Please turn on your JavaScript for this page to function normally.
hidden services
![Christopher Sestito](https://img.helpnetsecurity.com/wp-content/uploads/2022/07/20110155/christopher_sestito-2-hidden_layer-400x200.jpg)
Machine learning creates a new attack surface requiring specialized defenses
Machine learning (ML) inputs and outputs are becoming more widely available to customers thanks to organizations in almost every sector integrating artificial intelligence …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104053/person-400x200.jpg)
Operators of decade-old Malware-as-a-Service outfit charged
As Crackas With Attitude hacker “Incursio” got handed a 2-year prison sentence for gaining unauthorized access to government computers and online accounts of a …
![storm](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104322/storm-400x200.jpeg)
Attacks within the Dark Web
For six months, Trend Micro researchers operated a honeypot setup simulating several underground services on the Dark Web. The goal of their research was to see if those …
![tor](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111347/tor-bad-HSDirs-big-400x200.jpg)
Researchers discover 110 snooping Tor nodes
In a period spanning 72 days, two researchers from Northeastern University have discovered at least 110 “misbehaving” and potentially malicious hidden services …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege