Security News

Signal ignores proxy censorship vulnerability, says it's not a risk
2021-02-07 09:00

Microsoft has suspended free trials of their newly launched Windows 365 Cloud PC service after running out of available servers. Windows 11's October 2021 release date hinted in support docs.

Signal ignores proxy censorship vulnerability, bans researchers
2021-02-07 09:00

Microsoft has suspended free trials of their newly launched Windows 365 Cloud PC service after running out of available servers. Windows 11's October 2021 release date hinted in support docs.

Ransomware Attackers Using SystemBC Malware With RAT and Tor Proxy
2020-12-16 06:33

Cybercriminals are increasingly outsourcing the task of deploying ransomware to affiliates using commodity malware and attack tools, according to new research. The SystemBC RAT has since expanded the breadth of its toolset with new characteristics that allow it to use a Tor connection to encrypt and conceal the destination of C2 communications, thus providing attackers with a persistent backdoor to launch other attacks.

Stantinko Proxy Trojan Masquerades as Apache Servers
2020-11-25 09:43

A threat group tracked as Stantinko was observed using a new version of a Linux proxy Trojan that poses as Apache servers to remain undetected. Previously, the Stantinko group was mainly known for the targeting of Windows systems, but recent attacks show that they are also focusing on evolving their Linux malware, with a new proxy Trojan that masquerades as httpd, the Apache Hypertext Transfer Protocol Server found on many Linux servers.

Apple search bot leaked internal IPs via proxy configuration
2020-11-04 13:50

A proxy request may contain the X-Forwarded-For or Via HTTP headers revealing the source device's IP address, and inform the destination that the request is coming from a proxy. Last month, Security researcher and podcast creator David Coomber found out that Applebot had been using a proxy that leaked Apple's internal IP addresses.

How to Run Google SERP API Without Constantly Changing Proxy Servers
2020-11-02 06:39

You've probably run into a major problem when trying to scrape Google search results. This article examines how to overcome Google web scraping issues without changing proxy servers.

How to use NGINX as a reverse proxy
2020-06-25 20:37

One of the more popular reverse proxy tools at the moment is NGINX. Although NGINX itself is a web server, it does an outstanding job of serving as a reverse proxy. Sudo systemctl start nginx sudo systemctl enable nginx How to create a new NGINX config file.

Facebook Launches 'Discover,' A Secure Proxy to Browse the Internet for Free
2020-05-06 06:19

More than six years after Facebook launched its ambitious Free Basics program to bring the Internet to the masses, the social network is back at it again with a new zero-rating initiative called Discover. The service, available as a mobile web and Android app, allows users to browse the Internet using free daily data caps.

Facebook Launches 'Discover,' A Secure Proxy to Browse the Internet for Free
2020-05-06 06:19

More than six years after Facebook launched its ambitious Free Basics program to bring the Internet to the masses, the social network is back at it again with a new zero-rating initiative called Discover. The service, available as a mobile web and Android app, allows users to browse the Internet using free daily data caps.

Xton Access Manager now includes RDP, SSH and HTTP proxy support
2020-02-05 03:00

Xton Technologies, a provider of privileged access management solutions, announced that Xton Access Manager now includes advanced proxy support for RDP, SSH and web proxies allowing customers to create secure, high trust remote sessions with full session recording and keystroke monitoring using native desktop or mobile applications. "Unique to XTAM is our ability to securely lock credentials on the server-side without ever releasing them to the client computer even in an encrypted form. This provides administrators with secure and efficient access to the systems they need to do their jobs while satisfying audit and senior management requirements for just in time secure access and controls."