techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

5.4K
active users

#browser

93 posts75 participants4 posts today

I did completely get rid of Mozilla Firefox and Thunderbird on my personal systems now.

Firefox :firefox: was my main browser for many years and I used it since Netscape transformed into OSS Firefox 20 years ago.

But the Mozilla foundation nowadays doesn't do a good job in maintaining the software. Bad political choices, focus on what I consider the wrong priorities and falling more and more behind on the techical details.

I moved to the Chromium based Vivaldi :vivaldi: browser on all my systems. It's snappier, faster and way more reliable. Hardware acceleration does work out of the box under Linux and E-Mail is already built-in (although, I more often use KMail by KDE for that).

I'm highly satisfied with Vivaldi after using it for the past 6 months and never looked back.

@MsDropbear42@infosec.Sometimes, i really wish i was the kind of person who could just simply use **ONLY ONE** #browser ootb, without customising it aesthetically, & augmenting it with extensions / add-ons / mods to compensate for important missing functionality.

Sadly, i'm not that kind of person.

🙄 😋

Sometimes, i really wish i was the kind of person who could just simply use a #browser ootb, without customising it aesthetically, & augmenting it with extensions / add-ons / mods to compensate for important missing functionality.

Sadly, i'm not that kind of person.

Probiere gerade aus, ob Vivaldi was für mein browsing ist. Stelle fest, dass der Browser ein laufendes Video automatisch stumm schaltet, wenn der Fokus nicht auf dem Fenster liegt (lasse ein Video im Browser laufen und arbeite zB an einem Text im Office). Wie schalte ich die automatische Stummschaltung aus?

Silent Credit Card Thief Uncovered

A sophisticated credit card skimming campaign dubbed 'RolandSkimmer' has been discovered, targeting users in Bulgaria. The attack utilizes malicious browser extensions across Chrome, Edge, and Firefox, initiated through a deceptive LNK file. The malware employs obfuscated scripts to establish persistent access, harvesting and exfiltrating sensitive financial data. The attack workflow involves system reconnaissance, downloading additional malicious files, and injecting scripts into web pages. The threat actor uses unique identifiers to track victims and employs sophisticated techniques to evade detection. The campaign demonstrates the evolving nature of web-based credit card skimming threats, highlighting the need for enhanced security measures against LNK-based attacks and unverified browser extensions.

Pulse ID: 67efc6e92fbd533808f09435
Pulse Link: otx.alienvault.com/pulse/67efc
Pulse Author: AlienVault
Created: 2025-04-04 11:47:53

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

APT Targets South Korea with Deceptive PDF Lures

The Kimsuky APT group, also known as Black Banshee, has been actively targeting South Korean government entities using evolving tactics. Two distinct campaigns were uncovered, both utilizing government-themed PDF documents as lures. The infection chain begins with a phishing email containing a malicious LNK file attachment, which drops an obfuscated VBA script. This script then deploys additional files, including a PDF and a ZIP containing malicious components. The attacks involve sophisticated techniques such as Base64 encoding, obfuscation, and VM-aware evasion. The malware's functionalities include data exfiltration, cryptocurrency wallet theft, browser data extraction, keylogging, and establishing C2 communication. The campaigns demonstrate the group's continuous efforts to compromise South Korean targets using deceptive tactics and multi-stage malware.

Pulse ID: 67efe85af4503af2018d414e
Pulse Link: otx.alienvault.com/pulse/67efe
Pulse Author: AlienVault
Created: 2025-04-04 14:10:34

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Proactive ClickFix Threat Hunting with Hunt.io

ClickFix is a browser-based delivery technique that uses deceptive prompts and clipboard hijacking to trick users into executing malicious commands. Cybercriminals and advanced actors employ this method to deploy malware, primarily information stealers. The technique involves luring users with fake system alerts or CAPTCHA challenges, then silently staging payloads for execution. The article describes how Hunt.io's research team used custom queries to identify web infrastructure associated with ClickFix delivery, uncovering multiple live domains serving malicious content. Examples include a Bitcoin-themed domain posing as Cloudflare WAF to deliver Lumma and CryptBot malware, a page targeting Zoho Office Suite credentials, and a compromised website abusing PowerShell. The report emphasizes the growing traction of ClickFix as a low-friction method for malware delivery and credential harvesting.

Pulse ID: 67ef854620c41c3fd65378db
Pulse Link: otx.alienvault.com/pulse/67ef8
Pulse Author: AlienVault
Created: 2025-04-04 07:07:50

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.
Replied in thread

@jon My story is that in the early 2000's I was very torn between Internet Explorer, #Firefox and #Opera. I was constantly trying out new browsers.

Opera, however, was the browser that offered the most extensive options for customizing the browser to your own needs, at that time without any interface for add-ons. And that with strong competition like Firefox, which offered an interface for add-ons.

When the big change came after version 12 of the Opera browser, I had to take the difficult path, as there was no real alternative. I don't like to think back to that time.

When Vivaldi then developed a new browser under the direction of Jon von Tetzchner with many former Opera Software employees, I immediately realized that something really big was going to happen and that there would finally be a great alternative on the browser market again.

Without further ado, I have been using Vivaldi every day since the first technical preview (TP1) and would never want to use any other browser again. Having followed the development of Vivaldi since the (official) beginning, it's like watching a child grow up.

Vivaldi is my constant companion, both privately and professionally. Especially in the professional environment, Vivaldi offers me great opportunities to optimize my #workflow.