color theming with JS
This commit is contained in:
parent
3fb1466f52
commit
c25fa2202f
|
@ -45,6 +45,7 @@ a{
|
|||
|
||||
.news-article{
|
||||
color:var(--text);
|
||||
font-family: var(--font-family);
|
||||
-webkit-transition-duration: 0.3s;
|
||||
transition-duration: 0.3s;
|
||||
padding:5px;
|
||||
|
|
|
@ -7,12 +7,49 @@
|
|||
<link rel="stylesheet" href="news_scroll.css" type="text/css" />
|
||||
<script src="news_scroll.js" type="text/javascript"></script>
|
||||
</head>
|
||||
<body color-theme="terminal" class="news-scroll" onMouseover="scrollspeed=0" onMouseout="scrollspeed=current" OnLoad="NewsScrollStart();">
|
||||
<body id="news-scroll-body" color-theme="terminal" class="news-scroll" onMouseover="scrollspeed=0" onMouseout="scrollspeed=current" OnLoad="NewsScrollStart();">
|
||||
<!-- START NEWS FEED -->
|
||||
<div id="NewsDiv">
|
||||
<div class="scroll-text-if">
|
||||
<div id="news-container">
|
||||
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/QyJiz3kF9n4/malicious-npm-package-caught-stealing.html>
|
||||
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/gLX9xr2xUiY/apt-hackers-distributed-android-trojan.html>
|
||||
<div class="news-article">
|
||||
<h2>
|
||||
APT Hackers Distributed Android Trojan via Syrian e-Government Portal
|
||||
</h2>
|
||||
<p>An advanced persistent threat (APT) actor has been tracked in a new campaign deploying Android malware via the Syrian e-Government Web Portal, indicating an upgraded arsenal designed to compromise victims.
|
||||
"To the best of our knowledge, this is the first time that the group has been publicly observed using malicious Android applications as part of its attacks," Trend Micro researchers Zhengyu<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/gLX9xr2xUiY" height="1" width="1" alt=""/>...</p>
|
||||
</div>
|
||||
</a>
|
||||
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/rcOYj6ymYvY/reduce-end-user-password-change.html>
|
||||
<div class="news-article">
|
||||
<h2>
|
||||
Reduce End-User Password Change Frustrations
|
||||
</h2>
|
||||
<p>Organizations today must give attention to their cybersecurity posture, including policies, procedures, and technical solutions for cybersecurity challenges.
|
||||
This often results in a greater burden on the IT service desk staff as end-users encounter issues related to security software, policies, and password restrictions.
|
||||
One of the most common areas where security may cause challenges for<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/rcOYj6ymYvY" height="1" width="1" alt=""/>...</p>
|
||||
</div>
|
||||
</a>
|
||||
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/Zd_2qghHdqs/oracle-warns-of-critical-remotely.html>
|
||||
<div class="news-article">
|
||||
<h2>
|
||||
Oracle Warns of Critical Remotely Exploitable Weblogic Server Flaws
|
||||
</h2>
|
||||
<p>Oracle on Tuesday released its quarterly Critical Patch Update for July 2021 with 342 fixes spanning across multiple products, some of which could be exploited by a remote attacker to take control of an affected system.
|
||||
Chief among them is CVE-2019-2729, a critical deserialization vulnerability via XMLDecoder in Oracle WebLogic Server Web Services that's remotely exploitable without<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/Zd_2qghHdqs" height="1" width="1" alt=""/>...</p>
|
||||
</div>
|
||||
</a>
|
||||
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/daC7Pxf6UMA/another-hacker-arrested-for-2020.html>
|
||||
<div class="news-article">
|
||||
<h2>
|
||||
Another Hacker Arrested for 2020 Twitter Hack and Massive Bitcoin Scam
|
||||
</h2>
|
||||
<p>A U.K. citizen has been arrested in the Spanish town of Estepona over his alleged involvement in the July 2020 hack of Twitter, resulting in the compromise of 130 high-profile accounts.
|
||||
Joseph O'Connor, 22, has been charged with intentionally accessing a computer without authorization and obtaining information from a protected computer, as well as for making extortive communications. The Spanish<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/daC7Pxf6UMA" height="1" width="1" alt=""/>...</p>
|
||||
</div>
|
||||
</a>
|
||||
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/QyJiz3kF9n4/malicious-npm-package-caught-stealing.html>
|
||||
<div class="news-article">
|
||||
<h2>
|
||||
Malicious NPM Package Caught Stealing Users' Saved Passwords From Browsers
|
||||
|
@ -26,8 +63,8 @@ The package in question, named "nodejs_net_server" and downloaded over 1,283 tim
|
|||
<h2>
|
||||
XLoader Windows InfoStealer Malware Now Upgraded to Attack macOS Systems
|
||||
</h2>
|
||||
<p>Cybersecurity researchers on Wednesday disclosed details of an evolving malware that has now been upgraded to steal sensitive information from Apple's macOS operating system.
