A new home for Tor user documentation

Privacy technology is only as powerful as people’s ability to use it. Every day, millions of people rely on Tor to protect their privacy and freedom online. But until now, finding answers to their questions meant navigating between different websites: one for the Tor Browser Manual, another for the Support portal. This fragmented experience made…

Read More

404 Page Not Found | Exploit Database

The Exploit Database is maintained by OffSec, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by OffSec. The Exploit Database is a CVE compliant archive of public exploits and corresponding…

Read More

New Release: Tor Browser 15.0

Tor Browser 15.0 is now available from the Tor Browser download page and distribution directory. This is our first stable release based on Firefox ESR 140, incorporating a year’s worth of changes that have been shipped upstream in Firefox. As part of this process, we’ve also completed our annual ESR transition audit, where we reviewed…

Read More

27th October – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 27th October, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Toys “R” Us Canada has suffered a data breach that resulted in stolen customer records being leaked on the dark web. The compromised data affects an undisclosed number of individuals and includes…

Read More

Bytes over DNS – SANS Internet Storm Center

I was intrigued when Johannes talked about malware that uses BASE64 over DNS to communicate. Take a DNS request like this: label1.label2.tld. Labels in a request like this can only be composed with letters (not case-sensitive), digits and a hyphen character (-). While BASE64 is encoded with letters (uppercase and lowercase), digits and special characters +…

Read More