Displaying items by tag: JavaScript

So, there you are, you have found the one thing in all the internet that will make your object drive life complete. You put the fabulous object into your cart, giddily fumble out your credit card and enter those embossed numbers into the checkout screen and click to start the journey of your newfound treasure. Unbeknownst to you, attackers had previously injected skimming scripts into the site and captured all your card data for use later, or to sell in bulk on a dark web marketplace later.

Published in News

The current threat landscape has user account compromise and endpoint takeover as the most common first acts in a security event. The methods used to accomplish this are varied but include such blockbusters as poisoned websites and URLs embedded in email. Once the website is processed the exploit kicks off and things tend to go downhill from there. The most common item abused in your web browser is its ability to process scripts (especially JavaScript). Now Microsoft says they have a way to knock out as much as 45% of exploit attempts related to JavaScript and WebAssembly when using their Chromium based Edge browser.

Published in Security Talk
News light-virus-1

Remember the Faceboook malware we warned you about? You remember the one that relied on the fact that people love to see pictures of themselves on the internet? Well it looks like either the same group that was behind that malware or another equally clever group has moved from Faceboook to Twitter. We have heard multiple reports of tweets showing up that claim to have a link to a picture of the user. Unfortunately due to the widespread use of shortened links it is hard to spot many malicious payloads. Fortunately in this case you can identify the bad link by the .ru at the end… for now.

Published in News