URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browser...
Submission: On June 22 via api from GB

Summary

This website contacted 17 IPs in 2 countries across 15 domains to perform 82 HTTP transactions. The main IP is 87.106.192.188, located in Germany and belongs to ONEANDONE-AS Brauerstrasse 48, DE. The main domain is nationalcybersecuritynews.today.
TLS certificate: Issued by Let's Encrypt Authority X3 on April 5th 2020. Valid for: 3 months.
This is the only time nationalcybersecuritynews.today was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

Domain Requested by
41 nationalcybersecuritynews.today nationalcybersecuritynews.today
11 c0.wp.com nationalcybersecuritynews.today
4 googleads.g.doubleclick.net pagead2.googlesyndication.com
4 pagead2.googlesyndication.com nationalcybersecuritynews.today
pagead2.googlesyndication.com
2 tpc.googlesyndication.com pagead2.googlesyndication.com
tpc.googlesyndication.com
2 fonts.gstatic.com nationalcybersecuritynews.today
2 i2.wp.com nationalcybersecuritynews.today
2 www.google-analytics.com www.googletagmanager.com
nationalcybersecuritynews.today
2 www.google.com nationalcybersecuritynews.today
c0.wp.com
1 www.googletagservices.com pagead2.googlesyndication.com
1 adservice.google.com pagead2.googlesyndication.com
1 adservice.google.de pagead2.googlesyndication.com
1 pixel.wp.com nationalcybersecuritynews.today
1 www.gstatic.com www.google.com
1 percolate.blogtalkradio.com nationalcybersecuritynews.today
1 www.youtube.com nationalcybersecuritynews.today
1 stats.wp.com nationalcybersecuritynews.today
1 www.googletagmanager.com nationalcybersecuritynews.today
1 fonts.googleapis.com nationalcybersecuritynews.today
1 app.ecwid.com nationalcybersecuritynews.today
1 d1oxsl77a1kjht.cloudfront.net nationalcybersecuritynews.today
82 21
Subject Issuer Validity Valid
nationalcybersecuritynews.today
Let's Encrypt Authority X3
2020-04-05 -
2020-07-04
3 months crt.sh
*.cloudfront.net
DigiCert Global CA G2
2020-05-26 -
2021-04-21
a year crt.sh
*.ecwid.com
Sectigo RSA Organization Validation Secure Server CA
2020-05-14 -
2022-08-16
2 years crt.sh
*.wp.com
Sectigo RSA Domain Validation Secure Server CA
2020-04-02 -
2022-07-05
2 years crt.sh
upload.video.google.com
GTS CA 1O1
2020-05-26 -
2020-08-18
3 months crt.sh
*.google-analytics.com
GTS CA 1O1
2020-05-26 -
2020-08-18
3 months crt.sh
*.g.doubleclick.net
GTS CA 1O1
2020-05-26 -
2020-08-18
3 months crt.sh
www.google.com
GTS CA 1O1
2020-05-26 -
2020-08-18
3 months crt.sh
*.gstatic.com
GTS CA 1O1
2020-05-26 -
2020-08-18
3 months crt.sh
*.blogtalkradio.com
Amazon
2020-06-20 -
2021-07-20
a year crt.sh
*.google.de
GTS CA 1O1
2020-05-26 -
2020-08-18
3 months crt.sh
*.google.com
GTS CA 1O1
2020-05-26 -
2020-08-18
3 months crt.sh
tpc.googlesyndication.com
GTS CA 1O1
2020-05-26 -
2020-08-18
3 months crt.sh

This page contains 9 frames:

Primary Page: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Frame ID: 9A302E2AB69209BD0ECA27C9EE1B5122
Requests: 75 HTTP requests in this frame

Frame: https://www.youtube.com/embed/_xxX9KUPaR0?controls=0
Frame ID: A44350467626D9A134E2A65B1975D420
Requests: 1 HTTP requests in this frame

Frame: https://percolate.blogtalkradio.com/offsiteplayer?hostId=147156
Frame ID: 8951E27C6D4C50063B8603120F2FB4F2
Requests: 1 HTTP requests in this frame

Frame: https://www.google.com/sorry/index?continue=https://www.youtube.com/embed/_xxX9KUPaR0%3Fcontrols%3D0&q=EhAqAQT4AZJUFAAAAAAAAAACGP2wwfcFIhkA8aeDS4VD2vqBmL3uS1XY7142Z6FVp1ovMgFy
Frame ID: 15889FA3D382610371D32460D62DDF02
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/html/r20200610/r20190131/zrt_lookup.html
Frame ID: CEF4B4691B9643A3407D2EC9C1920850
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-9101039038458640&output=html&adk=1812271804&adf=3025194257&lmt=1592809597&plat=1%3A32776%2C2%3A16809992%2C8%3A32768%2C9%3A32776%2C10%3A32%2C11%3A32%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&tp=site_kit&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fnationalcybersecuritynews.today%2Fvulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities%2F&ea=0&flash=0&pra=5&wgl=1&adsid=NT&dt=1592809597635&bpp=19&bdt=560&idt=86&shv=r20200610&cbv=r20190131&ptt=9&saldr=aa&abxe=1&nras=1&correlator=5086040042266&frm=20&pv=2&ga_vid=1551705021.1592809598&ga_sid=1592809598&ga_hid=1638320058&ga_fc=0&iag=0&icsg=1072862413717488&dssz=62&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1600&bih=1200&scr_x=0&scr_y=0&eid=42530499%2C42530501&oid=3&pvsid=793878086193699&pem=892&rx=0&eae=2&fc=1920&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=8208&bc=31&ifi=0&uci=a!0&fsb=1&dtd=110
Frame ID: 615FF0CDFBC448361591BEEF5AEE87AB
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-9101039038458640&output=html&h=600&slotname=6218340406&adk=2635247717&adf=2666940267&w=240&fwrn=4&fwrnh=100&lmt=1592809597&rafmt=1&tp=site_kit&psa=0&guci=1.2.0.0.2.2.0.0&format=240x600&url=https%3A%2F%2Fnationalcybersecuritynews.today%2Fvulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities%2F&flash=0&fwr=0&fwrattr=true&rpe=1&resp_fmts=4&wgl=1&adsid=NT&dt=1592809597654&bpp=6&bdt=579&idt=103&shv=r20200610&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0&nras=1&correlator=5086040042266&frm=20&pv=1&ga_vid=1551705021.1592809598&ga_sid=1592809598&ga_hid=1638320058&ga_fc=0&iag=0&icsg=1072862413717488&dssz=63&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1114&ady=446&biw=1600&bih=1200&scr_x=0&scr_y=0&eid=42530499%2C42530501&oid=3&pvsid=793878086193699&pem=892&rx=0&eae=0&fc=1920&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=8336&bc=31&ifi=1&uci=a!1&fsb=1&xpc=nDvFCmZhsP&p=https%3A//nationalcybersecuritynews.today&dtd=111
Frame ID: 4878A753DA9ABD3C10BDFA782D875DA7
Requests: 1 HTTP requests in this frame

Frame: https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-9101039038458640&output=html&h=600&slotname=6218340406&adk=3001328440&adf=4002540836&w=240&fwrn=4&fwrnh=100&lmt=1592809597&rafmt=1&tp=site_kit&psa=0&guci=1.2.0.0.2.2.0.0&format=240x600&url=https%3A%2F%2Fnationalcybersecuritynews.today%2Fvulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities%2F&flash=0&fwr=0&fwrattr=true&rpe=1&resp_fmts=4&wgl=1&adsid=NT&dt=1592809597660&bpp=1&bdt=585&idt=111&shv=r20200610&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C240x600&nras=1&correlator=5086040042266&frm=20&pv=1&ga_vid=1551705021.1592809598&ga_sid=1592809598&ga_hid=1638320058&ga_fc=0&iag=0&icsg=1072862413717488&dssz=63&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1114&ady=1732&biw=1600&bih=1200&scr_x=0&scr_y=0&eid=42530499%2C42530501&oid=3&pvsid=793878086193699&pem=892&rx=0&eae=0&fc=1920&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=8336&bc=31&ifi=2&uci=a!2&btvi=1&fsb=1&xpc=GlbaUaMuFV&p=https%3A//nationalcybersecuritynews.today&dtd=116
Frame ID: 362DBF32821545444D122873863AC75C
Requests: 1 HTTP requests in this frame

Frame: https://tpc.googlesyndication.com/sodar/sodar2/210/runner.html
Frame ID: 5EA3FF32B9ADC290261C66F7276FEEDD
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers link /rel="https:\/\/api\.w\.org\/"/i
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • headers link /rel="https:\/\/api\.w\.org\/"/i
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • headers link /rel="https:\/\/api\.w\.org\/"/i
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • html /<!-- This site is optimized with the Yoast (?:WordPress )?SEO plugin v([\d.]+) -/i

Overall confidence: 100%
Detected patterns
  • script /googlesyndication\.com\//i

Overall confidence: 100%
Detected patterns
  • script /google-analytics\.com\/(?:ga|urchin|analytics)\.js/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Page Statistics

82
Requests

99 %
HTTPS

65 %
IPv6

15
Domains

21
Subdomains

17
IPs

2
Countries

1921 kB
Transfer

2534 kB
Size

17
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 66
  • https://www.youtube.com/embed/_xxX9KUPaR0?controls=0 HTTP 302
  • https://www.google.com/sorry/index?continue=https://www.youtube.com/embed/_xxX9KUPaR0%3Fcontrols%3D0&q=EhAqAQT4AZJUFAAAAAAAAAACGP2wwfcFIhkA8aeDS4VD2vqBmL3uS1XY7142Z6FVp1ovMgFy

82 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
49 KB
50 KB
Document
General
Full URL
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PHP/7.2.31 PleskLin
Resource Hash
95034ae664dde8a32aa41363a1a34c025e0aa69cc5f0e69d825260fe373ed67b