|
||||
The malware, dubbed "XLoader," is a successor to another well-known Windows-based info stealer called Formbook that's known to vacuum credentials from various web browsers, collect screenshots, log keystrokes, and download<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/crF48NxsWMo" height="1" width="1" alt=""/>...</p>
|
||||
<p>A popular malware known for stealing sensitive information from Windows machines has evolved into a new strain capable of also targeting Apple's macOS operating system.
|
||||
The upgraded malware, dubbed "XLoader," is a successor to another well-known Windows-based info stealer called Formbook that's known to vacuum credentials from various web browsers, capture screenshots, record keystrokes, and<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/crF48NxsWMo" height="1" width="1" alt=""/>...</p>
|
||||
</div>
|
||||
</a>
|
||||
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/BnByrOj1RPU/several-new-critical-flaws-affect.html>
|
||||
|
@ -54,7 +91,7 @@ Surprisingly, leaner teams have a much greater chance than<img src="http://feeds
|
|||
New Windows and Linux Flaws Give Attackers Highest System Privileges
|
||||
</h2>
|
||||
<p>Microsoft's Windows 10 and the upcoming Windows 11 versions have been found vulnerable to a new local privilege escalation vulnerability that permits users with low-level permissions access Windows system files, in turn, enabling them to unmask the operating system installation password and even decrypt private keys.
|
||||
"Starting with Windows 10 build 1809, non-administrative users are granted<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/8w-lkhOOs48" height="1" width="1" alt=""/>...</p>
|
||||
The vulnerability has been nicknamed "SeriousSAM.""Starting with Windows 10<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/8w-lkhOOs48" height="1" width="1" alt=""/>...</p>
|
||||
</div>
|
||||
</a>
|
||||
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/0waAACXDS2I/16-year-old-security-bug-affects.html>
|
||||
|
@ -202,42 +239,6 @@ The latest patch resolves a total of eight issues, one of which concerns a type
|
|||
</h2>
|
||||
<p>Microsoft on Thursday shared fresh guidance on yet another vulnerability affecting the Windows Print Spooler service, stating that it's working to address it in an upcoming security update.
|
||||
Tracked as CVE-2021-34481 (CVSS score: 7.8), the issue concerns a local privilege escalation flaw that could be abused to perform unauthorized actions on the system. The company credited security researcher<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/KIB6sSY3DOA" height="1" width="1" alt=""/>...</p>
|
||||
</div>
|
||||
</a>
|
||||
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/ynTYqw0HM1w/chinas-cyberspies-targeting-southeast.html>
|
||||
<div class="news-article">
|
||||
<h2>
|
||||
China's Cyberspies Targeting Southeast Asian Government Entities
|
||||
</h2>
|
||||
<p>A sweeping and "highly active campaign" that originally set its sights on Myanmar has broadened its focus to strike a number of targets located in the Philippines, according to new research.
|
||||
Russian cybersecurity firm Kaspersky, which first spotted the infections in October 2020, attributed them to a threat actor it tracks as "LuminousMoth," which it connected with medium to high confidence to a<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/ynTYqw0HM1w" height="1" width="1" alt=""/>...</p>
|
||||
</div>
|
||||
</a>
|
||||
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/xMQewm8swes/how-to-access-mobile-carrier.html>
|
||||
<div class="news-article">
|
||||
<h2>
|
||||
New Zero-Trust API Offers Mobile Carrier Authentication to Developers
|
||||
</h2>
|
||||
<p>Zero Trust is increasingly being adopted as the best strategy to maintain application security and prevent data breaches. To help achieve progress on Zero Trust, there is now a new, easy way to implement continuous user verification by connecting directly to the authentication systems used by mobile operators – without the overhead of processing or storing user data.
|
||||
Before we show you how it<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/xMQewm8swes" height="1" width="1" alt=""/>...</p>
|
||||
</div>
|
||||
</a>
|
||||
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/kFBap-h96gQ/ransomware-attacks-targeting-unpatched.html>
|
||||
<div class="news-article">
|
||||
<h2>
|
||||
Ransomware Attacks Targeting Unpatched EOL SonicWall SMA 100 VPN Appliances
|
||||
</h2>
|
||||
<p>Networking equipment maker SonicWall is alerting customers of an "imminent" ransomware campaign targeting its Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products running unpatched and end-of-life 8.x firmware.
|
||||
The warning comes more than a month after reports emerged that remote access vulnerabilities in SonicWall SRA 4600 VPN appliances (CVE-2019-7481) are being<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/kFBap-h96gQ" height="1" width="1" alt=""/>...</p>
|
||||
</div>
|
||||
</a>
|
||||
<a href=http://feedproxy.google.com/~r/TheHackersNews/~3/J51bCpFSyXc/google-details-ios-chrome-ie-zero-day.html>
|
||||
<div class="news-article">
|
||||
<h2>
|
||||
Google Details iOS, Chrome, IE Zero-Day Flaws Exploited Recently in the Wild
|
||||
</h2>
|
||||
<p>Threat intelligence researchers from Google on Wednesday shed more light on four in-the-wild zero-days in Chrome, Safari, and Internet Explorer browsers that were exploited by malicious actors in different campaigns since the start of the year.
