Tag: Tor
Breaking News
Why You Do Not Trust Free VPNs? Top Reasons & Consequences
A Virtual Private Network is known
as VPN effectively encrypts all the internet traffic sent over the internet
connection and sends it to a...
Tor Browser 9.0.7 addresses a flaw that could allow unmasking Tor users
The Tor Project released Tor Browser 9.0.7 that definitively addresses a vulnerability that allowed to execute JavaScript code on sites it should not....
The Pirate Bay Is Using Downtime to ‘Rewrite Some Code’
It’s been more than two weeks now that The Pirate Bay’s main domain remains unreachable. The .onion address, however, remains accessible through the...
Apple blocks third-party cookies in Safari
Starting today, with the release of Safari 13.1 and through updates to the Intelligent Tracking Prevention (ITP) privacy feature, Apple now blocks all...
WildPressure, a new APT group targets the Middle East’s industrial sector
Security experts from Kaspersky Lab have uncovered the activity of a new threat actor, tracked as WildPressure, targeting the industrial sector in the...
FSB contractor breach exposes secret cyber weapons program leveraging IoT vulnerabilities
The hack of an FSB contractor has exposed details of the Russian
intelligence agency’s cyber weapons program aimed at exploiting vulnerabilities
in IoT devices....
FBI warns of COVID-19 phishing scams promising stimulus checks, vaccines
The FBI’s Internet Crime Complaint Center (IC3) has issued a public service announcement warning citizens to watch out for email-based fraud and...
Coronavirus-themed campaign delivers a new variant of Netwalker Ransomware
MalwareHunterTeam experts have identified a new Coronavirus phishing campaign that aims at delivering the Netwalker Ransomware. The number of coronavirus-themed cyberattacks continues to...
Stolen data of company that refused REvil ransom payment now on sale
by Lisa Vaas Operators of the Sodinokibi (aka Sodin or REvil) Ransomware as a Service (RaaS) recently published over...
New Mirai Malware “Mukashi” Exploit Vulnerable Zyxel Network Storage Devices in Wide
Cybercriminals launching a new variant of Mirai Malware by taking advantage of the recently patched remote code execution vulnerability (CVE-2020-9054) in...
LimeTorrents Proxy, Mirror Sites List And Unblocked Torrent Alternatives [2020]
Similar to every mainstream torrent search engine, Limetorrents relies on peer-to-peer (P2P) file-sharing for redistributing content.Limetorrents is a reliable torrent search engine and...
Hackers breach FSB contractor and leak details about IoT hacking project
Per the Fronton specs, the use of the Russian language and the Cyrillic alphabet was strictly forbidden throughout the project and the source...