Plato Data Intelligence.
Vertical Search & Ai.

Tag: Tor

Why You Do Not Trust Free VPNs? Top Reasons & Consequences

A Virtual Private Network is known as VPN effectively encrypts all the internet traffic sent over the internet connection and sends it to a...

Tor Browser 9.0.7 addresses a flaw that could allow unmasking Tor users

The Tor Project released Tor Browser 9.0.7 that definitively addresses a vulnerability that allowed to execute JavaScript code on sites it should not....

The Pirate Bay Is Using Downtime to ‘Rewrite Some Code’

It’s been more than two weeks now that The Pirate Bay’s main domain remains unreachable. The .onion address, however, remains accessible through the...

Apple blocks third-party cookies in Safari

Starting today, with the release of Safari 13.1 and through updates to the Intelligent Tracking Prevention (ITP) privacy feature, Apple now blocks all...

WildPressure, a new APT group targets the Middle East’s industrial sector

Security experts from Kaspersky Lab have uncovered the activity of a new threat actor, tracked as WildPressure, targeting the industrial sector in the...

FSB contractor breach exposes secret cyber weapons program leveraging IoT vulnerabilities

The hack of an FSB contractor has exposed details of the Russian intelligence agency’s cyber weapons program aimed at exploiting vulnerabilities in IoT devices....

FBI warns of COVID-19 phishing scams promising stimulus checks, vaccines

The FBI’s Internet Crime Complaint Center (IC3) has issued a public service announcement warning citizens to watch out for email-based fraud and...

Coronavirus-themed campaign delivers a new variant of Netwalker Ransomware

MalwareHunterTeam experts have identified a new Coronavirus phishing campaign that aims at delivering the Netwalker Ransomware. The number of coronavirus-themed cyberattacks continues to...

Stolen data of company that refused REvil ransom payment now on sale

by Lisa Vaas Operators of the Sodinokibi (aka Sodin or REvil) Ransomware as a Service (RaaS) recently published over...

New Mirai Malware “Mukashi” Exploit Vulnerable Zyxel Network Storage Devices in Wide

Cybercriminals launching a new variant of Mirai Malware by taking advantage of the recently patched remote code execution vulnerability (CVE-2020-9054) in...

LimeTorrents Proxy, Mirror Sites List And Unblocked Torrent Alternatives [2020]

Similar to every mainstream torrent search engine, Limetorrents relies on peer-to-peer (P2P) file-sharing for redistributing content.Limetorrents is a reliable torrent search engine and...

Hackers breach FSB contractor and leak details about IoT hacking project

Per the Fronton specs, the use of the Russian language and the Cyrillic alphabet was strictly forbidden throughout the project and the source...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?