JavaScript - Cyber Security Review
Menu

Cyber Security Review

News • Insights • Analysis

Primary Menu

Skip to content
  • About
    • Advanced Persistent Threat
    • Artificial Intelligence
    • Critical Infrastructure Protection
      • Aviation
      • Banking and Finance
      • Defence and Aerospace
      • Education and Academia
      • Energy
      • Government
      • Healthcare
      • Industrial Security
      • Telecommunications
      • Transportation
      • Utilities
    • Cybercrime
      • DDoS
    • Malware
    • Network Security
  • News
    • News – June 2025
    • News – May 2025
    • News – April 2025
    • News – March 2025
    • News – February 2025
    • News – January 2025
    • News – December 2024
    • News – November 2024
    • News – October 2024
    • News – September 2024
    • NEWS ARCHIVE
  • Articles
  • Events
  • Editorial
  • Subscribe
  • Advertise
Search

Tag: JavaScript

Spectre proof-of-concept shows how dangerous side-channel attacks against JavaScript engine can be

Posted onMarch 15, 2021

Google has released a proof of concept (PoC) code to demonstrate the practicality of Spectre side-channel attacks against a browser’s JavaScript engine to leak information from its memory. Google in 2018 detailed two variants of Spectre, one of which – Read More …

CategoriesNews March 2021TagsJavaScript, Proof of Concept, Spectre, Threat Intelligence, Web browser

Three npm packages found opening shells on Linux, Windows systems

Posted onOctober 19, 2020October 20, 2020

Three JavaScript packages have been removed from the npm portal on Thursday for containing malicious code. According to advisories from the npm security team, the three JavaScript libraries opened shells on the computers of developers who imported the packages into Read More …

CategoriesNews October 2020TagsExploit, JavaScript, Linux, Threat Intelligence, Vulnerability, Windows

Backdoor in Popular JavaScript Library Set to Steal Cryptocurrency

Posted onNovember 27, 2018

A JavaScript library that scores over two million downloads every week has been injected with malicious code for stealing coins from a cryptocurrency wallet. The affected package is Event-Stream, built to simplify working with Node.js streaming modules and it is available Read More …

CategoriesNews November 2018TagsBackdoor, Exploit, JavaScript, Security, Threat Intelligence, Vulnerability

Hackers Hijacked Chrome Extension for Web Developers With Over 1 Million Users

Posted onAugust 2, 2017August 4, 2017

From past few years, spammers and cyber criminals were buying web extensions from their developers and then updating them without informing their users to inject bulk advertisements into every website user visits in order to generate large revenue. But now Read More …

CategoriesNews August 2017TagsChrome, Cybercrime, Information Security - Infosec, JavaScript, Security, Spam

Post navigation

Newer posts →

LATEST ARTICLES


HOW TO MAXIMIZE EXCHANGE SERVER UPTIME? - SOME BEST PRACTICES
Cyber Security Review online – June 2025


KEY METRICS TO TRACK WHEN IMPLEMENTING AI IN YOUR SOC
By Josh Breaker-Rolfe
Cyber Security Review online – December 2024


ACHIEVING DATA SECURITY RESILIENCE WITH DSPM TOOLS
By Katrina Thompson
Cyber Security Review online – November 2024


CYBER SECURITY IN CRITICAL INDUSTRIES: CHALLENGES, SOLUTIONS, AND THE ROAD AHEAD
Cyber Security Review online – August 2024


HOW TO ENGAGE YOUR EMPLOYEES IN SECURITY AWARENESS TRAINING
Cyber Security Review online – April 2024


WHY IMMINENT SEC CYBER RULE CHANGES MEANS CYBER SECURITY LEADERSHIP MUST COME FROM THE VERY TOP
By Miguel Clarke, GRC and Cyber Security lead for Armor Defense
Cyber Security Review online – November 2023


WHAT COULD YOU DO IF YOU KNEW HOW EVERY PIECE OF DATA WAS BEING USED?
By Ross Moore, Cyber Security Support Analyst with Passageways
Cyber Security Review online – October 2023


MARKET ENTRY AND COMPETITIVE ANALYSIS: LEVERAGING CHINA PROXIES FOR BUSINESS INSIGHTS
Cyber Security Review online – August 2023


A BRIEF HISTORY OF DATA LOSS PREVENTION
Cyber Security Review online –  July 2023


THE 5 ESSENTIAL CYBERSECURITY AWARENESS TRAINING TIPS FOR A MORE SECURE ENVIRONMENT
Cyber Security Review online –  June 2023


THE 8-STEP COMPREHENSIVE CHECKLIST FOR APPLICATION SECURITY IN 2023
Cyber Security Review online –  April 2023

THE NETWORK SECURITY CHALLENGE:
Improving Visibility to Defend Against Cyberthreats
By Kev Eley, Vice President Sales UK and Europe at LogRhythm

SWEDEN LAUNCHES EUROPE’S MOST ADVANCED HUB FOR AUTOMOTIVE CYBER SECURITY
Research Institute engages ethical hackers and the latest research in cyber technology to combat spiraling threats to connected vehicles  

Resources  |  Contact us  |  Advertise  |  User Login



Copyright © 2025 Cyber Security Review. All Rights Reserved. Privacy Policy
Catch Base by Catch Themes
Scroll Up
  • About
    • Advanced Persistent Threat
    • Artificial Intelligence
    • Critical Infrastructure Protection
      • Aviation
      • Banking and Finance
      • Defence and Aerospace
      • Education and Academia
      • Energy
      • Government
      • Healthcare
      • Industrial Security
      • Telecommunications
      • Transportation
      • Utilities
    • Cybercrime
      • DDoS
    • Malware
    • Network Security
  • News
    • News – June 2025
    • News – May 2025
    • News – April 2025
    • News – March 2025
    • News – February 2025
    • News – January 2025
    • News – December 2024
    • News – November 2024
    • News – October 2024
    • News – September 2024
    • NEWS ARCHIVE
  • Articles
  • Events
  • Editorial
  • Subscribe
  • Advertise