US Govt shares tips on defending against cyberattacks via Tor

The Cybersecurity and Infrastructure Security Agency (CISA) today issued guidance on how to protect against cyberattacks launched from the activity originating from or routed through the Tor anonymity network.

Tor is a software enabling internet anonymity by automatically encrypt and reroute a user’s web requests through a network of Tor nodes (relay layers).

Tor’s infrastructure is also used by threat actors to hide their identity and location by hiding their real IP address under the protection of a Tor exit node when engaging in malicious cyber activity.

Read more…
Source: Bleeping Computer