VPN increasingly being used to penetrate organizations

Security researchers from Claroty have discovered multiple vulnerabilities that could be exploited to allow unauthenticated attackers to execute arbitrary code while analyzing a number of popular remote access solutions used for Industrial Control Systems (ICS). The...

Multiple zero-days in Tor have been disclosed online

After unsuccessfully trying to report bugs to the Tor Project for years, a security researcher has publicly disclosed two zero-day vulnerabilities which impact both the Tor network and the Tor browser. In two recent blog posts, Dr. Neal Krawetz announced that he has...

Are you a victim of ID theft? Here are 5 signs to look for

You’re you. You know your age, date of birth, where you went to school, which hospital you attended for a broken arm, and the date of your graduation. No one else should know this information. But now they do. Your identity has been stolen. You’re at risk...