color theming with JS

This commit is contained in:
hornetfighter515 2021-07-23 00:49:49 -04:00
parent 3fb1466f52
commit c25fa2202f
5 changed files with 79 additions and 48 deletions

View File

@ -45,6 +45,7 @@ a{
.news-article{
color:var(--text);
font-family: var(--font-family);
-webkit-transition-duration: 0.3s;
transition-duration: 0.3s;
padding:5px;

View File

@ -7,12 +7,49 @@
<link rel="stylesheet" href="news_scroll.css" type="text/css" />
<script src="news_scroll.js" type="text/javascript"></script>
</head>
<body color-theme="terminal" class="news-scroll" onMouseover="scrollspeed=0" onMouseout="scrollspeed=current" OnLoad="NewsScrollStart();">
<body id="news-scroll-body" color-theme="terminal" class="news-scroll" onMouseover="scrollspeed=0" onMouseout="scrollspeed=current" OnLoad="NewsScrollStart();">
<!-- START NEWS FEED -->
<div id="NewsDiv">
<div class="scroll-text-if">
<div id="news-container">
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/QyJiz3kF9n4/malicious-npm-package-caught-stealing.html>
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/gLX9xr2xUiY/apt-hackers-distributed-android-trojan.html>
<div class="news-article">
<h2>
APT Hackers Distributed Android Trojan via Syrian e-Government Portal
</h2>
<p>An advanced persistent threat (APT) actor has been tracked in a new campaign deploying Android malware via the Syrian e-Government Web Portal, indicating an upgraded arsenal designed to compromise victims.
"To the best of our knowledge, this is the first time that the group has been publicly observed using malicious Android applications as part of its attacks," Trend Micro researchers Zhengyu<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/gLX9xr2xUiY" height="1" width="1" alt=""/>...</p>
</div>
</a>
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/rcOYj6ymYvY/reduce-end-user-password-change.html>
<div class="news-article">
<h2>
Reduce End-User Password Change Frustrations
</h2>
<p>Organizations today must give attention to their cybersecurity posture, including policies, procedures, and technical solutions for cybersecurity challenges. 
This often results in a greater burden on the IT service desk staff as end-users encounter issues related to security software, policies, and password restrictions. 
One of the most common areas where security may cause challenges for<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/rcOYj6ymYvY" height="1" width="1" alt=""/>...</p>
</div>
</a>
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/Zd_2qghHdqs/oracle-warns-of-critical-remotely.html>
<div class="news-article">
<h2>
Oracle Warns of Critical Remotely Exploitable Weblogic Server Flaws
</h2>
<p>Oracle on Tuesday released its quarterly Critical Patch Update for July 2021 with 342 fixes spanning across multiple products, some of which could be exploited by a remote attacker to take control of an affected system.
Chief among them is CVE-2019-2729, a critical deserialization vulnerability via XMLDecoder in Oracle WebLogic Server Web Services that's remotely exploitable without<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Zd_2qghHdqs" height="1" width="1" alt=""/>...</p>
</div>
</a>
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/daC7Pxf6UMA/another-hacker-arrested-for-2020.html>
<div class="news-article">
<h2>
Another Hacker Arrested for 2020 Twitter Hack and Massive Bitcoin Scam
</h2>
<p>A U.K. citizen has been arrested in the Spanish town of Estepona over his alleged involvement in the July 2020 hack of Twitter, resulting in the compromise of 130 high-profile accounts.
Joseph O'Connor, 22, has been charged with intentionally accessing a computer without authorization and obtaining information from a protected computer, as well as for making extortive communications. The Spanish<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/daC7Pxf6UMA" height="1" width="1" alt=""/>...</p>
</div>
</a>
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/QyJiz3kF9n4/malicious-npm-package-caught-stealing.html>
<div class="news-article">
<h2>
Malicious NPM Package Caught Stealing Users' Saved Passwords From Browsers
@ -26,8 +63,8 @@ The package in question, named "nodejs_net_server" and downloaded over 1,283 tim
<h2>
XLoader Windows InfoStealer Malware Now Upgraded to Attack macOS Systems
</h2>
<p>Cybersecurity researchers on Wednesday disclosed details of an evolving malware that has now been upgraded to steal sensitive information from Apple's macOS operating system.
The malware, dubbed "XLoader," is a successor to another well-known Windows-based info stealer called Formbook that's known to vacuum credentials from various web browsers, collect screenshots, log keystrokes, and download<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/crF48NxsWMo" height="1" width="1" alt=""/>...</p>
<p>A popular malware known for stealing sensitive information from Windows machines has evolved into a new strain capable of also targeting Apple's macOS operating system.
