Tor network nodes would appear to be sniffing and/or reading data as it is routed, according to an investigation by a security researcher. In an experiment, Swedish researcher "Chloe" set up honeypots...
'If you pick any random PHP library it more than likely has a flaw,' says Veracode's Chris Eng
Other lenders and partners were able to view private data of business loan applicants
It is built on an entirely different codebase and was compiled in November 2019
The Ukrainian national was part of spear-phishing campaign that enabled hackers to gain unauthorised access to victims' system
The tool uses zero-day bug in the Darwin XNU kernel