0, 0

!Latest: Qubes OS

/Entries

Blog Entries

/The Breach

a TL;DR News Section

Google Chrome fixes browsing history leaks by purple “visited” links

news-image

For over 20 years, websites could exploit the “:visited” CSS selector (purple links) to check which links a user had clicked—essentially leaking parts of your browsing history. Chrome 136 (currently in beta) fixes this privacy flaw by partitioning visited link data by site and frame origin. Now, only the website where you clicked a link will know it was visited. So, if you clicked a link on Website A, it turns purple only on Website A—not on shady or unrelated sites trying to track you. This eliminates a longstanding privacy issue used by attackers to spy on your history. Chrome is the first browser to roll out this protection, and others are expected to follow. If you want the fix now, enable the flag:
chrome://flags/#partition-visited-link-database-with-self-links

/Popular Entries

FAQ

Today's Frequently Asked Question...

What is a "cold boot attack," and can it affect modern encrypted systems?

A cold boot attack exploits the residual data left in RAM (volatile memory) after a system is shut down or rebooted. Attackers with physical access can quickly reboot a device and use special tools to extract encryption keys or other sensitive data from RAM.

full list of frequently asked questions

Trivia

Brain Teaser

Which technique is used by malware to remain hidden by modifying system-level APIs at runtime?

Keylogging
API hooking
Phishing
Brute forcing

/All Entries

Live Cyberthreat Map

https://cybermap.kaspersky.com/

GitHub Repo Highlight

A-poc / RedTeam-Tools

github-highlight-img

While not a tool itself, this GitHub repository contains a thoroughly curated collection of 150+ red team tools and resources. The collection contains dedicated and general security tools that can be used for red teaming. It contains recon software like Shodan and gobuster, execution tools like Mimikatz and PowerSploit, defense evasion methods like Invoke-Obfuscation, command and control (C2) tools like Metasploit and Covenant, and data exfiltration methods through DNS tunneling and Google Drive exploits. It also provides 17 red team tips on how to evade security controls, avoid detection, and improve operational security. This repository is a one-stop-shop for security professionals conducting offensive security audits and penetration testing. This collection of security and red team tools are heavily encouraged not to be used maliciously, but purely for educational purposes.

The materials in this repository are for informational and educational purposes only. They are not intended for use in any illegal activities.

/Activity Map

Active users this past month were from...

https://developers.google.com/chart/interactive/docs/gallery/geochart#overview

no need to download the app.

Activity Log

April 2025

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30