You might be interested in …

[HackerNews] Over 25% Of Tor Exit Relays Are Spying On Users’ Dark Web Activities

All posts, HackerNews

An unknown threat actor managed to control more than 27% of the entire Tor network exit capacity in early February 2021, a new study on the dark web infrastructure revealed. “The entity attacking Tor users is actively exploiting tor users since over a year and expanded the scale of their attacks to a new record […]

Read More

Daily NCSC-FI news followup 2021-08-21

Urgent: Protect Against Active Exploitation of ProxyShell Vulnerabilities us-cert.cisa.gov/ncas/current-activity/2021/08/21/urgent-protect-against-active-exploitation-proxyshell Malicious cyber actors are actively exploiting the following ProxyShell vulnerabilities: CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207. An attacker exploiting these vulnerabilities could execute arbitrary code on a vulnerable machine. CISA strongly urges organizations to identify vulnerable systems on their networks and immediately apply Microsoft’s Security Update from May […]

Read More

[SANS ISC] Executives and Ransomware Webcast: Stop, Collaborate, and Listen! – https://www.sans.org/webcasts/executives-ransomware-stop-collaborate-listen-120150, (Mon, Jun 21st)

All posts, Sans-ISC

— Rick Wanner MSISE – rwanner at isc dot sans dot edu – Twitter:namedeplume (Protected) (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Source: Read More (SANS Internet Storm Center, InfoCON: green)

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.