๐Ÿฅด Oh joy, yet another "decentralized" platform promising to liberate us from the clutches of Big Tech. #Freenet, where your computer becomes a cog in the grand "unstoppable" networkโ€”because who doesn't dream of turning their PC into a relentless packet mule? ๐Ÿ™„ And don't forget, you'll need #JavaScript to visualize this chaos, because a revolution without JavaScript is just not cool enough. ๐Ÿ˜‚
https://freenet.org/ #decentralization #BigTech #network้ฉๅ‘ฝ #HackerNews #ngated
Freenet

It's day 3 of 4 creating our own little game, from scratch, for Game-Like Jam, ๐Ÿ‘พ live now on https://twitch.tv/noyainrain ๐Ÿ˜Š #JavaScript #p5js #OpenSource
noyainrain - Twitch

Game-Like Jam (Day 3/4) | Pac-Man reimagined?! ๐Ÿ‘พ

Twitch

Ghost CMS Mass Compromised via CVE-2026-26980, Now Fueling ClickFix Attacks

Attackers exploited CVE-2026-26980, a critical SQL injection vulnerability in Ghost CMS, to obtain Admin API Keys without authorization and conduct mass website poisoning campaigns. Over 700 domains across multiple industries including universities, blockchain, AI, security research, and media were compromised. The attack chain involves CMS takeover, page poisoning with malicious JavaScript loaders, two-stage cloaking scripts, and FakeCaptcha social engineering to trick users into executing malicious commands. Two distinct threat groups are actively exploiting unpatched Ghost CMS installations, delivering information stealers and remote access tools. Compromised sites include Harvard University, Oxford University, and Auburn University. The attacks leverage users' trust in legitimate websites to increase success rates of ClickFix-type attacks, with payloads being dynamically distributed through Cloudflare-proxied domains.

Pulse ID: 6a0f06676dfe8431915ed38a
Pulse Link: https://otx.alienvault.com/pulse/6a0f06676dfe8431915ed38a
Pulse Author: AlienVault
Created: 2026-05-21 13:19:35

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BlockChain #CAPTCHA #Cloud #CyberSecurity #InfoSec #Java #JavaScript #OTX #OpenThreatExchange #RAT #Rust #SQL #SocialEngineering #Vulnerability #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

PureLogs: Delivery via PawsRunner Steganography

Attackers are concealing .NET infostealers within seemingly innocuous images to evade detection. A phishing campaign uses TXZ archive attachments with invoice-themed lures to initiate infection. The embedded JavaScript leverages environment variables to hide malicious commands, launching PowerShell to decode and decrypt payloads. PawsRunner, a steganography loader, extracts encrypted data from PNG images containing cat photos. This loader evolved from simple PE downloads to sophisticated steganographic extraction with fallback mechanisms. The final payload, PureLogs version 5.0.0, is a comprehensive infostealer from the Pure family that harvests credentials from browsers, cryptocurrency wallets, password managers, communication apps, and other applications. It employs extensive async/await patterns and communicates with command and control infrastructure via HTTPS using multiple endpoints to exfiltrate encrypted and compressed stolen data.

Pulse ID: 6a0f272cd9c82db936e6a249
Pulse Link: https://otx.alienvault.com/pulse/6a0f272cd9c82db936e6a249
Pulse Author: AlienVault
Created: 2026-05-21 15:39:24

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#AWS #Browser #CyberSecurity #Endpoint #HTTP #HTTPS #InfoSec #InfoStealer #Java #JavaScript #NET #OTX #OpenThreatExchange #Password #Phishing #PowerShell #RAT #SMS #Steganography #Word #bot #cryptocurrency #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Mini Shai Hulud: Compromised @antv npm packages enable CI/CD credential theft

