Explore >> Select a destination


You are here

codecolor.ist
| | www.welivesecurity.com
4.5 parsecs away

Travel
| | The website of a Hong Kong pro-democracy radio station was compromised to serve a Safari exploit that installed cyberespionage malware on visitors' Macs.
| | parsiya.net
6.7 parsecs away

Travel
| | [AI summary] The provided text is a detailed technical article discussing various methods and techniques for exploiting custom protocol handlers and command-line switches in applications. It covers topics such as UNC path injection, command-line switch abuse, remote file execution, and leveraging startup directories for persistence. The article also includes practical examples, tools like Nirsoft's URLProtocolView, and advice on how to discover and exploit vulnerabilities in applications.
| | saagarjha.com
4.6 parsecs away

Travel
| | Saagar Jha's website.
| | www.nodejs-security.com
16.3 parsecs away

Travel
| The XZ backdoor CVE-2024-3094 already happened in JavaScript 5 years ago but now the xz and liblzma malware bundled onto Linux distributions is bringing forth a world-wide threatening event in cybersecurity that jeopardizes the trust, sustainability and security concerns in the open-source ecosystem.