Criminals try to cover their tracks as best they can. This also includes hiding any activities that control the machines they have compromised. Using I2P is one way of doing that, but until recently this has rarely been used.
New I2PRAT communicates via anonymous peer-to-peer network
Recent Posts
- CVE-2024-57823 – Raptor Turtle Parser Integer Underflow Vulnerability
- CVE-2024-57822 – Raptor RDF Syntax Library Heap-Based Buffer Over-Read Vulnerability
- CVE-2025-23016 – FastCGI fcgi2 Buffer Overflow
- CVE-2025-21380 – Azure SaaS Resource Authentication Bypass
- CVE-2025-21385 – Microsoft Purview SSRF