnerability in MikroTik's RouterOS has been identified, documented as CVE-2023-30799. This vulnerability sheds light on a policy elevation issue that poses potential risks to network security. This blog post aims to dissect the nature of this vulnerability, its implications for MikroTik RouterOS users, and the recommended actions to mitigate the risks associated with it.

CVE-2023-32154: A MikroTik IPv6 Vulnerability

CVE-2023-32154: A MikroTik IPv6 Vulnerability

Last month saw the discovery of CVE-2023-32154, a vulnerability affecting MikroTik RouterOS devices. This article looks into the specifics of this vulnerability, its implications for MikroTik users, and the steps that can be taken to mitigate potential risks.

Security Compliance and GDPR in the EU

Security Compliance and GDPR in the EU

In this post, we will discuss the importance of security compliance and the General Data Protection Regulation (GDPR) in the European Union (EU). We will explore the significance of going beyond the minimum legal requirements to ensure data security and the potential repercussions of failing to do so.

123 ... 7

Deploy in minutes.

Deploy multiple MikroTik devices in minutes using MikroCloud's express onboarding.