Silicon Angle
Tor browser flaw could allow governments to bypass security settings
Security Now
Tor is used by attackers as a form of bypassing perimeter security controls to establish remote access and for command and control," says Chris Morales, head of security analytics at Vectra. "It is also used to anonymize activity on the web that a person would not want to be monitored by an ISP or government entity."
US Issues Warning Over Recent Cyberattacks Targeting Cloud Services
Silicon Angle
Google: Attacker ‘Likely’ Had Access to Android Zero-Day Vulnerabilities
SC Magazine
CISA: Hackers Bypassed MFA to Access Cloud Service Accounts
Security Magazine