|
||||
What's more, three of the four zero-days were engineered by commercial providers and sold to and used by government-backed actors, contributing to an<img src="http://feeds.feedburner.com/~r/TheHackersNews/~4/J51bCpFSyXc" height="1" width="1" alt=""/>...</p>
|
||||
</div>
|
||||
</a>
|
||||
</div>
|
||||
|
|
|
@ -5,10 +5,28 @@ var speedjump = 30; // ADJUST SCROLL JUMPING = RANGE 20 TO 40
|
|||
var nextdelay = 0; // SECOND SCROLL DELAY IN SECONDS 0 = QUICKEST
|
||||
var topspace = "2px"; // TOP SPACING FIRST TIME SCROLLING
|
||||
var frameheight = 176; // IF YOU RESIZE THE CSS HEIGHT, EDIT THIS HEIGHT TO MATCH
|
||||
var color_theme = "light"; // CHANGE THIS TO WHAT YOU WANT FROM palette.css
|
||||
|
||||
window.onload=function(){
|
||||
SetColor("news_iframe_scroll")
|
||||
}
|
||||
|
||||
id=function(n){return document.getElementById(n);};
|
||||
|
||||
|
||||
current = (scrollspeed);
|
||||
|
||||
function SetColor(el_id){
|
||||
el = id(el_id);
|
||||
if(el!=null){
|
||||
console.log("El is not null.");
|
||||
el.setAttribute("color-theme", color_theme);
|
||||
}
|
||||
else{
|
||||
console.log("el " + el_id + " was null")
|
||||
}
|
||||
}
|
||||
|
||||
function HeightData(){
|
||||
AreaHeight=dataobj.offsetHeight
|
||||
if (AreaHeight===0){
|
||||
|
@ -20,7 +38,8 @@ function HeightData(){
|
|||
}
|
||||
|
||||
function NewsScrollStart(){
|
||||
dataobj=document.all? document.all.NewsDiv : document.getElementById("NewsDiv")
|
||||
SetColor("news-scroll-body")
|
||||
dataobj=document.all? document.all.NewsDiv : id("NewsDiv")
|
||||
dataobj.style.top=topspace
|
||||
setTimeout("HeightData()",( startdelay * 1000 ))
|
||||
}
|
||||
|
|
|
@ -1,7 +1,4 @@
|
|||
:root{
|
||||
/*
|
||||
Todo: make the colors right
|
||||
*/
|
||||
--hornet-blue: #302efe;
|
||||
|
||||
--hornet-red: #E3073F;
|
||||
|
@ -9,11 +6,12 @@
|
|||
--hornet-black:#050515;
|
||||
|
||||
--hornet-gray:#989098;
|
||||
--hornet-white:#DDDDFF;
|
||||
font-family: Verdana, Geneva, sans-serif;
|
||||
}
|
||||
|
||||
.light, body[color-theme="light"],div[color-theme="dark"]{
|
||||
--bg: #DDDDFF;
|
||||
--bg: var(--hornet-white);
|
||||
--text: var(--hornet-black);
|
||||
--link: var(--hornet-blue);
|
||||
--clicked-link: purple;
|
||||
|
@ -42,7 +40,7 @@
|
|||
--primary: #00ff00;
|
||||
--accent: var(--hornet-blue);
|
||||
--warning: red;
|
||||
--font-family: var(--hornet-font);
|
||||
--font-family:DejaVu Sans Mono,Bitstream Vera Sans Mono,Courier New, monospace;
|
||||
}
|
||||
|
||||
.hornetfighter-red, body[color-theme="hornetfighter-red"], div[color-theme="hornetfighter-red"]{
|
||||
|
@ -53,5 +51,16 @@
|
|||
--primary:var(--hornet-black);
|
||||
--accent: var(--hornet-blue);
|
||||
--warning: var(--hornet-black);
|
||||
--font-family: var(--hornet-font);
|
||||
--font-family: var(--hornet-font)
|
||||
}
|
||||
|
||||
.hornetfighter-blue, body[color-theme="hornetfighter-blue"], div[color-theme="hornetfighter-blue"]{
|
||||
--bg:var(--hornet-blue);
|
||||
--text:var(--hornet-white);
|
||||
--link: var(--hornet-gray);
|
||||
--clicked-link: var(--hornet-gray);
|
||||
--primary:var(--hornet-black);
|
||||
--accent: var(--hornet-red);
|
||||
--warning: var(--hornet-black);
|
||||
--font-family: var(--hornet-font)
|
||||
}
|
|
@ -31,6 +31,7 @@
|
|||
<!-- START SCROLLING NEWS WINDOW -->
|
||||
<!-- NOTE: For educational use only -->
|
||||
<link rel="stylesheet" type="text/css" href="ef/news_scroll.css">
|
||||
<script src="ef/news_scroll.js" type="text/javascript"></script>
|
||||
<div class="section" id="news_iframe_scroll" color-theme="terminal">
|
||||
<a href="https://thehackernews.com/">
|
||||
<div class="news-scroll-title">
|
||||
|
|
Loading…
Reference in New Issue
Block a user