Exactly a month after patching an actively exploited zero-day flaw in Chrome, Google today rolled out fixes for yet another zero-day vulnerability...
The world of smartwatches is ruled mostly by the likes of Apple Watch and WearOS-based devices. But we have seen a few...
Inspired by @tavisio This project is meant to be an All-in-one Toolkit to test further DNS rebinding attacks and my take...
Are you looking for easy-to-use Java performance tuning tips because you want to learn more developer knowledge and experience because of the...
Developers and programming enthusiasts eagerly await the results of the annual Stack Overflow survey every year. It’s the world’s largest and most comprehensive...
I bet most programmers cannot imagine life without Stack Overflow. The Q&A site for coding has received millions of programming queries since...
The IT security researchers at Palo Alto Networks’ Unit 42 have discovered a malware that has been targeting Israeli cyberspace especially those dealing...
The Linux Foundation has announced the formation of OpenJS Foundation to support the JavaScript community. This has been done by merging existing Node.js Foundation and JS Foundation. By combining both these...
A survey conducted by HackerRank, a popular competitive programming platform, found JavaScript to be the most popular programming language for 2018. The survey was taken...
An interactive multi-user web based javascript shell. It was initially created in order to debug remote esoteric browsers during experiments and research....
A malicious code has infected Event-stream JavaScript library with the intention of stealing cryptocurrency from digital wallets. The popular JavaScript library is...
Even the Tor browser can be monitored with this malicious code Specialists in digital forensics and information security have revealed a...
FridaExtract is a Frida.re based RunPE extraction tool. RunPE type injection is a common technique used by malware to hide code within...
Why XSStrike? Every XSS scanner out there has a list of payloads, they inject the payloads and if the payload is reflected...
Investigate malicious logon by visualizing and analyzing Windows active directory event logs. Concept LogonTracer associates a host name (or an IP address)...
What this tool does is taking a file (any type of file), encrypt it, and embed it into an HTML file as...
Security researchers have discovered a new, sophisticated form of malware based on the notorious Zeus banking Trojan that steals more than just bank account...
Throughout this blog post we will be detailing a newly discovered RTF document family that is being leveraged by the FIN7 group...
Usually, a bug bounty program helps companies secure their software and products from zero day vulnerabilities that can cause massive damage if cyber...
Short Bytes: The ECMA International has released the eight edition of the ECMAScript Language Specification. Some of the new features supported by this...
Short Bytes: Makers of Cheerp, a C++-to-JavaScript compiler, are here with their second offering, CheerpJ. CheerpJ converts any Java application and library...