Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
8 résultats taggé library  ✕
Enterprise Software Extension Security & Management Platform https://secureannex.com/blog/mellow-drama/
09/07/2025 09:14:11
QRCode
archive.org
thumbnail

How the Mellowtel library transforms browser extensions into a distributed web scraping network, making nearly one million devices an unwitting bot army.

Many developers begin creating browser extensions with a strong passion to solve problems they believe others might face as well. Eventually, as extensions become more popular, the added burden of updates and maintenance can weigh heavily on developers who likely have other priorities. These developers might try to find paths to monetize their extensions, but it often isn't as simple as just putting a price tag on them.

There are a handful of "monetization-as-a-service" companies that have emerged, promising developers a way to be compensated for their hard work. These companies offer software libraries that can be easily added to existing extensions (sometimes without requiring any new permissions!) and in return, extension developers begin getting paid as their extensions are used. Does that sound too good to be true?

There are several of these libraries, but some of the more popular ones track user browsing behaviors to generate 'clickstream' data. The companies creating these libraries are targeting developers and are often advertising technology firms that aggregate the data and offer their clients (very large companies) realistic profiles of browsing behaviors for advertising purposes.

Recently, we discovered a new monetization library developed by Mellowtel that pays extension developers in exchange for the "unused bandwidth" of users who have an extension installed. The reality could be far more sinister. We'll cover what that actually means, who is actually behind the library, and the cybersecurity risks a company should consider if they find an extension using this library.

secureannex EN 2025 browsers Mellowtel library Mellowtel monetization-as-a-service
360XSS: Mass Website Exploitation via Virtual Tour Framework for SEO Poisoning https://olegzay.com/360xss/
03/03/2025 11:09:56
QRCode
archive.org
thumbnail

360XSS - Hackers are exploiting a reflected XSS vulnerability in the "Krpano" VR library across hundreds of websites for SEO poisoning.

olegzay.com EN 2025 360XSS reflected-XSS VR library SEO-poisoning
fasthttp Used in New Bruteforce Campaign https://www.speartip.com/fasthttp-used-in-new-bruteforce-campaign/
24/01/2025 16:10:17
QRCode
archive.org
thumbnail

SpearTip Security Operations Center, together with the SaaS Alerts team, identified an emerging threat involving the fastHTTP library

speartip EN 2025 fastHTTP library Bruteforce Campaign
Python Crypto Library Updated to Steal Private Keys https://blog.phylum.io/python-crypto-library-updated-to-steal-private-keys/
29/11/2024 23:18:25
QRCode
archive.org
thumbnail

Yesterday, Phylum's automated risk detection platform discovered that the PyPI package aiocpa was updated to include malicious code that steals private keys by exfiltrating them through Telegram when users initialize the crypto library. While the attacker published this malicious update to PyPI, they deliberately kept the package's GitHub repository clean

phylum EN 2024 Python Crypto Library PyPI malicious code aiocpa Supply-chain-attack
Decade-old Linux ‘wall’ bug helps make fake SUDO prompts, steal passwords https://www.bleepingcomputer.com/news/security/decade-old-linux-wall-bug-helps-make-fake-sudo-prompts-steal-passwords/
28/03/2024 22:50:21
QRCode
archive.org
thumbnail

A vulnerability has been discovered in the 'util-linux' library that could allow unprivileged users to put arbitrary text on other users' terminals using the 'wall' command.

bleepingcomputer EN 2024 Clipboard-Hijacker Library Linux Passwords Terminal WallEscape
Qualys TRU Discovers Important Vulnerabilities in GNU C Library’s syslog() https://blog.qualys.com/vulnerabilities-threat-research/2024/01/30/qualys-tru-discovers-important-vulnerabilities-in-gnu-c-librarys-syslog
31/01/2024 11:10:10
QRCode
archive.org
thumbnail

The Qualys Threat Research Unit (TRU) has recently unearthed four significant vulnerabilities in the GNU C Library, a cornerstone for countless applications in the Linux environment.

Before diving into the specific details of the vulnerabilities discovered by the Qualys Threat Research Unit in the GNU C Library, it’s crucial to understand these findings’ broader impact and importance. The GNU C Library, or glibc, is an essential component of virtually every Linux-based system, serving as the core interface between applications and the Linux kernel. The recent discovery of these vulnerabilities is not just a technical concern but a matter of widespread security implications.

qualys EN 2024 report research GNU C Library syslog CVE-2023-6246 CVE-2023-6779 CVE-2023-6780
The Disturbing Impact of the Cyberattack at the British Library https://www.newyorker.com/news/letter-from-the-uk/the-disturbing-impact-of-the-cyberattack-at-the-british-library
26/12/2023 09:44:38
QRCode
archive.org
thumbnail

The library has been incapacitated since October, and the effects have spread beyond researchers and book lovers.

newyorker EN 2023 British Library uk impact
Ledger's Web3 Connector library was compromised and replaced with a drainer https://stackdiary.com/ledger-library-confirmed-compromised-and-replaced-with-a-drainer/
14/12/2023 16:21:52
QRCode
archive.org
thumbnail

Ledger's software got hit with a serious security problem. banteg, a well-known crypto guy, tweeted that Ledger's library is messed up and now has a "drainer" in it.

stackdiary EN 2023 Ledger library crypto software wallet
4623 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio