Attackers are using the Deep Web to cover their tracks
IBM has identified a steady increase around the globe of attacks on corporate networks originating from the Deep Web’s Tor network. By taking advantage of the anonymity afforded by Tor, cyber criminals are disguising both attack content and its origins—making it more difficult to identify and block malicious activity such as SQL injections, vulnerability scanning and distributed denial of service attacks.
Are you at risk? Read this research report to learn:
The geographic distribution of Tor nodes and malicious events
Industries most affected by Tor-based attacks
Steps you can take to protect your networks and data
Stay ahead of this rising threat vector. Register to download the research report today.