Roaming Mantis, part IV | Securelist

0
10296


One year has passed since we published the first blogpost about the Roaming Mantis campaign on securelist.com, and this February we detected new activities by the group. This blogpost is follow up on our earlier reporting about the group with updates on their tools and tactics.

Mobile config for Apple phishing

Our key finding is that the actor continues to seek ways to compromise iOS devices and has even built a new landing page for iOS users. When an iPhone user visits this landing page, she sees pop-up messages guiding her to the malicious iOS mobile config installation:

Pop-up messages and mobile config installation

After installation of this mobile config, the phishing site automatically opens in a web browser and collected information from the device is sent to the attacker’s server. This information includes DEVICE_PRODUCT, DEVICE_VERSION, UDID, ICCID, IMEI and MEID.

XML and CA in mobile config

The CA contains the suspected developer’s email address, “zeeyf79797@yahoo.co[.]jp”, which could be malicious.

We created a test account for this research and used the account credentials at the phishing site. As soon as the threat actor received the ID and password, the criminals attempted to log in to the account from Hong Kong. After entering the credentials, we were directed to the next page, which tried to steal the two-factor authentication code (PIN) sent to the device.

Phishing page for stealing apple ID and two-factor authentication

Re-spreading the updated sagawa.apk Type A (MoqHao/XLoader)

On the Android front, our telemetry data shows a new wave of malicious APK files which we detect as “Trojan-Dropper.AndroidOS.Wroba.g”.

sagawa.apk Type A has spread since Feb 26

We have analyzed the malicious APK file and confirmed that it is definitely a variant of sagawa.apk Type A malware, also known as MoqHao (Mcafee) and XLoader (TrendMicro). Type A malware was earlier distributed via SMS in Japan.

We also found out that the threat actors had compromised routers to overwrite DNS settings and discovered that the following two features were updated as well:

  • Decryption algorithm for encrypted payload in Trojan-Dropper module
  • Stored destination and accounts for getting real C2

Decryption algorithm for encrypted payload in Trojan-Dropper module

Compared to the previous version, the Trojan-Dropper’s decryption function has been altered slightly (change highlighted in purple):

Added 4-byte skip from encrypted data in decompiled code

Why did the attackers change it? Well, the simplified Python script for extracting encrypted payload was disclosed in our previous blog posts. We are suspecting that the actor considered this and introduced some minor changes to their decryption algorithm to evade detection by security products and researchers.

However, we have updated the simplified Python script according to this change:

  • sagawa.apk_typeA_payload_extractor_1.01.py
  • Stored destination and accounts for getting real C2

    In the previous campaign, the three accounts “haoxingfu11”, “haoxingfu22” and “haoxingfu33” on @outlook.com were stored inside the samples for the purpose of retrieving the C2 server address. In order to fetch the C2 server address, the email service was used the real C2 destination was delivered to the victims in an encrypted form from the email subject. In the new version the actor has switched their tactics for retrieving the C2 address from email service to fetching it from Twitter.

    “https://twitter.com/%s” is stored in the malware

    The three suspected Twitter accounts were easily found as well, because the sample had the account IDs stored together, separated by the “|” character just like the old samples:

    Three account IDs separated by the “|” character

    The decryption algorithm for the real C2 address remained untouched – the malware connects to the extracted real C2 via web socket. In addition to the three accounts mentioned earlier, we found several other accounts:

    • lucky88755
    • lucky98745
    • lucky876543
    • gyugyu87418490
    • luckyone1232
    • sadwqewqeqw

    The decryption algorithm for extracting the real C2 from Chinese characters is the same as in the previous sample, so our scripts from the old blogpost will still work. All the accounts are related to the same IP, although the port numbers are different. The table below shows these changes as derived from the account “@luckyone1232”.

    Datetime (UTC) Encrypted data Decrypted real C2
    February 25 2019 11:30 傘傠傘偠傈傠偠傠傐傸偘储傀傐僨傀僨僸傸傀 114.43.155[.]227:28855
    February 26 2019 08:00 傀傸傸偠傠傠傠偘傘储偘傰傠僠僨傀僨僸傸傀 220.136.47[.]169:28855
    March 02 2019 01:00 傀傸傸偠傠傠傠偘傘僘偘傰傈傐僨傀僨僸傸傀 220.136.49[.]137:28855
    March 05 2019 06:00 傀傸傸偠傠傠傠偘傠僘偘傰僀傸僸僐傀傐 220.136.39[.]1:28855
    March 07 2019 03:00 傘傠僸偠傠傈僐偘傰傈储偈傀傰傈僀傸僸僐傀傐 118.168.130[.]236:28855
    March 09 2019 10:00 傠傠偈傀傰傸偠傸傰傐偘储傀僨僨傀僨僸傸傀 61.230.210[.]228:28855
    March 13 2019 01:00 傘傸傐偠傸储储偘傰储傈偈傈傀僨傀僨僸傸傀 125.227.174[.]35:28855
    March 21 2019 01:00 傘偘傰傠僠偈傀储傠偠傈僸僀傸僸僐傀傐 1.169.203[.]48:28855

    We also noticed that the threat actor has introduced a new backdoor command “getPhoneState”. The following table shows the comparison of the older and newer versions of the malware:

