Have a suggestion?

Click here to suggest a blog item.

Newsletters Archive

Catch up with DonationCoder by browsing our past newsletters, which collect the most interesting discussions on our site: here.

Editorial Integrity

DonationCoder does not accept paid promotions. We have a strict policy of not accepting gifts of any kind in exchange for placing content in our blogs or newsletters, or on our forum. The content and recommendations you see on our site reflect our genuine personal interests and nothing more.


Latest News

July 30, 2018
Software Updates

June 24, 2018
Software Updates

Apr 2, 2018
Fundraiser Celebration

Apr 2, 2018
Software Updates

Feb 24, 2018
Software Updates

Jan 14, 2018
Major Site News

Jan 10, 2018
Event Results

Latest Forum Posts

Process Tamer and Translator Boomerang
I heard about you from ShellX City, your Find and Run Robot I believe. Process Tamer has become my favorite though. It's pretty much perfect as is. Your site has made it onto my daily surfing list and I'm always thrilled to find you guys have released a new toy. Really that is why I decided to donate - you make this compulsive tooler happy. I really like your business model; it's very very cool of you to take this approach and I appreciate that by supporting you I'm also helping out other folks who cannot afford to donate to your most worthy cause...one more thing: you've really helped out my network's users by releasing the [Google Translator] Boomerang - responses from support are much more amusing..
J.M.
J.M. image

Our daily Blog

This page spotlights the most interesting posts collected from our forum every day.

You are viewing a specific blog item. Click here to return to the main blog page.

An Adobe Flash 0day is being actively exploited in the wild

Screenshot - 2_3_2018 , 4_10_05 AM_thumb001.png
Talos said the exploit is being distributed through a Microsoft Excel document that has a malicious Flash object embedded into it. Once the SWF object is triggered, it installs ROKRAT, a remote administration tool Talos has been tracking since January 2017. Until now, the group behind ROKRAT—which Talos calls Group 123—has relied on social engineering or exploits of older, previously known vulnerabilities that targets hadn't yet patched. This is the first time the group has used a zeroday exploit.

https://arstechnica....s-are-exploiting-it/




Share on Facebook
submit to reddit