FYI: kr00k - cve-2019-15126

Serious vulnerability deep inside your WI-FI encryption, read here

TL;DR Affected devices: Raspberry Pi 3

edit
for 3B, 3B+, 3A+, 4B and Zero W:

# disable WIFI - ref https://github.com/raspberrypi/firmware/blob/02bff4e75712094ffb1ab2ec58a8115ca3e52290/boot/overlays/README
echo "dtoverlay=disable-wifi" | sudo tee -a /boot/config.txt

# disable Bluetooth - ref https://github.com/raspberrypi/firmware/blob/02bff4e75712094ffb1ab2ec58a8115ca3e52290/boot/overlays/README
echo "dtoverlay=disable-bt" | sudo tee -a /boot/config.txt
sudo systemctl disable hciuart

/edit

The link does not work for me.

https://www.welivesecurity.com/wp-content/uploads/2020/02/ESET_Kr00k.pdf

works fine for me, also in the first post (here)

Is this just WPA2 AES or also WPA2 TKIP?

Only use wire on my pi-hole, and network gear from Ubiquiti.

from the pdf (no more detail - sorry)

Our research focuses on WPA2 with CCMP used as the data confidentiality and integrity protocol. This is
the most ubiquitous standard used in contemporary Wi-Fi networks.

Okay, that’s WPA2 AES, thanks.

@jpgpi250 only old gear from UI https://community.ui.com/questions/About-the-kr00k-wifi-chip-vulnerability/ac35cc79-b1c3-4e80-90d4-d7c9fad3715b