Tagged articles
9 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 26, 2026 · Information Security

How a PowerShell Pastebin Steganography Trojan Hijacks Telegram Sessions

The article dissects a recent attack where a PowerShell script hidden in a Pastebin post uses character‑level steganography to retrieve a C2 address, extracts Telegram Desktop's tdata files, compresses them, and exfiltrates the data via a hard‑coded Telegram Bot API, while employing hidden execution, fileless memory loading, environment detection, and self‑destruct on virtual machines.

FilelessPastebinPowerShell
0 likes · 4 min read
How a PowerShell Pastebin Steganography Trojan Hijacks Telegram Sessions
IT Services Circle
IT Services Circle
Jan 22, 2026 · Information Security

How Malicious Browser Extensions Turned 8.8M Users into Data Spies

A recent security investigation reveals that over 300 seemingly harmless browser extensions were covertly hijacked by the DarkSpectre campaign, silently collecting browsing history, meeting data, and other personal information from more than 8.8 million users across Chrome, Edge, and Firefox for up to seven years.

SteganographySupply Chainbrowser extensions
0 likes · 9 min read
How Malicious Browser Extensions Turned 8.8M Users into Data Spies
DataFunSummit
DataFunSummit
Feb 14, 2023 · Information Security

Digital Watermarking Techniques for Data Leakage Traceability and Protection

This article presents a comprehensive overview of digital watermarking, covering its history, evaluation metrics, various media implementations, challenges posed by AI, and practical applications—especially in e‑commerce—to protect data throughout its lifecycle and enable effective leakage tracing.

Steganographydata leakagedatabase watermark
0 likes · 16 min read
Digital Watermarking Techniques for Data Leakage Traceability and Protection
IT Services Circle
IT Services Circle
Jul 17, 2022 · Frontend Development

Bypassing WeChat Mini‑Program JavaScript Interpreter Restrictions with a Bytecode VM Hidden in Images

This article explains how to circumvent WeChat's ban on JavaScript interpreters in mini‑programs by compiling JavaScript to a compact bytecode, embedding the bytecode in an image's alpha channel, and executing it with a lightweight custom virtual machine, while also discussing why such hot‑updates cannot be fundamentally blocked.

Bytecode VMCode Hot UpdateJavaScript
0 likes · 12 min read
Bypassing WeChat Mini‑Program JavaScript Interpreter Restrictions with a Bytecode VM Hidden in Images
MaGe Linux Operations
MaGe Linux Operations
Oct 21, 2021 · Fundamentals

How to Hide Secret Messages in Photos with Python and OpenCV

This tutorial shows how to embed hidden text into an image using Python's OpenCV and PIL libraries, detailing the step‑by‑step process, complete code, customization tips, and visual results, enabling messages that appear only when the picture is enlarged.

Hidden MessageImage ProcessingOpenCV
0 likes · 4 min read
How to Hide Secret Messages in Photos with Python and OpenCV
Liangxu Linux
Liangxu Linux
Mar 31, 2021 · Information Security

Hide Secret Files Inside Images on Linux Using Steghide

This guide explains how to install steghide on Linux, embed a confidential text file into a JPEG image, verify the embedding with MD5 checksums, and later extract the hidden data, covering all required commands and options.

Steganographydata securityimage hiding
0 likes · 5 min read
Hide Secret Files Inside Images on Linux Using Steghide
Sohu Tech Products
Sohu Tech Products
Jun 10, 2020 · Mobile Development

Implementing Invisible LSB Watermark on iOS Images

This article explains how to embed and retrieve an invisible numeric watermark in iOS screenshots by modifying the least‑significant bit of the RGB pixel data, provides Swift code examples for encoding and decoding, discusses practical usage scenarios, and notes limitations and possible improvements.

Image ProcessingLSBSteganography
0 likes · 9 min read
Implementing Invisible LSB Watermark on iOS Images