tor
NetworkMiner 2.6 Released
We are happy to announce the release of NetworkMiner 2.6 today! The network forensic tool is now even better at extracting emails, password hashes, FTP transfers and artifacts from HTTP and HTTP/2 ...
NetworkMiner 2.6 Released
We are happy to announce the release of NetworkMiner 2.6 today! The network forensic tool is now even better at extracting emails, password hashes, FTP transfers and artifacts from HTTP and HTTP/2 ...
Newly-discovered KryptoCibule malware has been stealing and mining cryptocurrency since 2018
Security researchers at Slovak security firm ESET have discovered a new family of malware that they say has been using a variety of techniques to steal cryptocurrency from unsuspecting users since at ...
Into the Dark: Scratching the Surface of the Dark Web and Its Potential Risks to Users
Numerous data leaks appeared on the dark web in the second quarter of 2020. At the end of May, for instance, Cyble found a government database containing the personal information of more ...
Your Hacked Facebook Account Goes for $75 on the Dark Web
A new report from Privacy Affairs says that cybercriminals on the Dark Web will pay on average $1,000 for a full range of stolen documents and account details that enable them to ...
Blockchain-based VPNs: The Next Step in Privacy Tech?
Could open source bandwidth utilized by blockchain be the alternative to today’s VPN? Every person who goes online today fights a losing privacy battle. Every site we visit, every app we download, ...
Russia Cracks Tor? Hackers Dump 7.5TB of FSB Secrets
Russia’s notorious federal security service, the FSB, has a secret project to de-anonymize Tor. Big news or nothing to see here? ...
Seven Friends of VPN: Top Applications to Keep Anonymity on the Web
The most popular anonymous browser worldwide has finally released an Android version of Tor. I have collected several apps that will ensure your privacy and safety online. They can protect the anonymity ...
Exit, Stage Left…
Image Courtesy of Yowp via Pierluigi Paganini, comes news of TOR leveraged scans searching for BlueKeep vulns, as those observed scans are conveyed and exiting via TOR exit nodes ...
Are Darknet Take-Downs Effective?
Raids and take-downs have become standard on the Darknet as agents across the world continue to step up enforcement. While these take-downs are generally digital perp walks meant to remind the public ...

