Under Attack: How Threat Actors are Exploiting SOCKS Proxies

Read the original article: Under Attack: How Threat Actors are Exploiting SOCKS Proxies


From the basic building blocks of the internet to cryptocurrency mining on a supercomputer, SOCKS sits at the core of computing. A SOCKS proxy can be used to improve network security in an enterprise, but can also be exploited by cybercriminals for nefarious reasons. Take a look at how SOCKS proxies have been manipulated recently […]

The post Under Attack: How Threat Actors are Exploiting SOCKS Proxies appeared first on Security Intelligence.


Read the original article: Under Attack: How Threat Actors are Exploiting SOCKS Proxies