Request headers

:method
GET
:authority
nationalcybersecuritynews.today
:scheme
https
:path
/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
server
nginx
date
Mon, 22 Jun 2020 07:06:37 GMT
content-type
text/html; charset=UTF-8
x-powered-by
PHP/7.2.31 PleskLin
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate
pragma
no-cache
link
<https://nationalcybersecuritynews.today/wp-json/>; rel="https://api.w.org/", <https://nationalcybersecuritynews.today/?p=74861>; rel=shortlink
set-cookie
mc_session_ids[default]=b2a9109d3d2b1abea21bea199657ad96ef67ab6c; expires=Mon, 22-Jun-2020 07:11:36 GMT; Max-Age=300; path=/; secure; HttpOnly mc_session_ids[multi][0]=88bdf0e793669a7c78c1023474568676c50d163f; expires=Mon, 22-Jun-2020 07:11:36 GMT; Max-Age=300; path=/ mc_session_ids[multi][1]=15fdf6f872395adcaf7729dc12628c0ebc095307; expires=Mon, 22-Jun-2020 07:11:36 GMT; Max-Age=300; path=/ mc_session_ids[multi][2]=9cd28dceff81ea9adf7d941e063abe73b27452e2; expires=Mon, 22-Jun-2020 07:11:36 GMT; Max-Age=300; path=/ mc_session_ids[multi][3]=5933953e619cd091c6c143dd352147716e4c0382; expires=Mon, 22-Jun-2020 07:11:36 GMT; Max-Age=300; path=/ mc_session_ids[multi][4]=3eac643841b9c7347cb091433a2d01c3d34be06f; expires=Mon, 22-Jun-2020 07:11:36 GMT; Max-Age=300; path=/ PHPSESSID=4h25qcs2kujheqc7e3einab8ct; path=/
x-cache-status
BYPASS
new
d1oxsl77a1kjht.cloudfront.net/css/
0
91 KB
Other
General
Full URL
https://d1oxsl77a1kjht.cloudfront.net/css/new?hc=-623591501&ownerid=17483484&frontendV2=true
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2600:9000:2182:9000:1c:b536:2c40:21 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
content-encoding
gzip
x-amz-cf-pop
DUS51-C1
etag
"-623591501"
vary
Accept-Encoding
x-cache
Miss from cloudfront
content-type
text/css;charset=utf-8
status
200
cache-control
public, max-age=31536000
x-amz-cf-id
4-kHfKIPq7uPmYw0yhTOBIrnoOL5jHKvFBNDYTihoCkDMFDRoJehkQ==
via
1.1 bb45d9db269295920003af6514d7e7eb.cloudfront.net (CloudFront)
script.js
app.ecwid.com/
0
19 KB
Other
General
Full URL
https://app.ecwid.com/script.js?17483484&data_platform=wporg&lang=en
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.121.190.8 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-3-121-190-8.eu-central-1.compute.amazonaws.com
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 22 Jun 2020 07:06:37 GMT
Content-Encoding
gzip
Server
nginx
ETag
W/"-2079554765"
Vary
Accept-Encoding
Content-Type
text/javascript;charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Max-Age
600
Cache-Control
private,must-revalidate
Transfer-Encoding
chunked
Connection
keep-alive
Access-Control-Allow-Headers
Cache-Control,Pragma,Content-Type,X-GWT-Module-Base,X-GWT-Permutation,X-Ecwid-Xsrf-Token
style.min.css
c0.wp.com/c/5.4.2/wp-includes/css/dist/block-library/
52 KB
7 KB
Stylesheet
General
Full URL
https://c0.wp.com/c/5.4.2/wp-includes/css/dist/block-library/style.min.css
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.37 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
bca7af0b45b6fc6a2064e8e7a34f2041f3e77261e63f0257209bcde6bc40545d
Security Headers
Name Value
Strict-Transport-Security max-age=15552000

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Mon, 22 Jun 2020 07:06:37 GMT
content-encoding
br
last-modified
Fri, 24 Apr 2020 15:32:14 GMT
server
nginx
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=31536000
strict-transport-security
max-age=15552000
expires
Tue, 22 Jun 2021 07:06:37 GMT
blocks.style.build.css
nationalcybersecuritynews.today/wp-content/plugins/metronet-profile-picture/dist/
27 KB
27 KB
Stylesheet
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/metronet-profile-picture/dist/blocks.style.build.css?ver=2.3.11
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
57cd1d26474ce5b3da3a5167accb4460197ae0e15a10d99dabb3e0ac35510bfc

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5e869f7f-6c4b"
last-modified
Fri, 03 Apr 2020 02:29:19 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
text/css
status
200
accept-ranges
bytes
content-length
27723
styles.css
nationalcybersecuritynews.today/wp-content/plugins/contact-form-7/includes/css/
2 KB
2 KB
Stylesheet
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/contact-form-7/includes/css/styles.css?ver=5.1.9
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
811e8960b8f79f14983e30df80a4ccc69d82430ccc0520d2a1a3d1405cfbb2a1

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5ece7b0d-6d2"
last-modified
Wed, 27 May 2020 14:37:01 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
text/css
status
200
accept-ranges
bytes
content-length
1746
frontend.css
nationalcybersecuritynews.today/wp-content/plugins/ecwid-shopping-cart/css/
2 KB
2 KB
Stylesheet
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/ecwid-shopping-cart/css/frontend.css?ver=6.10.1
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
bd413072c7334cf30a6dcbcce667b5e8430a9aa3c7015554ef8f17b55a5c9b63

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5eee2d73-7e7"
last-modified
Sat, 20 Jun 2020 15:38:27 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
text/css
status
200
accept-ranges
bytes
content-length
2023
wp-automatic.css
nationalcybersecuritynews.today/wp-content/plugins/wp-automatic/css/
3 KB
3 KB
Stylesheet
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/wp-automatic/css/wp-automatic.css?ver=1.0.0
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
9d105532b10ffe64f4dd076d7dbb8784e3abfe6d1ec8fc26cfe13ec5684a408d

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5d8e6775-a99"
last-modified
Fri, 27 Sep 2019 19:48:05 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
text/css
status
200
accept-ranges
bytes
content-length
2713
frontend.css
nationalcybersecuritynews.today/wp-content/plugins/wp-math-captcha/css/
277 B
464 B
Stylesheet
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/wp-math-captcha/css/frontend.css?ver=5.4.2
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
b67941a710bc007120fa919bf7feebe922b2e8835ff033cb4ae578745eef93eb

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"115-5897e88967680"
last-modified
Wed, 22 May 2019 18:57:14 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
text/css
status
200
x-accel-version
0.01
accept-ranges
bytes
content-length
277
twitter-feed.css
nationalcybersecuritynews.today/wp-content/plugins/wp-to-twitter/css/
2 KB
2 KB
Stylesheet
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/wp-to-twitter/css/twitter-feed.css?ver=5.4.2
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
196b0d1013a5fb1985890e13453ab76df8bdcee3d57893e84afa3f3e58eacf52

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5dcb8c07-6ce"
last-modified
Wed, 13 Nov 2019 04:52:23 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
text/css
status
200
accept-ranges
bytes
content-length
1742
front-css.css
nationalcybersecuritynews.today/wp-content/plugins/weglot/dist/css/
52 KB
52 KB
Stylesheet
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/weglot/dist/css/front-css.css?ver=3.1.7
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
5f45e2b0f97b81810eee10d09a5b40b52eae39e1908e0a6ea4a31f03c10bdacc

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5eb4300e-cee7"
last-modified
Thu, 07 May 2020 15:58:06 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
text/css
status
200
accept-ranges
bytes
content-length
52967
css
fonts.googleapis.com/
4 KB
721 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Open%2BSans%3A400%2C300%2C300italic%2C400italic%2C600%2C600italic%2C700%2C700italic%7CMontserrat%3A400%2C700&subset=latin%2Clatin-ext
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
00838395cd8b377d7164786319e394a09e9002e048ecb8651c1d7ba94b2d65a0
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
status
200
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Mon, 22 Jun 2020 07:02:46 GMT
server
ESF
date
Mon, 22 Jun 2020 07:06:37 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Mon, 22 Jun 2020 07:06:37 GMT
font-awesome.min.css
nationalcybersecuritynews.today/wp-content/themes/screenr/assets/css/
29 KB
29 KB
Stylesheet
General
Full URL
https://nationalcybersecuritynews.today/wp-content/themes/screenr/assets/css/font-awesome.min.css?ver=4.0.0
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
c67ca54041c51331b75b44da9b0ef412c5c1d722ee1106050f7eeb4095c5866f

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5d8b8971-73a6"
last-modified
Wed, 25 Sep 2019 15:36:17 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
text/css
status
200
accept-ranges
bytes
content-length
29606
bootstrap.min.css
nationalcybersecuritynews.today/wp-content/themes/screenr/assets/css/
92 KB
92 KB
Stylesheet
General
Full URL
https://nationalcybersecuritynews.today/wp-content/themes/screenr/assets/css/bootstrap.min.css?ver=4.0.0
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
4c4519802eb6721387da56329f7184ed8157502962ad94f6c4f42cc7e0dc2888

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5d8b8971-16fb3"
last-modified
Wed, 25 Sep 2019 15:36:17 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
text/css
status
200
accept-ranges
bytes
content-length
94131
style.css
nationalcybersecuritynews.today/wp-content/themes/screenr/
101 KB
101 KB
Stylesheet
General
Full URL
https://nationalcybersecuritynews.today/wp-content/themes/screenr/style.css?ver=5.4.2
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
1414fb10728620ee9ca714e7e3645495c02abbc4622c8e867af3568294c30340

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5d8b8971-194b3"
last-modified
Wed, 25 Sep 2019 15:36:17 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
text/css
status
200
accept-ranges
bytes
content-length
103603
lightgallery.css
nationalcybersecuritynews.today/wp-content/themes/screenr/assets/css/
22 KB
23 KB
Stylesheet
General
Full URL
https://nationalcybersecuritynews.today/wp-content/themes/screenr/assets/css/lightgallery.css?ver=5.4.2
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
e79408dc99b88a70fbe13a0f2a3767d61e16640a9c8e4cc97d473783a1e07477

