
Research
5 Malicious Chrome Extensions Enable Session Hijacking in Enterprise HR and ERP Systems
Five coordinated Chrome extensions enable session hijacking and block security controls across enterprise HR and ERP platforms.
github.com/MutexUnlocked/go-scrap
Advanced tools
go-scrap is a Go wrapper around the Rust scrap library. It supports reasonably fast capturing of raw screen pixels. The library dependency is only at compile time and statically compiled into the binary. It works on Windows, Linux, and macOS.
Obtain the library, e.g. use go get with -d to not install yet:
go get -d github.com/MutexUnlocked/go-scrap
Now, the Rust subproject scrap-sys must be compiled which is glue between the Go library and the Rust library. With
Rust installed, this can is done by running the following in the scrap-sys/ subdirectory:
cargo build --release
Note: On Windows this must use the same gcc that Cgo would. Go does not support MSVC-compiled libraries
yet. The easiest way to ensure this is with rustup by running
rustup default stable-x86_64-pc-windows-gnu before building.
Note: On Linux this needs the X11 XCB libraries with the Shm and RandR extensions. On Ubuntu (18.04+ since RandR must
be >= 1.12) they are packages named libx11-xcb-dev, libxcb-shm0-dev, and libxcb-randr0-dev respectively.
Now that the dependency is built, the library can be built. For example, take a screenshot:
go run ./example/screenshot
See the Godoc for more documentation and examples.
FAQs
Unknown package
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Five coordinated Chrome extensions enable session hijacking and block security controls across enterprise HR and ERP platforms.

Research
Node.js patched a crash bug where AsyncLocalStorage could cause stack overflows to bypass error handlers and terminate production servers.

Research
/Security News
A malicious Chrome extension steals newly created MEXC API keys, exfiltrates them to Telegram, and enables full account takeover with trading and withdrawal rights.