»How to build a copy-to-clipboard HTML«
– by @cferdinandi

With JavaScript set HTML to easy use web GUI's.

📃 https://gomakethings.com/how-to-build-a-copy-to-clipboard-html-web-component/

#html #webdev #nojs #copypasta #copy #clipboard #easytouse #gui #homepage

How to build a copy-to-clipboard HTML Web Component

Yesterday, we looked at how to copy items to a user’s clipboard with JavaScriprt. Today, we’re going to turn that into an HTML Web Component. Let’s dig in! The Custom Element For this Web Component, let’s use a <copy-to-clipboard> element. <copy-to-clipboard> </copy-to-clipboard> With the HTML Web Component approach, we start with HTML and enhance it rather than rendering all the things with JavaScript. Let’s add a <button> with our desired text inside the custom element.

Katz Stealer Threat Analysis

Katz Stealer is a sophisticated credential-stealing malware-as-a-service that targets multiple browsers, cryptocurrency wallets, and communication platforms. It employs advanced evasion techniques like geofencing, VM detection, and process hollowing. The infection chain involves obfuscated JavaScript, PowerShell scripts, and .NET payloads. Key features include browser credential theft, crypto wallet exfiltration, and Discord process hijacking. The malware also gathers system information, captures screenshots, and monitors clipboards. Detection opportunities include network traffic analysis, file system monitoring, and process behavior analysis. The analysis provides YARA and Sigma rules for detection, along with a comprehensive list of IOCs.

Pulse ID: 6834f67e32272e392524397b
Pulse Link: https://otx.alienvault.com/pulse/6834f67e32272e392524397b
Pulse Author: AlienVault
Created: 2025-05-26 23:17:18

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Browser #Clipboard #CyberSecurity #Discord #InfoSec #Java #JavaScript #Malware #MalwareAsAService #NET #OTX #OpenThreatExchange #PowerShell #RAT #bot #cryptocurrency #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
Clipboard Indicator - GNOME Shell Extensions

Mehr Warndialoge voraus: Apple reglementiert Zugriff auf macOS-Zwischenablage

Mac-Apps sollen in Zukunft nicht mehr in der Lage sein, Daten unbemerkt aus der Zwischenablage abzugreifen. iOS hat das bereits vorgemacht.

heise online

Additional Features of OtterCookie Malware Used by WaterPlum

The article discusses updates to the OtterCookie malware utilized by the North Korea-linked attack group WaterPlum. The malware has evolved through four versions, with v3 and v4 being the focus. OtterCookie v3 introduced Windows support and enhanced file collection capabilities. Version 4 added new Stealer modules for credential theft, improved virtual environment detection, and modified clipboard stealing methods. The malware now targets various file types, including those related to cryptocurrencies, and has sophisticated methods for stealing browser credentials. The continuous updates to OtterCookie demonstrate WaterPlum's active development efforts, posing an ongoing threat to financial institutions and cryptocurrency operators worldwide.

Pulse ID: 6820301bf40ecf6cb4a38f38
Pulse Link: https://otx.alienvault.com/pulse/6820301bf40ecf6cb4a38f38
Pulse Author: AlienVault
Created: 2025-05-11 05:05:31

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Browser #Clipboard #CyberSecurity #InfoSec #Korea #Malware #NorthKorea #OTX #OpenThreatExchange #RAT #Windows #bot #cryptocurrency #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

How to disable wl-copy notifications #wayland #notification #clipboard #2410

https://askubuntu.com/q/1547244/612

How to disable wl-copy notifications

Each time I write wl-copy some-text in Ubuntu 24.10 a wl-clipboard pop-up notification appears and I need to touch it or switch to its app with name Unknown to save some-text to clipboard, or else ...

Ask Ubuntu

APT36-Style ClickFix Attack Spoofs Indian Ministry to Target Windows & Linux

A recent campaign attributed to APT36 has been observed spoofing India's Ministry of Defence to deliver cross-platform malware. The attackers used a ClickFix-style infection chain, mimicking government press releases and leveraging a compromised .in domain for payload staging. The campaign targeted both Windows and Linux users, employing clipboard-based execution techniques. On Windows, the attack utilized mshta.exe to execute a heavily obfuscated HTA file, while on Linux, it attempted to execute a shell script. The tradecraft observed, including government-themed lures, HTA-based delivery, and decoy documents, aligns with known APT36 tactics. This activity demonstrates the continued evolution of ClickFix techniques in new contexts.

Pulse ID: 681a65ede3e45431290ce415
Pulse Link: https://otx.alienvault.com/pulse/681a65ede3e45431290ce415
Pulse Author: AlienVault
Created: 2025-05-06 19:41:33

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Clipboard #CyberSecurity #Government #ICS #India #InfoSec #Linux #Malware #Mimic #OTX #OpenThreatExchange #RAT #Windows #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
oh wow. #kdeconnect sends the #clipboard from my pc to my phone.
On one hand, that's cool.
On the other, it also sends passwords that I happen to copy from my #passwordmanager 🥺
Samsung: Android-Smartphones speichern auch Passwörter zwischen

Die Samsung-Tastatur auf Samsung-Smartphones listet im Verlauf auch alte kopierte Passwörter. Der Hersteller prüft mögliche Änderungen.

heise online