Microsoft identified an active supply chain attack targeting the @antv npm package ecosystem. A threat actor compromised an @antv maintainer account and published malicious versions of widely used data-visualization packages, affecting libraries like echarts-for-react with over 1 million weekly downloads. The attack propagates through dependency chains into CI/CD pipelines and cloud workloads. A 499 KB obfuscated JavaScript payload executes silently during npm install, specifically designed to steal credentials from GitHub Actions environments. Key capabilities include multi-platform credential theft (GitHub, AWS, HashiCorp Vault, npm, Kubernetes, 1Password), GitHub Action Runner process memory scraping, privilege escalation, dual-channel data exfiltration, and SLSA provenance forgery. The payload targets CI/CD environments deliberately, with over 2,200 compromised repositories observed. GitHub responded by removing 640 malicious packages and invalidating 61,274 npm tokens.

Pulse ID: 6a0e3751a23f1487cbb26ac5
Pulse Link: https://otx.alienvault.com/pulse/6a0e3751a23f1487cbb26ac5
Pulse Author: AlienVault
Created: 2026-05-20 22:36:01

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#AWS #Cloud #CyberSecurity #GitHub #InfoSec #Java #JavaScript #Microsoft #NPM #OTX #OpenThreatExchange #Password #RAT #SupplyChain #Word #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Uncovering a Global Android Carrier Billing Fraud Campaign

A sophisticated Android malware campaign has been identified conducting carrier billing fraud through premium SMS abuse across Malaysia, Thailand, Romania, and Croatia. The operation comprises nearly 250 malicious applications that selectively target users based on their mobile operators, silently subscribing victims to premium services without consent. The malware demonstrates advanced capabilities including precise regional targeting with hardcoded SIM operator validation, automated subscription workflows using WebView manipulation and JavaScript injection, OTP interception via abuse of Google's SMS Retriever API, and Telegram-based exfiltration of device metadata. The campaign impersonates popular applications including Facebook, Instagram, TikTok, Minecraft, and Grand Theft Auto to lure victims. Active from March 2025 through January 2026, the operation employs three distinct variants with increasing levels of sophistication, utilizing distributed command and control infrastructure and systematic refer...

Pulse ID: 6a0e37bba2c6b50f5bf38278
Pulse Link: https://otx.alienvault.com/pulse/6a0e37bba2c6b50f5bf38278
Pulse Author: AlienVault
Created: 2026-05-20 22:37:47

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Android #CyberSecurity #Facebook #Google #InfoSec #Instagram #Java #JavaScript #Malware #Minecraft #OTX #OpenThreatExchange #RAT #RCE #SMS #Telegram #Thailand #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Think I'm just about ready to start using this now. Will also throw it up on Codeberg at some point. Properly documented of course.

Minified, this whole engine is a single 17KB Javascript file, and approx 2KB of that is the MIT license text. ๐Ÿ˜

The font adds an extra 8.8KB but isn't technically needed, and again that includes the MIT text.

I do plan on adding more to it yet mind. Eventually.

https://development.qweb.co.uk/qjerg-demo/

#Javascript #retro #gameDev #retroDev #retroGameDev #pixels

Javascript Game Engine Demo

Fresh mischief and digital shenanigans

FrostyNeighbor, a cyberespionage group allegedly operating from Belarus and active since at least 2016, continues targeting governmental, military, and key sectors in Eastern Europe, particularly Ukraine, Poland, and Lithuania. Recent activities detected since March 2026 show the group targeting Ukrainian governmental organizations using evolved compromise chains. The attacks utilize spearphishing with malicious PDF lures impersonating legitimate entities, delivering JavaScript variants of PicassoLoader downloader. The group employs server-side victim validation based on geolocation and fingerprinting before manually delivering Cobalt Strike beacons. FrostyNeighbor demonstrates high operational maturity through diverse delivery mechanisms, exploitation of legitimate services, and regular toolset updates to evade detection, while maintaining focus on credential harvesting and establishing persistent access to compromised systems.