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5d8b8971-5960"
last-modified
Wed, 25 Sep 2019 15:36:17 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
text/css
status
200
accept-ranges
bytes
content-length
22880
screenr-plus.css
nationalcybersecuritynews.today/wp-content/plugins/screenr-plus/
18 KB
18 KB
Stylesheet
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/screenr-plus/screenr-plus.css?ver=5.4.2
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
91491278cf6948165f8271e621e06548f6d4fa2baa04807e493e638ebedf515d

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5ce5970c-47ca"
last-modified
Wed, 22 May 2019 18:38:04 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
text/css
status
200
accept-ranges
bytes
content-length
18378
jetpack.css
c0.wp.com/p/jetpack/8.6.1/css/
73 KB
12 KB
Stylesheet
General
Full URL
https://c0.wp.com/p/jetpack/8.6.1/css/jetpack.css
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.37 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
7002bd7e9131ec2b5d12c24a2cc181f046f5237addf358a93921055d3eda73a9
Security Headers
Name Value
Strict-Transport-Security max-age=15552000

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Mon, 22 Jun 2020 07:06:37 GMT
content-encoding
br
last-modified
Mon, 01 Jun 2020 14:24:36 GMT
server
nginx
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=31536000
strict-transport-security
max-age=15552000
expires
Tue, 22 Jun 2021 07:06:37 GMT
jquery.js
c0.wp.com/c/5.4.2/wp-includes/js/jquery/
95 KB
32 KB
Script
General
Full URL
https://c0.wp.com/c/5.4.2/wp-includes/js/jquery/jquery.js
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.37 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
1db21d816296e6939ba1f42962496e4134ae2b0081e26970864c40c6d02bb1df
Security Headers
Name Value
Strict-Transport-Security max-age=15552000

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Mon, 22 Jun 2020 07:06:37 GMT
content-encoding
br
last-modified
Fri, 17 May 2019 04:25:54 GMT
server
nginx
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=31536000
strict-transport-security
max-age=15552000
expires
Tue, 22 Jun 2021 07:06:37 GMT
jquery-migrate.min.js
c0.wp.com/c/5.4.2/wp-includes/js/jquery/
10 KB
4 KB
Script
General
Full URL
https://c0.wp.com/c/5.4.2/wp-includes/js/jquery/jquery-migrate.min.js
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.37 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
48eb8b500ae6a38617b5738d2b3faec481922a7782246e31d2755c034a45cd5d
Security Headers
Name Value
Strict-Transport-Security max-age=15552000

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Mon, 22 Jun 2020 07:06:37 GMT
content-encoding
br
last-modified
Fri, 20 May 2016 06:11:28 GMT
server
nginx
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=31536000
strict-transport-security
max-age=15552000
expires
Tue, 22 Jun 2021 07:06:37 GMT
frontend.js
nationalcybersecuritynews.today/wp-content/plugins/ecwid-shopping-cart/js/
2 KB
2 KB
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/ecwid-shopping-cart/js/frontend.js?ver=6.10.1
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
0b2616dc0ed3aaded1f8d884a8c0400d12a3e9b68eeb2c006215c2a642dbce5c

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5eee2d73-799"
last-modified
Sat, 20 Jun 2020 15:38:27 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
1945
main-front.js
nationalcybersecuritynews.today/wp-content/plugins/wp-automatic/js/
888 B
1 KB
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/wp-automatic/js/main-front.js?ver=5.4.2
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
935dab74871e52fa1c7d7a963f793fdb9b04da01f0b2a762dab146eca5e37b2c

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"378-5938e2a304980"
last-modified
Fri, 27 Sep 2019 19:48:06 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
x-accel-version
0.01
accept-ranges
bytes
content-length
888
front-js.js
nationalcybersecuritynews.today/wp-content/plugins/weglot/dist/
2 KB
2 KB
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/weglot/dist/front-js.js?ver=3.1.7
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
a2005c499ac54953aa518b98f0bb11f6faa5ce155dce47f921da536d19501d85

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5eb4300e-61c"
last-modified
Thu, 07 May 2020 15:58:06 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
1564
js
www.googletagmanager.com/gtag/
83 KB
33 KB
Script
General
Full URL
https://www.googletagmanager.com/gtag/js?id=UA-161795647-2
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:802::2008 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Google Tag Manager /
Resource Hash
df0bbf3b774d89fb68ce4f2b7c72d63d5aabe5bd02e9cbc98e40dbd08dd07321
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Xss-Protection 0

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
content-encoding
br
vary
Accept-Encoding
status
200
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
33269
x-xss-protection
0
last-modified
Mon, 22 Jun 2020 06:00:00 GMT
server
Google Tag Manager
strict-transport-security
max-age=31536000; includeSubDomains
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
private, max-age=900
access-control-allow-credentials
true
access-control-allow-headers
Cache-Control
expires
Mon, 22 Jun 2020 07:06:37 GMT
usp-pro.js
nationalcybersecuritynews.today/wp-content/plugins/usp-pro/js/
14 KB
14 KB
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/usp-pro/js/usp-pro.js?ver=2.6.1
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
456ecccc650674cef3ad755a98250f964ed2f9a3a6a81e1b24b7a6680aec9191

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5ce59868-3753"
last-modified
Wed, 22 May 2019 18:43:52 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
14163
adsbygoogle.js
pagead2.googlesyndication.com/pagead/js/
109 KB
40 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
1b3488c5229b6b75ba2a17750057d508624015aadd7d6e5520ff4c4941788589
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
h3-28="googleads.g.doubleclick.net:443"; ma=2592000,h3-28=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
40249
x-xss-protection
0
server
cafe
etag
5565749476450609608
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=3600
timing-allow-origin
*
expires
Mon, 22 Jun 2020 07:06:37 GMT
intl-tel-input.min.css
nationalcybersecuritynews.today/wp-content/plugins/wpforms/pro/assets/css/vendor/
80 KB
80 KB
Stylesheet
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/wpforms/pro/assets/css/vendor/intl-tel-input.min.css?ver=16.0.8
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
c9007e4822ba6beda19e5b565526e6f9548ba6122665db4c177eb4b98bb3dee2

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5e60c607-13f88"
last-modified
Thu, 05 Mar 2020 09:27:35 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
text/css
status
200
accept-ranges
bytes
content-length
81800
dropzone.min.css
nationalcybersecuritynews.today/wp-content/plugins/wpforms/pro/assets/css/
6 KB
6 KB
Stylesheet
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/wpforms/pro/assets/css/dropzone.min.css?ver=5.5.0
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
92e8d1abe8f78caf2a1d699c3a97ff0df2a2a85760ba1f292398b7c3a280d5d0

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5e60c607-164b"
last-modified
Thu, 05 Mar 2020 09:27:35 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
text/css
status
200
accept-ranges
bytes
content-length
5707
jquery.timepicker.css
nationalcybersecuritynews.today/wp-content/plugins/wpforms/assets/css/
1 KB
2 KB
Stylesheet
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/wpforms/assets/css/jquery.timepicker.css?ver=1.11.5
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
cb450f20183b467cf163e0283c7eb98c99c4fd63f49bf195b25a8f94f27a4f0b

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5e60c607-5da"
last-modified
Thu, 05 Mar 2020 09:27:35 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
text/css
status
200
accept-ranges
bytes
content-length
1498
flatpickr.min.css
nationalcybersecuritynews.today/wp-content/plugins/wpforms/assets/css/
15 KB
15 KB
Stylesheet
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/wpforms/assets/css/flatpickr.min.css?ver=4.5.5
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
4d08a7edb918de7effafe10ca48b8d65b384e58ef0c77314a4f2aa37c418f769

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5e60c607-3b1c"
last-modified
Thu, 05 Mar 2020 09:27:35 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
text/css
status
200
accept-ranges
bytes
content-length
15132
wpforms-full.css
nationalcybersecuritynews.today/wp-content/plugins/wpforms/assets/css/
43 KB
43 KB
Stylesheet
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/wpforms/assets/css/wpforms-full.css?ver=1.5.9
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
f9b25c303126f1cb182aa1ea287a9189018a085b502c933c6a6bdec8a569297f

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5e60c607-abce"
last-modified
Thu, 05 Mar 2020 09:27:35 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
text/css
status
200
accept-ranges
bytes
content-length
43982
photon.min.js
c0.wp.com/p/jetpack/8.6.1/_inc/build/photon/
758 B
422 B
Script
General
Full URL
https://c0.wp.com/p/jetpack/8.6.1/_inc/build/photon/photon.min.js
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.37 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
e1b0066bc1972444c0a15e1778be06ed7bf36c55d597c065b5e79041bcda291e
Security Headers
Name Value
Strict-Transport-Security max-age=15552000

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Mon, 22 Jun 2020 07:06:37 GMT
content-encoding
br
last-modified
Tue, 31 Mar 2020 17:26:38 GMT
server
nginx
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=31536000
strict-transport-security
max-age=15552000
expires
Tue, 22 Jun 2021 07:06:37 GMT
mpp-frontend.js
nationalcybersecuritynews.today/wp-content/plugins/metronet-profile-picture/js/
331 B
528 B
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/metronet-profile-picture/js/mpp-frontend.js?ver=2.3.11
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
b695f4e09490004246d228e02338f9d3c4591273e1f35bb0ebe63607c860e608

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"14b-5a259af46cd10"
last-modified
Fri, 03 Apr 2020 02:29:19 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
x-accel-version
0.01
accept-ranges
bytes
content-length
331
scripts.js
nationalcybersecuritynews.today/wp-content/plugins/contact-form-7/includes/js/
14 KB
14 KB
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=5.1.9
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
72ebfeb1ce24b152349b7a231f6fc29ff2a2b7a5ede91dcdb80d6b9de1779046

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5ece7b0d-3923"
last-modified
Wed, 27 May 2020 14:37:01 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
14627
widget.min.js
c0.wp.com/c/5.4.2/wp-includes/js/jquery/ui/
7 KB
2 KB
Script
General
Full URL
https://c0.wp.com/c/5.4.2/wp-includes/js/jquery/ui/widget.min.js
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.37 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
2cd83d5a29914ad4797748d8e80fbc42c2131fbce9bbcdf2749a275fc7db875f
Security Headers
Name Value
Strict-Transport-Security max-age=15552000

