If you use Google Charts, or other Google API libraries, as part of your web site then you may have noticed that they stopped working. This is being caused by an outage at Google that is causing the older jsapi library and causing the URL to return a 502 error.
0Domain registrar GoDaddy is injecting JavaScript into US customer websites that could impact the overall performance of the website or even render it inoperable.
4
Browser-based attacks, from AITM phishing and ClickFix to malicious OAuth apps and session hijacking, are driving today's biggest breaches.
A new report from Push Security breaks down the techniques attackers are using, real-world case studies, and the detection gaps leaving security teams exposed.
This deal is for a 7 courses and on eBook that contains over 40 hours of training on how to develop using the ReactJS JavaScript framework. Using these courses, you will learn how to get started programming with ReactJS, NodeJS, Flux, and more.
0This deal is for a 7 course bundle that teaches how to get started in JavaScript and jQuery development. These courses will introduce you to JavaScript, jQuery, Bootstrap, React, Redux, and performing Ajax calls.
0A JavaScript library that scores over two million downloads every week has been injected with malicious code for stealing coins from a cryptocurrency wallet.
0Cybercriminals in the web-skimming business sabotage their competition by poisoning the payment data they exfiltrate from online stores. The losing party causing them to end up with a big fat nothing and a ruined reputation on underground forums.
0A MageCart credit card skimming attack has been discovered on the online store for the Infowars web site. Visitors who purchased anything on the store while the malicious code was present, would have had their payment information sent to the attacker's server in Lithuania.
6An abandoned Tweet counter that was still being loaded by 800+ sites was hijacked with a malicious script that caused visitors to be redirected to scam sites.
0A new attack has been created that can crash or freeze the Mozilla Firefox desktop browser simply by visiting a web page that contains an embedded JavaScript script.
2Microsoft extends support for its Antimalware Scan Interface (AMSI) to Office 365 client applications, offering protection against script-based threats at runtime.
0A script used by the customer engagement service Feedify has been hacked to include the malicious MageCart script. MageCart is malicious code used by attackers to steal credit card details and other information from e-commerce sites when a user submits a form.
0JavaScript web apps and web servers are susceptible to a specific type of vulnerabilities/attacks known as regular expression (regex) denial of service (ReDoS).
0A hacker has gained access to a developer's npm account and injected malicious code into a popular JavaScript library, code that was designed to steal the npm credentials of users who utilize the poisoned package inside their projects.
0A vulnerability exists in the Windows operating system's JScript component that can allow an attacker to execute malicious code on a user's computer.
0Users of the NPMJavaScript package manager were greeted by a weird error yesterday evening, as their consoles and applications spewed a message of "ERR! 418 I'm a teapot" whenever they tried to update or install a new JavaScript/Node.js package.
1Security researchers have found a security flaw in Electron, a software framework that has been used in the past half-decade for building a wealth of popular desktop applications.
1Within days of Microsoft announcing that they are introducing custom JavaScript equations in Excel, a security researcher has developed a way to use this method to load the CoinHive in-browser JavaScript miner within Excel.
0At the Build 2018 developer conference that's taking place these days in Seattle, USA, Microsoft announced support for custom JavaScript functions in Excel.
0A team of academics from the Vrije University in Amsterdam has developed a new hacking technique that uses embedded graphics processing units (GPUs) and support for WebGL to carry out a Rowhammer attack.
0The Node Package Manager (npm) team avoided a disaster today when it discovered and blocked the distribution of a cleverly hidden backdoor mechanism inside a popular —albeit deprecated— JavaScript package.
0