Pulse ID: 6a0e803c81c123ee6cf7066a
Pulse Link: https://otx.alienvault.com/pulse/6a0e803c81c123ee6cf7066a
Pulse Author: AlienVault
Created: 2026-05-21 03:47:08

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Belarus #CobaltStrike #CredentialHarvesting #CyberSecurity #Cyberespionage #EasternEurope #Espionage #Europe #Government #InfoSec #Java #JavaScript #Military #OTX #OpenThreatExchange #PDF #Phishing #Poland #RAT #SMS #SpearPhishing #UK #Ukr #Ukraine #Ukrainian #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

WebMCP: I Made My Website AI Agent Ready

Google์ด WebMCP๋ผ๋Š” ์ƒˆ๋กœ์šด ์›น ํ‘œ์ค€์„ ๊ฐœ๋ฐœ ์ค‘์ด๋ฉฐ, ์ด๋Š” AI ์—์ด์ „ํŠธ๊ฐ€ ์›น์‚ฌ์ดํŠธ ๊ธฐ๋Šฅ์„ ์ง์ ‘ ํ˜ธ์ถœํ•  ์ˆ˜ ์žˆ๊ฒŒ ํ•ด ๊ธฐ์กด์˜ ์Šคํฌ๋ฆฐ์ƒท ๊ธฐ๋ฐ˜ ์ถ”๋ก  ๋ฐฉ์‹์„ ๋Œ€์ฒดํ•œ๋‹ค. WebMCP๋Š” ๋ธŒ๋ผ์šฐ์ € ๋‚ด์žฅ API์™€ ๋ณ„๋„์˜ ์˜คํ”ˆ์†Œ์Šค ๋ผ์ด๋ธŒ๋Ÿฌ๋ฆฌ ๋‘ ๊ฐ€์ง€ ํ˜•ํƒœ๋กœ ์กด์žฌํ•˜๋ฉฐ, ํ›„์ž๋Š” ํ˜„์žฌ ๋ชจ๋“  ๋ธŒ๋ผ์šฐ์ €์—์„œ ์ฆ‰์‹œ ์‚ฌ์šฉ ๊ฐ€๋Šฅํ•˜๋‹ค. WebMCP๋ฅผ ํ†ตํ•ด AI ์—์ด์ „ํŠธ๋Š” ์›น์‚ฌ์ดํŠธ๊ฐ€ ์ œ๊ณตํ•˜๋Š” ๋„๊ตฌ๋ฅผ ๊ตฌ์กฐํ™”๋œ ๋ฐฉ์‹์œผ๋กœ ์ธ์‹ํ•˜๊ณ  ํ˜ธ์ถœํ•  ์ˆ˜ ์žˆ์–ด ์ƒํ˜ธ์ž‘์šฉ์˜ ์‹ ๋ขฐ์„ฑ๊ณผ ํšจ์œจ์„ฑ์ด ํฌ๊ฒŒ ํ–ฅ์ƒ๋œ๋‹ค. ๊ฐœ๋ฐœ์ž๋Š” ๊ฐ„๋‹จํ•œ ์ž๋ฐ”์Šคํฌ๋ฆฝํŠธ API๋กœ ๋„๊ตฌ๋ฅผ ๋“ฑ๋กํ•˜๊ณ , ์‚ฌ์šฉ์ž ์ธ์ฆ ํ† ํฐ์„ ํ†ตํ•ด ์•ˆ์ „ํ•˜๊ฒŒ ์—ฐ๊ฒฐํ•  ์ˆ˜ ์žˆ๋‹ค.

https://suganthan.com/blog/webmcp-implementation-guide/

#webmcp #aiagent #chrome #mcp #javascript

WebMCP: I Made My Website AI Agent Ready (Here's How) โ€” Suganthan

A practical guide to implementing WebMCP on your website. What it is, how it works, and a full walkthrough of adding MCP tools to a personal site so AI agents can interact with it directly.

Suganthan Mohanadasan
Here's me showing off some #graphics, from my 20 years in #JavaScript #development: https://www.marquisdegeek.com/swarm Control a virtual swarm of
dots, lines, or lasers with your mouse or hands (via #LeapMotion) #sgx
Marquis de Geek

ร—