Have a suggestion?
Click here to suggest a blog item.
Catch up with DonationCoder by browsing our past newsletters, which collect the most interesting discussions on our site: here.
DonationCoder does not accept paid promotions. We have a strict policy of not accepting gifts of any kind in exchange for placing content in our blogs or newsletters, or on our forum. The content and recommendations you see on our site reflect our genuine personal interests and nothing more.
July 30, 2018
June 24, 2018
Apr 2, 2018
Apr 2, 2018
Feb 24, 2018
Jan 14, 2018
Major Site News
Jan 10, 2018
Process Tamer and Translator BoomerangI heard about you from ShellX City, your Find and Run Robot I believe. Process Tamer has become my favorite though. It's pretty much perfect as is. Your site has made it onto my daily surfing list and I'm always thrilled to find you guys have released a new toy. Really that is why I decided to donate - you make this compulsive tooler happy. I really like your business model; it's very very cool of you to take this approach and I appreciate that by supporting you I'm also helping out other folks who cannot afford to donate to your most worthy cause...one more thing: you've really helped out my network's users by releasing the [Google Translator] Boomerang - responses from support are much more amusing..
Our daily Blog
This page spotlights the most interesting posts collected from our forum every day.
You are viewing a specific blog item. Click here to return to the main blog page.
Talos said the exploit is being distributed through a Microsoft Excel document that has a malicious Flash object embedded into it. Once the SWF object is triggered, it installs ROKRAT, a remote administration tool Talos has been tracking since January 2017. Until now, the group behind ROKRAT—which Talos calls Group 123—has relied on social engineering or exploits of older, previously known vulnerabilities that targets hadn't yet patched. This is the first time the group has used a zeroday exploit.