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Mon, 22 Jun 2020 07:06:37 GMT
content-encoding
br
last-modified
Sat, 05 Oct 2019 22:01:04 GMT
server
nginx
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=31536000
strict-transport-security
max-age=15552000
expires
Tue, 22 Jun 2021 07:06:37 GMT
plugins.js
nationalcybersecuritynews.today/wp-content/themes/screenr/assets/js/
150 KB
151 KB
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-content/themes/screenr/assets/js/plugins.js?ver=4.0.0
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
287b1e324185bf2b60fed9ea438f64f2e15a5e3840ebd6bf1272b142d887848e

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5d8b8971-258b5"
last-modified
Wed, 25 Sep 2019 15:36:17 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
153781
bootstrap.min.js
nationalcybersecuritynews.today/wp-content/themes/screenr/assets/js/
44 KB
44 KB
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-content/themes/screenr/assets/js/bootstrap.min.js?ver=4.0.0
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
29545a8141a37facb6f3b5deb711cd2de4e20037ccd1b5f131b2f735860d41af

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5d8b8971-aef1"
last-modified
Wed, 25 Sep 2019 15:36:17 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
44785
theme.js
nationalcybersecuritynews.today/wp-content/themes/screenr/assets/js/
32 KB
32 KB
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-content/themes/screenr/assets/js/theme.js?ver=20120206
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
217c7164e35e769da6b388ba983aaf3b6ce170f2ccd3ab410a3a82dfc531d082

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5d8b8971-7efb"
last-modified
Wed, 25 Sep 2019 15:36:17 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
32507
comment-reply.min.js
c0.wp.com/c/5.4.2/wp-includes/js/
2 KB
1 KB
Script
General
Full URL
https://c0.wp.com/c/5.4.2/wp-includes/js/comment-reply.min.js
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.37 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
a37ca4608218cccdfb8b6d4edbdfbf375d0e1368b46397e3b7049e0cbf5bc1f6
Security Headers
Name Value
Strict-Transport-Security max-age=15552000

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Mon, 22 Jun 2020 07:06:37 GMT
content-encoding
br
last-modified
Mon, 11 Nov 2019 11:51:03 GMT
server
nginx
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=31536000
strict-transport-security
max-age=15552000
expires
Tue, 22 Jun 2021 07:06:37 GMT
lazy-images.min.js
c0.wp.com/p/jetpack/8.6.1/_inc/build/lazy-images/js/
9 KB
3 KB
Script
General
Full URL
https://c0.wp.com/p/jetpack/8.6.1/_inc/build/lazy-images/js/lazy-images.min.js
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.37 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
a23dec87ea93f923ebe233e63f7c43d1a130ccf1578d97ea758157aae6d108e3
Security Headers
Name Value
Strict-Transport-Security max-age=15552000

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Mon, 22 Jun 2020 07:06:37 GMT
content-encoding
br
last-modified
Tue, 31 Mar 2020 17:26:38 GMT
server
nginx
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=31536000
strict-transport-security
max-age=15552000
expires
Tue, 22 Jun 2021 07:06:37 GMT
screenr-plus.js
nationalcybersecuritynews.today/wp-content/plugins/screenr-plus/assets/js/
9 KB
9 KB
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/screenr-plus/assets/js/screenr-plus.js?ver=1.0.6
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
aef43a8102c4b372829356f3fb265a6138789e296f686f588bf9b1675c6f4af3

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5ce59714-244a"
last-modified
Wed, 22 May 2019 18:38:12 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
9290
wp-embed.min.js
c0.wp.com/c/5.4.2/wp-includes/js/
1 KB
721 B
Script
General
Full URL
https://c0.wp.com/c/5.4.2/wp-includes/js/wp-embed.min.js
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.37 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
6ebcda7a3a41ef97f0b4071160ceb1020e540fdc0f790079a5c2ef01ab654fe0
Security Headers
Name Value
Strict-Transport-Security max-age=15552000

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Mon, 22 Jun 2020 07:06:37 GMT
content-encoding
br
last-modified
Sat, 26 Oct 2019 00:17:07 GMT
server
nginx
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=31536000
strict-transport-security
max-age=15552000
expires
Tue, 22 Jun 2021 07:06:37 GMT
wpforms-conditional-logic-fields.js
nationalcybersecuritynews.today/wp-content/plugins/wpforms/pro/assets/js/
11 KB
12 KB
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/wpforms/pro/assets/js/wpforms-conditional-logic-fields.js?ver=1.5.9
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
e295b22cffb805a85b6279fd188d749fb3a20b3057a3db6a5acd8b84a83c5cf0

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5e60c607-2de2"
last-modified
Thu, 05 Mar 2020 09:27:35 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
11746
jquery.intl-tel-input.min.js
nationalcybersecuritynews.today/wp-content/plugins/wpforms/pro/assets/js/vendor/
28 KB
28 KB
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/wpforms/pro/assets/js/vendor/jquery.intl-tel-input.min.js?ver=16.0.8
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
1ecb6f95059703c992766b3b3ceef6c17b31e3a5c648343e069d637b746933d8

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5e60c607-7134"
last-modified
Thu, 05 Mar 2020 09:27:35 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
28980
dropzone.min.js
nationalcybersecuritynews.today/wp-content/plugins/wpforms/pro/assets/js/vendor/
41 KB
42 KB
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/wpforms/pro/assets/js/vendor/dropzone.min.js?ver=5.5.0
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
451d9be719b01f68cc38696d597e1d258a7af3c0168fb18ee6b03b38e74ebfe1

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5e60c607-a5e0"
last-modified
Thu, 05 Mar 2020 09:27:35 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
42464
underscore.min.js
c0.wp.com/c/5.4.2/wp-includes/js/
16 KB
6 KB
Script
General
Full URL
https://c0.wp.com/c/5.4.2/wp-includes/js/underscore.min.js
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.37 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
7b5fc275c98a58b1073a713920cefa54fab60ad9d85a67cf6907aaf8fbb3c474
Security Headers
Name Value
Strict-Transport-Security max-age=15552000

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Mon, 22 Jun 2020 07:06:37 GMT
content-encoding
br
last-modified
Sat, 26 Oct 2019 00:17:07 GMT
server
nginx
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=31536000
strict-transport-security
max-age=15552000
expires
Tue, 22 Jun 2021 07:06:37 GMT
wp-util.min.js
c0.wp.com/c/5.4.2/wp-includes/js/
1 KB
571 B
Script
General
Full URL
https://c0.wp.com/c/5.4.2/wp-includes/js/wp-util.min.js
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.37 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
wordpress.com
Software
nginx /
Resource Hash
622bd29e595894b02f5c5ab95628f99d6e6d46483bac342b4fff38bbc64a8a35
Security Headers
Name Value
Strict-Transport-Security max-age=15552000

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-nc
HIT fra 2
date
Mon, 22 Jun 2020 07:06:37 GMT
content-encoding
br
last-modified
Sat, 26 Oct 2019 00:17:07 GMT
server
nginx
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=31536000
strict-transport-security
max-age=15552000
expires
Tue, 22 Jun 2021 07:06:37 GMT
wpforms-file-upload.min.js
nationalcybersecuritynews.today/wp-content/plugins/wpforms/pro/assets/js/
4 KB
5 KB
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/wpforms/pro/assets/js/wpforms-file-upload.min.js?ver=1.5.9
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
996d58a466adf24774bdf0b9a939c5f72bd92687c7b45c496bdbf1f1ec109f61

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5e60c607-11dc"
last-modified
Thu, 05 Mar 2020 09:27:35 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
4572
jquery.validate.min.js
nationalcybersecuritynews.today/wp-content/plugins/wpforms/assets/js/
24 KB
24 KB
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/wpforms/assets/js/jquery.validate.min.js?ver=1.19.0
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
6eefc13f4d9832e74173dea423bca495ceb7f4cbb888a19434d71a9bc0f69cb7

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5e60c607-5f30"
last-modified
Thu, 05 Mar 2020 09:27:35 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
24368
flatpickr.min.js
nationalcybersecuritynews.today/wp-content/plugins/wpforms/assets/js/
45 KB
45 KB
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/wpforms/assets/js/flatpickr.min.js?ver=4.5.5
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
f4f1c03884cbdbb064734b8116877236bb52ebca1f427555dbb94ace1d5c6de3

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5e60c607-b4c7"
last-modified
Thu, 05 Mar 2020 09:27:35 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
46279
jquery.timepicker.min.js
nationalcybersecuritynews.today/wp-content/plugins/wpforms/assets/js/
15 KB
15 KB
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/wpforms/assets/js/jquery.timepicker.min.js?ver=1.11.5
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
c89abf70364f007b654195d3b9778c66edb0c88974196d61f1786a0bfe816a3b

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5e60c607-3bc1"
last-modified
Thu, 05 Mar 2020 09:27:35 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
15297
jquery.inputmask.bundle.min.js
nationalcybersecuritynews.today/wp-content/plugins/wpforms/assets/js/
113 KB
113 KB
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/wpforms/assets/js/jquery.inputmask.bundle.min.js?ver=4.0.6
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
778d7ae41387c39e3f6c6d725a12678136c37e91c715f63d124dbcf23dda3dc6

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5e60c607-1c2f5"
last-modified
Thu, 05 Mar 2020 09:27:35 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
115445
mailcheck.min.js
nationalcybersecuritynews.today/wp-content/plugins/wpforms/assets/js/
4 KB
4 KB
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/wpforms/assets/js/mailcheck.min.js?ver=1.1.2
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
8a3820962c15d26c4cdc9eff4f8c66ed29f96e353b7893285cb14962d6a6956d

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5e60c607-fae"
last-modified
Thu, 05 Mar 2020 09:27:35 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
4014
jquery.payment.min.js
nationalcybersecuritynews.today/wp-content/plugins/wpforms/assets/js/
8 KB
8 KB
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/wpforms/assets/js/jquery.payment.min.js?ver=1.5.9
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
4023e81ca6b32d7263da7ee7222ba1eaac5ad1de6bdf7a3da51341f1fd58bbf4

