Media coverage

Tor browser flaw could allow governments to bypass security settings

Sorry, this post has not been published yet, check again later!

September 12, 2018
Published by:

Security Now

Tor is used by attackers as a form of bypassing perimeter security controls to establish remote access and for command and control," says Chris Morales, head of security analytics at Vectra. "It is also used to anonymize activity on the web that a person would not want to be monitored by an ISP or government entity."

Read publication

Most recent media coverage

CISA: Ransomware Activity Targeting the Healthcare and Public Health Sector

October 29, 2020

Security Magazine

Read more

Ransomware Crisis Affecting U.S. Hospitals: What the Experts Say

October 29, 2020

Solutions Review

Read more

Feds Issue Warning About Surge in Hospital Ransomware Attacks

October 29, 2020

Healthcare Innovation

Read more