|
You are here |
www.jviotti.com | ||
| | | | |
objective-see.com
|
|
| | | | | [AI summary] The provided text is a detailed analysis of several macOS malware variants, including OSX.Yort.B and others associated with the Lazarus group. It discusses infection vectors, persistence mechanisms (such as launch agents and daemons), and the capabilities of these malware (like remote command execution). The text also includes technical details such as code snippets, disassembly, and command-line interactions. | |
| | | | |
akoutmos.com
|
|
| | | | | Learn how to write a self-contained command line scripts using Elixir. | |
| | | | |
positive.security
|
|
| | | | | Chaining a misconfiguration in IE11/Edge Legacy with an argument injection in a Windows 10/11 default URI handler and a bypass for a previous Electron patch, we developed a drive-by RCE exploit for Windows 10. The main vulnerability in the ms-officecmd URI handler has not been patched yet and can also be triggered through other browsers (requires confirmation of an inconspicuous dialog) and desktop applications that allow URI opening. | |
| | | | |
gils-blog.tayar.org
|
|
| | | ESM is ready for use in Node.js. This guide shows you how, and how to avoid all the small gotchas. The guide covers the basics, but also discusses how to write packages that can be dual-mode (ESM and CJS), how to configure ESLint, Mocha, and Testdouble, and how to use TypeScript with ESM. | ||