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5e60c607-2108"
last-modified
Thu, 05 Mar 2020 09:27:35 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
8456
wpforms.js
nationalcybersecuritynews.today/wp-content/plugins/wpforms/assets/js/
52 KB
52 KB
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-content/plugins/wpforms/assets/js/wpforms.js?ver=1.5.9
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
f07aa703c63650b39ac7bd5278e4031e07265e4376c4d6927a01c1d278cd1f2c

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5e60c607-cffb"
last-modified
Thu, 05 Mar 2020 09:27:35 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
53243
api.js
www.google.com/recaptcha/
739 B
561 B
Script
General
Full URL
https://www.google.com/recaptcha/api.js?onload=wpformsRecaptchaLoad&render=explicit
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
f0be343586eec189bc4b86b5c20c044844a28d2bd74cb97bd67d70a640d5f01b
Security Headers
Name Value
Content-Security-Policy frame-ancestors 'self'
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
GSE
x-frame-options
SAMEORIGIN
content-type
text/javascript; charset=UTF-8
status
200
cache-control
private, max-age=300
content-security-policy
frame-ancestors 'self'
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
470
x-xss-protection
1; mode=block
expires
Mon, 22 Jun 2020 07:06:37 GMT
e-202026.js
stats.wp.com/
9 KB
3 KB
Script
General
Full URL
https://stats.wp.com/e-202026.js
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.76.3 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
0ebbc7fba9a50d36ef5422345f624431710db4528f25749d1d438c2c10bb69f2

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
content-encoding
gzip
server
nginx
etag
W/"5c6340e3-350a"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=31536000
expires
Mon, 07 Jun 2021 02:29:17 GMT
wp-emoji-release.min.js
nationalcybersecuritynews.today/wp-includes/js/
14 KB
14 KB
Script
General
Full URL
https://nationalcybersecuritynews.today/wp-includes/js/wp-emoji-release.min.js?ver=5.4.2
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
96d33f532112177ede6bf262dcf6d0140dbe29f05a4595d17b0be4743205b5ea

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5e84ee0f-364d"
last-modified
Wed, 01 Apr 2020 19:39:59 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
13901
analytics.js
www.google-analytics.com/
45 KB
18 KB
Script
General
Full URL
https://www.google-analytics.com/analytics.js
Requested by
Host: www.googletagmanager.com
URL: https://www.googletagmanager.com/gtag/js?id=UA-161795647-2
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:802::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
fd361b57998c76f86335afa28b8a62527d88a8200fb5c428d6f0fff73383e955
Security Headers
Name Value
Strict-Transport-Security max-age=10886400; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

strict-transport-security
max-age=10886400; includeSubDomains; preload
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Thu, 04 Jun 2020 23:38:14 GMT
server
Golfe2
age
618
date
Mon, 22 Jun 2020 06:56:19 GMT
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=7200
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
18469
expires
Mon, 22 Jun 2020 08:56:19 GMT
_xxX9KUPaR0
www.youtube.com/embed/ Frame A443
0
0

truncated
/
42 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/gif
pisystem.jpg
i2.wp.com/nationalcybersecuritynews.today/wp-content/uploads/2020/06/
76 KB
76 KB
Image
General
Full URL
https://i2.wp.com/nationalcybersecuritynews.today/wp-content/uploads/2020/06/pisystem.jpg?fit=1000%2C692&ssl=1
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.2 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
i0.wp.com
Software
nginx /
Resource Hash
90c8ff3276fa57a7f67087cb0cb1659f3a413abe585a6b655b39d1b092256411
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-nc
MISS fra 1
date
Mon, 22 Jun 2020 07:06:37 GMT
x-content-type-options
nosniff
x-bytes-saved
151893
last-modified
Mon, 22 Jun 2020 07:06:37 GMT
server
nginx
etag
"3c1d1cb42a2ce054"
vary
Accept
content-type
image/webp
status
200
cache-control
public, max-age=63115200
link
<https://nationalcybersecuritynews.today/wp-content/uploads/2020/06/pisystem.jpg>; rel="canonical"
content-length
77752
expires
Wed, 22 Jun 2022 19:06:37 GMT
JTURjIg1_i6t8kCHKm45_dJE3gnD_vx3rCs.woff2
fonts.gstatic.com/s/montserrat/v14/
13 KB
13 KB
Font
General
Full URL
https://fonts.gstatic.com/s/montserrat/v14/JTURjIg1_i6t8kCHKm45_dJE3gnD_vx3rCs.woff2
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
4c6cf0709b8e52572cae1fb57128acd0a5a453c9ce99dc3712a1860ff90c6bf8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open%2BSans%3A400%2C300%2C300italic%2C400italic%2C600%2C600italic%2C700%2C700italic%7CMontserrat%3A400%2C700&subset=latin%2Clatin-ext
Origin
https://nationalcybersecuritynews.today

Response headers

date
Fri, 12 Jun 2020 00:31:20 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 03:47:06 GMT
server
sffe
age
887717
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
13612
x-xss-protection
0
expires
Sat, 12 Jun 2021 00:31:20 GMT
fontawesome-webfont.woff2
nationalcybersecuritynews.today/wp-content/themes/screenr/assets/css/fonts/
70 KB
70 KB
Font
General
Full URL
https://nationalcybersecuritynews.today/wp-content/themes/screenr/assets/css/fonts/fontawesome-webfont.woff2?v=4.6.1
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
87.106.192.188 , Germany, ASN8560 (ONEANDONE-AS Brauerstrasse 48, DE),
Reverse DNS
mail.nationalcybersecurityuniversity.net
Software
nginx / PleskLin
Resource Hash
2932abf996373e87fbf2e950876b1962f1b57db954a1643ea68831d9fbb74da4

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://nationalcybersecuritynews.today/wp-content/themes/screenr/assets/css/font-awesome.min.css?ver=4.0.0
Origin
https://nationalcybersecuritynews.today

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
etag
"5d8b8971-11850"
last-modified
Wed, 25 Sep 2019 15:36:17 GMT
server
nginx
x-powered-by
PleskLin
x-cache-status
BYPASS
content-type
font/woff2
status
200
accept-ranges
bytes
content-length
71760
JTUSjIg1_i6t8kCHKm459WlhyyTh89Y.woff2
fonts.gstatic.com/s/montserrat/v14/
13 KB
13 KB
Font
General
Full URL
https://fonts.gstatic.com/s/montserrat/v14/JTUSjIg1_i6t8kCHKm459WlhyyTh89Y.woff2
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:821::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
0ce5a460ace775560c3344a43245687bdbec5cb8ee20d209ab9fa67f4e09a3e8
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://fonts.googleapis.com/css?family=Open%2BSans%3A400%2C300%2C300italic%2C400italic%2C600%2C600italic%2C700%2C700italic%7CMontserrat%3A400%2C700&subset=latin%2Clatin-ext
Origin
https://nationalcybersecuritynews.today

Response headers

date
Fri, 12 Jun 2020 00:14:43 GMT
x-content-type-options
nosniff
last-modified
Tue, 23 Jul 2019 03:46:48 GMT
server
sffe
age
888714
status
200
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
13708
x-xss-protection
0
expires
Sat, 12 Jun 2021 00:14:43 GMT
offsiteplayer
percolate.blogtalkradio.com/ Frame 8951
0
0
Document
General
Full URL
https://percolate.blogtalkradio.com/offsiteplayer?hostId=147156
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.226.154.51 Seattle, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-226-154-51.dus51.r.cloudfront.net
Software
Microsoft-IIS/8.5 btr-brk-www-13 / ASP.NET
Resource Hash

Request headers

:method
GET
:authority
percolate.blogtalkradio.com
:scheme
https
:path
/offsiteplayer?hostId=147156
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/

Response headers

status
200
content-type
text/html; charset=utf-8
vary
Accept-Encoding
date
Mon, 22 Jun 2020 07:06:37 GMT
cache-control
no-cache, no-store, must-revalidate
pragma
no-cache
expires
-1
server
Microsoft-IIS/8.5 btr-brk-www-13
set-cookie
_initReferrer=_initReferrer=https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/; domain=.blogtalkradio.com; expires=Sun, 22-Jun-2025 07:06:37 GMT; path=/ BTRAnon=2jaNgvV-1gEkAAAAYzEwZmFjN2UtZDc0MS00NzVlLWFhZWQtMjhmNTc4MDgzZWIwFgQ7bqolvUBsHfg6rB0fBDdfkEM1; domain=.blogtalkradio.com; expires=Sun, 30-Aug-2020 17:46:37 GMT; path=/; HttpOnly ASP.NET_SessionId=colx3sq2f51px5qil5qvxgju; domain=.blogtalkradio.com; path=/; HttpOnly BTRListenGUID=b99160d7-89c1-40a0-8a3b-cd2669abc4f3; domain=.blogtalkradio.com; expires=Wed, 22-Jul-2020 07:06:37 GMT; path=/ User=prem=False&wasprem=False&uID=&hID=0&url=&hpUrl=https%3a%2f%2fdasg7xwmldix6.cloudfront.net%2fhostpics%2fthumbs%2fno_image_20190218.jpg&name=&hasRem=False&cacheB=2E50&dstud=true; domain=.blogtalkradio.com; expires=Mon, 22-Jun-2020 10:06:37 GMT; path=/
x-aspnetmvc-version
5.2
access-control-allow-origin
*
x-powered-by
ASP.NET
content-encoding
gzip
x-cache
Miss from cloudfront
via
1.1 9e627a2e7bf673974b02e3bf374bb843.cloudfront.net (CloudFront)
x-amz-cf-pop
DUS51-C1
x-amz-cf-id
gMqTM45uFcLQ6YVLJU-yVuXcYBauN-vM7l3fYq8wNIML51L4ZGxHEQ==
recaptcha__en.js
www.gstatic.com/recaptcha/releases/oqtdXEs9TE9ZUAIhXNz5JBt_/
316 KB
124 KB
Script
General
Full URL
https://www.gstatic.com/recaptcha/releases/oqtdXEs9TE9ZUAIhXNz5JBt_/recaptcha__en.js
Requested by
Host: www.google.com
URL: https://www.google.com/recaptcha/api.js?onload=wpformsRecaptchaLoad&render=explicit
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
1262f412b65c8556101d256ab8b47e8e3d958826d190b3d2613b5bc3ebf8c2e2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 15 Jun 2020 16:42:49 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 15 Jun 2020 04:05:48 GMT
server
sffe
age
570228
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
public, max-age=31536000
accept-ranges
bytes
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
127301
x-xss-protection
0
expires
Tue, 15 Jun 2021 16:42:49 GMT
index
www.google.com/sorry/ Frame 1588
Redirect Chain
  • https://www.youtube.com/embed/_xxX9KUPaR0?controls=0
  • https://www.google.com/sorry/index?continue=https://www.youtube.com/embed/_xxX9KUPaR0%3Fcontrols%3D0&q=EhAqAQT4AZJUFAAAAAAAAAACGP2wwfcFIhkA8aeDS4VD2vqBmL3uS1XY7142Z6FVp1ovMgFy
0
0
Document
General
Full URL
https://www.google.com/sorry/index?continue=https://www.youtube.com/embed/_xxX9KUPaR0%3Fcontrols%3D0&q=EhAqAQT4AZJUFAAAAAAAAAACGP2wwfcFIhkA8aeDS4VD2vqBmL3uS1XY7142Z6FVp1ovMgFy
Requested by
Host: c0.wp.com
URL: https://c0.wp.com/c/5.4.2/wp-includes/js/jquery/jquery.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:825::2004 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
HTTP server (unknown) /
Resource Hash
Security Headers
Name Value
X-Xss-Protection 0