The upgraded malware, dubbed "XLoader," is a successor to another well-known Windows-based info stealer called Formbook that's known to vacuum credentials from various web browsers, capture screenshots, record keystrokes, and<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/crF48NxsWMo" height="1" width="1" alt=""/>...</p>
</div>
</a>
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/BnByrOj1RPU/several-new-critical-flaws-affect.html>
@ -54,7 +91,7 @@ Surprisingly, leaner teams have a much greater chance than<img src="http://feeds
New Windows and Linux Flaws Give Attackers Highest System Privileges
</h2>
<p>Microsoft's Windows 10 and the upcoming Windows 11 versions have been found vulnerable to a new local privilege escalation vulnerability that permits users with low-level permissions access Windows system files, in turn, enabling them to unmask the operating system installation password and even decrypt private keys.
"Starting with Windows 10 build 1809, non-administrative users are granted<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/8w-lkhOOs48" height="1" width="1" alt=""/>...</p>
The vulnerability has been nicknamed "SeriousSAM.""Starting with Windows 10<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/8w-lkhOOs48" height="1" width="1" alt=""/>...</p>
</div>
</a>
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/0waAACXDS2I/16-year-old-security-bug-affects.html>
@ -202,42 +239,6 @@ The latest patch resolves a total of eight issues, one of which concerns a type
</h2>
<p>Microsoft on Thursday shared fresh guidance on yet another vulnerability affecting the Windows Print Spooler service, stating that it's working to address it in an upcoming security update.
Tracked as CVE-2021-34481 (CVSS score: 7.8), the issue concerns a local privilege escalation flaw that could be abused to perform unauthorized actions on the system. The company credited security researcher<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/KIB6sSY3DOA" height="1" width="1" alt=""/>...</p>
</div>
</a>
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/ynTYqw0HM1w/chinas-cyberspies-targeting-southeast.html>
<div class="news-article">
<h2>
China's Cyberspies Targeting Southeast Asian Government Entities
</h2>
<p>A sweeping and "highly active campaign" that originally set its sights on Myanmar has broadened its focus to strike a number of targets located in the Philippines, according to new research.
Russian cybersecurity firm Kaspersky, which first spotted the infections in October 2020, attributed them to a threat actor it tracks as "LuminousMoth," which it connected with medium to high confidence to a<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/ynTYqw0HM1w" height="1" width="1" alt=""/>...</p>
</div>
</a>
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/xMQewm8swes/how-to-access-mobile-carrier.html>
<div class="news-article">
<h2>
New Zero-Trust API Offers Mobile Carrier Authentication to Developers
</h2>
<p>Zero Trust is increasingly being adopted as the best strategy to maintain application security and prevent data breaches. To help achieve progress on Zero Trust, there is now a new, easy way to implement continuous user verification by connecting directly to the authentication systems used by mobile operators without the overhead of processing or storing user data. 
Before we show you how it<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/xMQewm8swes" height="1" width="1" alt=""/>...</p>
</div>
</a>
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/kFBap-h96gQ/ransomware-attacks-targeting-unpatched.html>
<div class="news-article">
<h2>
Ransomware Attacks Targeting Unpatched EOL SonicWall SMA 100 VPN Appliances
</h2>
<p>Networking equipment maker SonicWall is alerting customers of an "imminent" ransomware campaign targeting its Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products running unpatched and end-of-life 8.x firmware.
The warning comes more than a month after reports emerged that remote access vulnerabilities in SonicWall SRA 4600 VPN appliances (CVE-2019-7481) are being<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/kFBap-h96gQ" height="1" width="1" alt=""/>...</p>
</div>
</a>
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/J51bCpFSyXc/google-details-ios-chrome-ie-zero-day.html>
<div class="news-article">
<h2>
Google Details iOS, Chrome, IE Zero-Day Flaws Exploited Recently in the Wild
</h2>
<p>Threat intelligence researchers from Google on Wednesday shed more light on four in-the-wild zero-days in Chrome, Safari, and Internet Explorer browsers that were exploited by malicious actors in different campaigns since the start of the year.
What's more, three of the four zero-days were engineered by commercial providers and sold to and used by government-backed actors, contributing to an<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/J51bCpFSyXc" height="1" width="1" alt=""/>...</p>
</div>
</a>
</div>