Request headers

:method
GET
:authority
www.google.com
:scheme
https
:path
/sorry/index?continue=https://www.youtube.com/embed/_xxX9KUPaR0%3Fcontrols%3D0&q=EhAqAQT4AZJUFAAAAAAAAAACGP2wwfcFIhkA8aeDS4VD2vqBmL3uS1XY7142Z6FVp1ovMgFy
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/

Response headers

status
429
date
Mon, 22 Jun 2020 07:06:37 GMT
pragma
no-cache
expires
Fri, 01 Jan 1990 00:00:00 GMT
cache-control
no-store, no-cache, must-revalidate
content-type
text/html
server
HTTP server (unknown)
content-length
2910
x-xss-protection
0
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"

Redirect headers

status
302
location
https://www.google.com/sorry/index?continue=https://www.youtube.com/embed/_xxX9KUPaR0%3Fcontrols%3D0&q=EhAqAQT4AZJUFAAAAAAAAAACGP2wwfcFIhkA8aeDS4VD2vqBmL3uS1XY7142Z6FVp1ovMgFy
date
Mon, 22 Jun 2020 07:06:37 GMT
pragma
no-cache
expires
Fri, 01 Jan 1990 00:00:00 GMT
cache-control
no-store, no-cache, must-revalidate
content-type
text/html; charset=UTF-8
server
HTTP server (unknown)
content-length
376
x-xss-protection
0
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
pisystem.jpg
i2.wp.com/nationalcybersecuritynews.today/wp-content/uploads/2020/06/
45 KB
45 KB
Image
General
Full URL
https://i2.wp.com/nationalcybersecuritynews.today/wp-content/uploads/2020/06/pisystem.jpg?resize=790%2C400&ssl=1
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.77.2 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
i0.wp.com
Software
nginx /
Resource Hash
4a39a98c6b2d244127eafbcffd8b64fffa5bec04c1c3deb9c89f62b083a25dbf
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

x-nc
MISS fra 1
date
Mon, 22 Jun 2020 07:06:37 GMT
x-content-type-options
nosniff
x-bytes-saved
38114
last-modified
Mon, 22 Jun 2020 07:06:37 GMT
server
nginx
etag
"0c8b68f493868126"
vary
Accept
content-type
image/webp
status
200
cache-control
public, max-age=63115200
link
<https://nationalcybersecuritynews.today/wp-content/uploads/2020/06/pisystem.jpg>; rel="canonical"
content-length
46124
expires
Wed, 22 Jun 2022 19:06:37 GMT
collect
www.google-analytics.com/r/
35 B
98 B
Image
General
Full URL
https://www.google-analytics.com/r/collect?v=1&_v=j83&aip=1&a=1638320058&t=pageview&_s=1&dl=https%3A%2F%2Fnationalcybersecuritynews.today%2Fvulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities%2F&ul=en-us&de=UTF-8&dt=Vulnerable%20platform%20used%20in%20power%20plants%20enables%20attackers%20to%20run%20malicious%20code%20on%20user%20browsers%20%7C%20%23exploits%20%7C%20%23vulnverabilities%20-&sd=24-bit&sr=1600x1200&vp=1600x1200&je=0&_u=IEBAAUAB~&jid=941530734&gjid=1649669751&cid=1551705021.1592809598&tid=UA-161795647-2&_gid=1625370824.1592809598&_r=1&gtm=2ou6a0&z=1492063691
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:802::200e Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
Golfe2 /
Resource Hash
8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 22 Jun 2020 07:06:37 GMT
x-content-type-options
nosniff
last-modified
Sun, 17 May 1998 03:00:00 GMT
server
Golfe2
status
200
content-type
image/gif
access-control-allow-origin
*
cache-control
no-cache, no-store, must-revalidate
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
35
expires
Fri, 01 Jan 1990 00:00:00 GMT
g.gif
pixel.wp.com/
50 B
92 B
Image
General
Full URL
https://pixel.wp.com/g.gif?v=ext&j=1%3A8.6.1&blog=174601480&post=74861&tz=0&srv=nationalcybersecuritynews.today&host=nationalcybersecuritynews.today&ref=&fcp=1802&rand=0.3785871064494577
Requested by
Host: nationalcybersecuritynews.today
URL: https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
192.0.76.3 San Francisco, United States, ASN2635 (AUTOMATTIC, US),
Reverse DNS
Software
nginx /
Resource Hash
f3a8992acb9ab911e0fa4ae12f4b85ef8e61008619f13ee51c7a121ff87f63b1