View File

@ -5,10 +5,28 @@ var speedjump = 30; // ADJUST SCROLL JUMPING = RANGE 20 TO 40
var nextdelay = 0; // SECOND SCROLL DELAY IN SECONDS 0 = QUICKEST
var topspace = "2px"; // TOP SPACING FIRST TIME SCROLLING
var frameheight = 176; // IF YOU RESIZE THE CSS HEIGHT, EDIT THIS HEIGHT TO MATCH
var color_theme = "light"; // CHANGE THIS TO WHAT YOU WANT FROM palette.css
window.onload=function(){
SetColor("news_iframe_scroll")
}
id=function(n){return document.getElementById(n);};
current = (scrollspeed);
function SetColor(el_id){
el = id(el_id);
if(el!=null){
console.log("El is not null.");
el.setAttribute("color-theme", color_theme);
}
else{
console.log("el " + el_id + " was null")
}
}
function HeightData(){
AreaHeight=dataobj.offsetHeight
if (AreaHeight===0){
@ -20,7 +38,8 @@ function HeightData(){
}
function NewsScrollStart(){
dataobj=document.all? document.all.NewsDiv : document.getElementById("NewsDiv")
SetColor("news-scroll-body")
dataobj=document.all? document.all.NewsDiv : id("NewsDiv")
dataobj.style.top=topspace
setTimeout("HeightData()",( startdelay * 1000 ))
}

View File

@ -1,7 +1,4 @@
:root{
/*
Todo: make the colors right
*/
--hornet-blue: #302efe;
--hornet-red: #E3073F;
@ -9,11 +6,12 @@
--hornet-black:#050515;
--hornet-gray:#989098;
--hornet-white:#DDDDFF;
font-family: Verdana, Geneva, sans-serif;
}
.light, body[color-theme="light"],div[color-theme="dark"]{
--bg: #DDDDFF;
--bg: var(--hornet-white);
--text: var(--hornet-black);
--link: var(--hornet-blue);
--clicked-link: purple;
@ -42,7 +40,7 @@
--primary: #00ff00;
--accent: var(--hornet-blue);
--warning: red;
--font-family: var(--hornet-font);
--font-family:DejaVu Sans Mono,Bitstream Vera Sans Mono,Courier New, monospace;
}
.hornetfighter-red, body[color-theme="hornetfighter-red"], div[color-theme="hornetfighter-red"]{
@ -53,5 +51,16 @@
--primary:var(--hornet-black);
--accent: var(--hornet-blue);
--warning: var(--hornet-black);
--font-family: var(--hornet-font);
--font-family: var(--hornet-font)
}
.hornetfighter-blue, body[color-theme="hornetfighter-blue"], div[color-theme="hornetfighter-blue"]{
--bg:var(--hornet-blue);
--text:var(--hornet-white);
--link: var(--hornet-gray);
--clicked-link: var(--hornet-gray);
--primary:var(--hornet-black);
--accent: var(--hornet-red);
--warning: var(--hornet-black);
--font-family: var(--hornet-font)
}

View File

@ -31,6 +31,7 @@
<!-- START SCROLLING NEWS WINDOW -->
<!-- NOTE: For educational use only -->
<link rel="stylesheet" type="text/css" href="ef/news_scroll.css">
<script src="ef/news_scroll.js" type="text/javascript"></script>
<div class="section" id="news_iframe_scroll" color-theme="terminal">
<a href="https://thehackernews.com/">
<div class="news-scroll-title">