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
date
Mon, 22 Jun 2020 07:06:37 GMT
cache-control
no-cache
server
nginx
content-length
50
content-type
image/gif
integrator.js
adservice.google.de/adsid/
109 B
1009 B
Script
General
Full URL
https://adservice.google.de/adsid/integrator.js?domain=nationalcybersecuritynews.today
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Mon, 22 Jun 2020 07:06:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-28="googleads.g.doubleclick.net:443"; ma=2592000,h3-28=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
104
x-xss-protection
0
integrator.js
adservice.google.com/adsid/
109 B
1009 B
Script
General
Full URL
https://adservice.google.com/adsid/integrator.js?domain=nationalcybersecuritynews.today
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
0482a98d09daebc18a0d2e1ed8f748da5b0179e61223ed541101df1f4699f073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Mon, 22 Jun 2020 07:06:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
p3p
CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657 for more info."
status
200
cache-control
private, no-cache, no-store
content-disposition
attachment; filename="f.txt"
content-type
application/javascript; charset=UTF-8
alt-svc
h3-28="googleads.g.doubleclick.net:443"; ma=2592000,h3-28=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
104
x-xss-protection
0
show_ads_impl_fy2019.js
pagead2.googlesyndication.com/pagead/js/r20200610/r20190131/
218 KB
82 KB
Script
General
Full URL
https://pagead2.googlesyndication.com/pagead/js/r20200610/r20190131/show_ads_impl_fy2019.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
08f93a4cf604e12995a237b71b5db1d5d48f1ecb27687ee17608554f8f7fd6b4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
200
content-disposition
attachment; filename="f.txt"
alt-svc
h3-28="googleads.g.doubleclick.net:443"; ma=2592000,h3-28=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
83998
x-xss-protection
0
server
cafe
etag
419886144849044271
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
cache-control
private, max-age=1209600
timing-allow-origin
*
expires
Mon, 22 Jun 2020 07:06:37 GMT
zrt_lookup.html
googleads.g.doubleclick.net/pagead/html/r20200610/r20190131/ Frame CEF4
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/html/r20200610/r20190131/zrt_lookup.html
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/html/r20200610/r20190131/zrt_lookup.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
vary
Accept-Encoding
date
Wed, 10 Jun 2020 21:31:50 GMT
expires
Wed, 24 Jun 2020 21:31:50 GMT
content-type
text/html; charset=UTF-8
etag
12274286891180784318
x-content-type-options
nosniff
content-encoding
gzip
server
cafe
content-length
4510
x-xss-protection
0
cache-control
public, max-age=1209600
age
984887
alt-svc
h3-28="googleads.g.doubleclick.net:443"; ma=2592000,h3-28=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
ads
googleads.g.doubleclick.net/pagead/ Frame 615F
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-9101039038458640&output=html&adk=1812271804&adf=3025194257&lmt=1592809597&plat=1%3A32776%2C2%3A16809992%2C8%3A32768%2C9%3A32776%2C10%3A32%2C11%3A32%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&tp=site_kit&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fnationalcybersecuritynews.today%2Fvulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities%2F&ea=0&flash=0&pra=5&wgl=1&adsid=NT&dt=1592809597635&bpp=19&bdt=560&idt=86&shv=r20200610&cbv=r20190131&ptt=9&saldr=aa&abxe=1&nras=1&correlator=5086040042266&frm=20&pv=2&ga_vid=1551705021.1592809598&ga_sid=1592809598&ga_hid=1638320058&ga_fc=0&iag=0&icsg=1072862413717488&dssz=62&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1600&bih=1200&scr_x=0&scr_y=0&eid=42530499%2C42530501&oid=3&pvsid=793878086193699&pem=892&rx=0&eae=2&fc=1920&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=8208&bc=31&ifi=0&uci=a!0&fsb=1&dtd=110
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200610/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-9101039038458640&output=html&adk=1812271804&adf=3025194257&lmt=1592809597&plat=1%3A32776%2C2%3A16809992%2C8%3A32768%2C9%3A32776%2C10%3A32%2C11%3A32%2C16%3A8388608%2C17%3A32%2C24%3A32%2C25%3A32%2C30%3A1081344%2C32%3A32%2C40%3A32&tp=site_kit&guci=1.2.0.0.2.2.0.0&format=0x0&url=https%3A%2F%2Fnationalcybersecuritynews.today%2Fvulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities%2F&ea=0&flash=0&pra=5&wgl=1&adsid=NT&dt=1592809597635&bpp=19&bdt=560&idt=86&shv=r20200610&cbv=r20190131&ptt=9&saldr=aa&abxe=1&nras=1&correlator=5086040042266&frm=20&pv=2&ga_vid=1551705021.1592809598&ga_sid=1592809598&ga_hid=1638320058&ga_fc=0&iag=0&icsg=1072862413717488&dssz=62&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=-12245933&ady=-12245933&biw=1600&bih=1200&scr_x=0&scr_y=0&eid=42530499%2C42530501&oid=3&pvsid=793878086193699&pem=892&rx=0&eae=2&fc=1920&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7Cs%7C&abl=NS&fu=8208&bc=31&ifi=0&uci=a!0&fsb=1&dtd=110
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Mon, 22 Jun 2020 07:06:37 GMT
server
cafe
content-length
1021
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Mon, 22-Jun-2020 07:21:37 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
h3-28="googleads.g.doubleclick.net:443"; ma=2592000,h3-28=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
expires
Mon, 22 Jun 2020 07:06:37 GMT
cache-control
private
osd.js
www.googletagservices.com/activeview/js/current/
73 KB
28 KB
Script
General
Full URL
https://www.googletagservices.com/activeview/js/current/osd.js?cb=%2Fr20100101
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200610/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:806::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
de072fa8ec958a27adcb7caec34d45663bbf88c22696a081d2c6ae6ffcae743f
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:37 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1592416174093583"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-28="googleads.g.doubleclick.net:443"; ma=2592000,h3-28=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
27927
x-xss-protection
0
expires
Mon, 22 Jun 2020 07:06:37 GMT
ads
googleads.g.doubleclick.net/pagead/ Frame 4878
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-9101039038458640&output=html&h=600&slotname=6218340406&adk=2635247717&adf=2666940267&w=240&fwrn=4&fwrnh=100&lmt=1592809597&rafmt=1&tp=site_kit&psa=0&guci=1.2.0.0.2.2.0.0&format=240x600&url=https%3A%2F%2Fnationalcybersecuritynews.today%2Fvulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities%2F&flash=0&fwr=0&fwrattr=true&rpe=1&resp_fmts=4&wgl=1&adsid=NT&dt=1592809597654&bpp=6&bdt=579&idt=103&shv=r20200610&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0&nras=1&correlator=5086040042266&frm=20&pv=1&ga_vid=1551705021.1592809598&ga_sid=1592809598&ga_hid=1638320058&ga_fc=0&iag=0&icsg=1072862413717488&dssz=63&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1114&ady=446&biw=1600&bih=1200&scr_x=0&scr_y=0&eid=42530499%2C42530501&oid=3&pvsid=793878086193699&pem=892&rx=0&eae=0&fc=1920&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=8336&bc=31&ifi=1&uci=a!1&fsb=1&xpc=nDvFCmZhsP&p=https%3A//nationalcybersecuritynews.today&dtd=111
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200610/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-9101039038458640&output=html&h=600&slotname=6218340406&adk=2635247717&adf=2666940267&w=240&fwrn=4&fwrnh=100&lmt=1592809597&rafmt=1&tp=site_kit&psa=0&guci=1.2.0.0.2.2.0.0&format=240x600&url=https%3A%2F%2Fnationalcybersecuritynews.today%2Fvulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities%2F&flash=0&fwr=0&fwrattr=true&rpe=1&resp_fmts=4&wgl=1&adsid=NT&dt=1592809597654&bpp=6&bdt=579&idt=103&shv=r20200610&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0&nras=1&correlator=5086040042266&frm=20&pv=1&ga_vid=1551705021.1592809598&ga_sid=1592809598&ga_hid=1638320058&ga_fc=0&iag=0&icsg=1072862413717488&dssz=63&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1114&ady=446&biw=1600&bih=1200&scr_x=0&scr_y=0&eid=42530499%2C42530501&oid=3&pvsid=793878086193699&pem=892&rx=0&eae=0&fc=1920&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeE%7C&abl=CS&pfx=0&fu=8336&bc=31&ifi=1&uci=a!1&fsb=1&xpc=nDvFCmZhsP&p=https%3A//nationalcybersecuritynews.today&dtd=111
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Mon, 22 Jun 2020 07:06:37 GMT
server
cafe
content-length
205
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Mon, 22-Jun-2020 07:21:37 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
h3-28="googleads.g.doubleclick.net:443"; ma=2592000,h3-28=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
expires
Mon, 22 Jun 2020 07:06:37 GMT
cache-control
private
ads
googleads.g.doubleclick.net/pagead/ Frame 362D
0
0
Document
General
Full URL
https://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-9101039038458640&output=html&h=600&slotname=6218340406&adk=3001328440&adf=4002540836&w=240&fwrn=4&fwrnh=100&lmt=1592809597&rafmt=1&tp=site_kit&psa=0&guci=1.2.0.0.2.2.0.0&format=240x600&url=https%3A%2F%2Fnationalcybersecuritynews.today%2Fvulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities%2F&flash=0&fwr=0&fwrattr=true&rpe=1&resp_fmts=4&wgl=1&adsid=NT&dt=1592809597660&bpp=1&bdt=585&idt=111&shv=r20200610&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C240x600&nras=1&correlator=5086040042266&frm=20&pv=1&ga_vid=1551705021.1592809598&ga_sid=1592809598&ga_hid=1638320058&ga_fc=0&iag=0&icsg=1072862413717488&dssz=63&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1114&ady=1732&biw=1600&bih=1200&scr_x=0&scr_y=0&eid=42530499%2C42530501&oid=3&pvsid=793878086193699&pem=892&rx=0&eae=0&fc=1920&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=8336&bc=31&ifi=2&uci=a!2&btvi=1&fsb=1&xpc=GlbaUaMuFV&p=https%3A//nationalcybersecuritynews.today&dtd=116
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200610/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
googleads.g.doubleclick.net
:scheme
https
:path
/pagead/ads?client=ca-pub-9101039038458640&output=html&h=600&slotname=6218340406&adk=3001328440&adf=4002540836&w=240&fwrn=4&fwrnh=100&lmt=1592809597&rafmt=1&tp=site_kit&psa=0&guci=1.2.0.0.2.2.0.0&format=240x600&url=https%3A%2F%2Fnationalcybersecuritynews.today%2Fvulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities%2F&flash=0&fwr=0&fwrattr=true&rpe=1&resp_fmts=4&wgl=1&adsid=NT&dt=1592809597660&bpp=1&bdt=585&idt=111&shv=r20200610&cbv=r20190131&ptt=9&saldr=aa&abxe=1&prev_fmts=0x0%2C240x600&nras=1&correlator=5086040042266&frm=20&pv=1&ga_vid=1551705021.1592809598&ga_sid=1592809598&ga_hid=1638320058&ga_fc=0&iag=0&icsg=1072862413717488&dssz=63&mdo=0&mso=0&u_tz=120&u_his=2&u_java=0&u_h=1200&u_w=1600&u_ah=1200&u_aw=1600&u_cd=24&u_nplug=0&u_nmime=0&adx=1114&ady=1732&biw=1600&bih=1200&scr_x=0&scr_y=0&eid=42530499%2C42530501&oid=3&pvsid=793878086193699&pem=892&rx=0&eae=0&fc=1920&brdim=0%2C0%2C0%2C0%2C1600%2C0%2C1600%2C1200%2C1600%2C1200&vis=1&rsz=%7C%7CeEbr%7C&abl=CS&pfx=0&fu=8336&bc=31&ifi=2&uci=a!2&btvi=1&fsb=1&xpc=GlbaUaMuFV&p=https%3A//nationalcybersecuritynews.today&dtd=116
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/

Response headers

status
200
p3p
policyref="https://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
timing-allow-origin
*
content-type
text/html; charset=UTF-8
x-content-type-options
nosniff
content-encoding
br
date
Mon, 22 Jun 2020 07:06:37 GMT
server
cafe
content-length
205
x-xss-protection
0
set-cookie
test_cookie=CheckForPermission; expires=Mon, 22-Jun-2020 07:21:37 GMT; path=/; domain=.doubleclick.net; Secure; SameSite=none
alt-svc
h3-28="googleads.g.doubleclick.net:443"; ma=2592000,h3-28=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
expires
Mon, 22 Jun 2020 07:06:37 GMT
cache-control
private
sodar
pagead2.googlesyndication.com/getconfig/
7 KB
6 KB
XHR
General
Full URL
https://pagead2.googlesyndication.com/getconfig/sodar?sv=200&tid=gda&tv=r20200610&st=env
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200610/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
c8ec7ef6b4861320584c67cdbe3bb0fc2f0b397eec5da908a2046c2b168258f7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

timing-allow-origin
*
date
Mon, 22 Jun 2020 07:06:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cafe
status
200
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
access-control-allow-origin
*
cache-control
private
content-disposition
attachment; filename="f.txt"
content-type
application/json; charset=UTF-8
alt-svc
h3-28="googleads.g.doubleclick.net:443"; ma=2592000,h3-28=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
5650
x-xss-protection
0
sodar2.js
tpc.googlesyndication.com/sodar/
14 KB
6 KB
Script
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2.js
Requested by
Host: pagead2.googlesyndication.com
URL: https://pagead2.googlesyndication.com/pagead/js/r20200610/r20190131/show_ads_impl_fy2019.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
08f50e9e70388c99977ca13b6af3a49f8f48c83e79230d51ea72a56c0735bd0c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 22 Jun 2020 07:06:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
sffe
etag
"1591403518460474"
vary
Accept-Encoding
content-type
text/javascript
status
200
cache-control
private, max-age=3000
accept-ranges
bytes
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
5540
x-xss-protection
0
expires
Mon, 22 Jun 2020 07:06:38 GMT
runner.html
tpc.googlesyndication.com/sodar/sodar2/210/ Frame 5EA3
0
0
Document
General
Full URL
https://tpc.googlesyndication.com/sodar/sodar2/210/runner.html
Requested by
Host: tpc.googlesyndication.com
URL: https://tpc.googlesyndication.com/sodar/sodar2.js
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

:method
GET
:authority
tpc.googlesyndication.com
:scheme
https
:path
/sodar/sodar2/210/runner.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
iframe
referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/

Response headers

status
200
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-type
text/html
content-length
4590
date
Mon, 22 Jun 2020 06:47:18 GMT
expires
Tue, 22 Jun 2021 06:47:18 GMT
last-modified
Wed, 26 Feb 2020 19:47:50 GMT
x-content-type-options
nosniff
server
sffe
x-xss-protection
0
cache-control
public, max-age=31536000
age
1160
alt-svc
h3-28=":443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
gen_204
pagead2.googlesyndication.com/pagead/
0
120 B
Image
General
Full URL
https://pagead2.googlesyndication.com/pagead/gen_204?id=sodar2&v=210&t=2&li=gda_r20200610&jk=793878086193699&bg=!HB-lHwdYF0YTxngSHh8CAAAAQ1IAAAAMmQGQkEwMqK6Y9fOXEVLOP87hK3Rf4FhekBtQYrSu2yuekfO3Jo3EsoSAd4W2omCKhkn8bnFsDHMVa7t2qBH1QlvjmN6BtsokD5d7mNMTmwTNW6cfHQbHybXxbpMLAYx5MHMCVvTm1_P7Ra4XibZlegbS8svJvXq983xPNGIwN0sJDN8VLffeRZL39i_zleGAL7wyB9hhJkiBzGYFBxYPu7IfadAYUV63XLIhdrY_iUfoOPHWiaUOZmaL9NeEOIJlPHVLfB-xXhM7IOq9Mn9SupJ9hANZYrS9JZlXqEsQR2mPaeLz8ZPlTw0tR1nVwyV1Z60S2iTarNKVDVl9y14_En3aMouSBk2coCs-tzDYJfumDcJLSxbUgEcDLJqvFZr-PE6P9qvr311HjxwN1zTGDDov9hk0yDXvBhvVpKnVDcZmhnPPMug_Bc-Ug04BHlDdveLmGnhLk-Cp3EvPsfjB6_lTi5CPdv5PbY8NlHV9RzeBV9KUmbDV6adS0f-UdIJaY8abIGarlO7-loMSJNQLu9jKRA
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81d::2002 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
cafe /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 22 Jun 2020 07:06:38 GMT
x-content-type-options
nosniff
server
cafe
timing-allow-origin
*
p3p
policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA IVD OTP OUR OTR IND OTC"
status
204
cache-control
no-cache, must-revalidate
content-type
image/gif
alt-svc
h3-28="googleads.g.doubleclick.net:443"; ma=2592000,h3-28=":443"; ma=2592000,h3-27="googleads.g.doubleclick.net:443"; ma=2592000,h3-27=":443"; ma=2592000,h3-25="googleads.g.doubleclick.net:443"; ma=2592000,h3-25=":443"; ma=2592000,h3-T050="googleads.g.doubleclick.net:443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q050="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q049="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q049=":443"; ma=2592000,h3-Q048="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q048=":443"; ma=2592000,h3-Q046="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043="googleads.g.doubleclick.net:443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic="googleads.g.doubleclick.net:443"; ma=2592000; v="46,43",quic=":443"; ma=2592000; v="46,43"
content-length
0
x-xss-protection
0
expires
Fri, 01 Jan 1990 00:00:00 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
www.youtube.com
URL
https://www.youtube.com/embed/_xxX9KUPaR0?controls=0

Verdicts & Comments Add Verdict or Comment

116 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| _wpemojiSettings object| Screenr_Plus undefined| $ function| jQuery object| ecwidParams object| ec object| google_tag_manager object| dataLayer function| gtag object| google_tag_data string| GoogleAnalyticsObject function| ga object| adsbygoogle object| wpcf7 function| Swiper function| WOW object| jQuery1124004939330066480574 function| Tether function| EvEmitter function| imagesLoaded object| Screenr function| string_to_number function| string_to_bool object| addComment function| jetpackLazyImagesModule object| wp object| wpformsconditionals object| intlTelInputGlobals object| wpforms_file_upload function| _createClass function| _possibleConstructorReturn function| _inherits function| _classCallCheck function| Emitter function| Dropzone function| without function| camelize function| detectVerticalSquash function| drawImageIOSFix function| ExifRestore function| contentLoaded function| __guard__ function| __guardMethod__ function| _ object| _wpUtilSettings function| flatpickr function| Inputmask function| extendDefaults function| extendDefinitions function| extendAliases function| format function| unmask function| isValid function| remove function| setValue function| escapeRegex function| dependencyLib object| Mailcheck object| wpforms object| ___grecaptcha_cfg object| grecaptcha boolean| __google_recaptcha_client function| wpformsRecaptchaLoad function| wpformsRecaptchaCallback object| wpforms_settings object| _stq function| ecwidShoppingCartMakeStoreLinksUseApiCall object| portfolios object| gaplugins object| gaGlobal object| gaData object| twemoji function| st_go function| linktracker_init object| wpcom object| google_js_reporting_queue number| google_srt object| google_ad_modifications object| google_logging_queue object| ggeac boolean| google_measure_js_timing object| googleToken object| googleIMState function| processGoogleToken object| google_reactive_ads_global_state boolean| _gfp_a_ object| google_sa_queue object| google_sl_win function| google_process_slots function| google_spfd object| google_sv_map object| google_t12n_vars boolean| _gfp_p_ number| google_lpabyc number| google_unique_id object| recaptcha function| Goog_AdSense_getAdAdapterInstance function| Goog_AdSense_OsdAdapter function| google_sa_impl object| google_persistent_state_async object| __google_ad_urls number| google_global_correlator number| __google_ad_urls_id object| google_prev_clients object| google_jobrunner object| ampInaboxIframes object| ampInaboxPendingMessages boolean| google_osd_loaded boolean| google_onload_fired function| Goog_Osd_UnloadAdBlock function| Goog_Osd_UpdateElementToMeasure function| google_osd_amcb object| GoogleGcLKhOms object| google_image_requests

17 Cookies

Domain/Path Name / Value
.blogtalkradio.com/ Name: User
Value: prem=False&wasprem=False&uID=&hID=0&url=&hpUrl=https%3a%2f%2fdasg7xwmldix6.cloudfront.net%2fhostpics%2fthumbs%2fno_image_20190218.jpg&name=&hasRem=False&cacheB=2E50&dstud=true
.blogtalkradio.com/ Name: ASP.NET_SessionId
Value: colx3sq2f51px5qil5qvxgju
.blogtalkradio.com/ Name: BTRAnon
Value: 2jaNgvV-1gEkAAAAYzEwZmFjN2UtZDc0MS00NzVlLWFhZWQtMjhmNTc4MDgzZWIwFgQ7bqolvUBsHfg6rB0fBDdfkEM1
.blogtalkradio.com/ Name: _initReferrer
Value: _initReferrer=https://nationalcybersecuritynews.today/vulnerable-platform-used-in-power-plants-enables-attackers-to-run-malicious-code-on-user-browsers-exploits-vulnverabilities/
.nationalcybersecuritynews.today/ Name: _ga
Value: GA1.2.1551705021.1592809598
.blogtalkradio.com/ Name: BTRListenGUID
Value: b99160d7-89c1-40a0-8a3b-cd2669abc4f3
.nationalcybersecuritynews.today/ Name: _gid
Value: GA1.2.1625370824.1592809598
nationalcybersecuritynews.today/ Name: PHPSESSID
Value: 4h25qcs2kujheqc7e3einab8ct
nationalcybersecuritynews.today/ Name: mc_session_ids[multi][3]
Value: 5933953e619cd091c6c143dd352147716e4c0382
nationalcybersecuritynews.today/ Name: mc_session_ids[multi][4]
Value: 3eac643841b9c7347cb091433a2d01c3d34be06f
.doubleclick.net/ Name: test_cookie
Value: CheckForPermission
nationalcybersecuritynews.today/ Name: mc_session_ids[multi][0]
Value: 88bdf0e793669a7c78c1023474568676c50d163f
nationalcybersecuritynews.today/ Name: mc_session_ids[multi][2]
Value: 9cd28dceff81ea9adf7d941e063abe73b27452e2
.nationalcybersecuritynews.today/ Name: _gat_gtag_UA_161795647_2
Value: 1
nationalcybersecuritynews.today/ Name: mc_session_ids[multi][1]
Value: 15fdf6f872395adcaf7729dc12628c0ebc095307
nationalcybersecuritynews.today/ Name: _wpfuuid
Value: 19dcdf55-abd0-4a45-8427-2c3851fa50a8
nationalcybersecuritynews.today/ Name: mc_session_ids[default]
Value: b2a9109d3d2b1abea21bea199657ad96ef67ab6c

1 Console Messages

Source Level URL
Text
console-api log URL: https://c0.wp.com/c/5.4.2/wp-includes/js/jquery/jquery-migrate.min.js(Line 2)
Message:
JQMIGRATE: Migrate is installed, version 1.4.1

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

adservice.google.com
adservice.google.de
app.ecwid.com
c0.wp.com
d1oxsl77a1kjht.cloudfront.net
fonts.googleapis.com
fonts.gstatic.com
googleads.g.doubleclick.net
i2.wp.com
nationalcybersecuritynews.today
pagead2.googlesyndication.com
percolate.blogtalkradio.com
pixel.wp.com
stats.wp.com
tpc.googlesyndication.com
www.google-analytics.com
www.google.com
www.googletagmanager.com
www.googletagservices.com
www.gstatic.com
www.youtube.com
www.youtube.com
13.226.154.51
192.0.76.3
192.0.77.2
192.0.77.37
2600:9000:2182:9000:1c:b536:2c40:21
2a00:1450:4001:802::2008
2a00:1450:4001:802::200e
2a00:1450:4001:806::2002
2a00:1450:4001:808::2001
2a00:1450:4001:808::200a
2a00:1450:4001:808::200e
2a00:1450:4001:81c::2003
2a00:1450:4001:81d::2002
2a00:1450:4001:821::2003
2a00:1450:4001:825::2004
3.121.190.8
87.106.192.188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