    Date August 08 2018 March 03 2019
    MD5 956f32a28d0057805c7234d6a13aa99b 651b6888b3f419fc1aac535921535324
    File size 427.3 KB (437556 bytes) 396.0 KB (405504 bytes)
    Malware type sagawa.apk Type A
    MoqHao (McAfee)
    XLoader (TrendMicro)
    sagawa.apk Type A
    MoqHao (McAfee)
    XLoader (TrendMicro)
    Encrypted payload (enc_data) assetsa assetsbin
    Decryption algorithm for payload payload = base64.b64decode(zlib.decompress(enc_data)); payload = base64.b64decode(zlib.decompress(enc_data[4:]));
    Backdoor commands sendSms
    setWifi
    gcont
    lock
    bc
    setForward
    getForward
    hasPkg
    setRingerMode
    setRecEnable
    reqState
    showHome
    getnpki
    http
    onRecordAction
    call
    get_apps
    show_fs_float_window
    ping
    sendSms
    setWifi
    gcont
    lock
    bc
    setForward
    getForward
    hasPkg
    setRingerMode
    setRecEnable
    reqState
    showHome
    getnpki
    http
    onRecordAction
    call
    get_apps
    show_fs_float_window
    ping
    getPhoneState
    Stored destination @outlook.com (email) https://twitter.com/%s (SNS)
    Accounts haoxingfu11
    haoxingfu22
    haoxingfu33
    luckyone1232
    sadwqewqeqw
    gyugyu87418490
    RegExp abcd abcd([u4e00-u9fa5]+?) “;</td> </tr> <tr> <td>Decryption algorithm for real C2</td> <td>for i in range(len(ext)):<br />dec = dec + chr((ord(ext[i]) – 0x4e00) >> 3 ^ ord(‘beg'[j]))<br />j = (j+1) %3</td> <td>for i in range(len(ext)):<br />dec = dec + chr((ord(ext[i]) – 0x4e00) >> 3 ^ ord(‘beg'[j]))<br />j = (j+1) %3</td> </tr> </tbody> </table> <h2 id="rogue-dns-settings-in-compromised-routers-again">Rogue DNS settings in compromised routers again</h2> <p>In late February 2019, we detected a URL query of a malicious DNS changer. Here is an example:</p> <div style="width: 1010px" class="wp-caption aligncenter"><a target="_blank" href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2019/04/03101509/The-roaming-mantis-part-IV-9.png" class="magnificImage" rel="noopener noreferrer"><img src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2019/04/03101509/The-roaming-mantis-part-IV-9.png" style="max-height:60vh" alt="" class="aligncenter size-full wp-image-81520"/></a></p> <p class="wp-caption-text">URL query of malicious DNS changer</p> </div> <p style="margin-bottom:0!important">The router’s DNS setting is potentially compromised if the device reads the URL query of the DNS changer from localnet under a router with the following conditions:</p> </ul> <ol> <li>No authentication for router panel from localnet</li> <li>The device has an admin session for the router panel</li> <li>Simple ID and password (or default) for route panel like <em>admin:admin</em></li> </ol> <p>As we have observed, several hundred routers have been compromised and all pointed to the rogue DNS IPs.</p> <p style="margin-bottom:0!important">This code overwrites the rogue DNS IPs below into the DNS settings of routers:</p> <ul> <li>171.244.33[.]114</li> <li>171.244.33[.]116</li> </ul> <h2 id="geographical-expansion">Geographical expansion</h2> <p>According to our detection data, new variants of sagawa.apk Type A (Trojan-Dropper.AndroidOS.Wroba.g) have been detected in the wild, based on our KSN data from February 25, 2019 to March 20, 2019.</p> <div style="width: 1010px" class="wp-caption aligncenter"><a target="_blank" href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2019/04/03101535/The-roaming-mantis-part-IV-10.png" class="magnificImage" rel="noopener noreferrer"><img src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2019/04/03101535/The-roaming-mantis-part-IV-10.png" style="max-height:60vh" alt="" class="aligncenter size-full wp-image-81520"/></a></p> <p class="wp-caption-text">Geographical expansion from KSN data</p> </div> <p>The worst affected countries are Russia, Japan, India, Bangladesh, Kazakhstan, Azerbaijan, Iran and Vietnam. Our products detected this malware over 6,800 times for over 950 unique users during this period. We believe this attack wave has a much bigger scale and these numbers reflect only a small part of this campaign.</p> <h2 id="conclusion">Conclusion</h2> <p>We have seen increased distribution of sagawa.apk Type A since late February 2019. This wave is characterized by a new attack method of phishing with malicious mobile config, although the previously observed DNS manipulation is also still actively used. We find the use of malicious mobile config especially alarming as this may cause serious problems for the users. As explained in an earlier <a target="_blank" href="https://www.howtogeek.com/176195/why-configuration-profiles-can-be-as-dangerous-as-malware-on-iphones-and-ipads/" rel="noopener noreferrer">blog post</a>, “the profile could configure the device to use a malicious proxy or <a target="_blank" href="https://www.howtogeek.com/133680/htg-explains-what-is-a-vpn/" rel="noopener noreferrer">VPN</a>, effectively allowing the attacker to monitor everything.”</p> <p style="margin-bottom:0!important">We recommend users take the following steps:</p> <ul> <li>Change the default ID and password, and apply the relevant security patches to counter these threats;</li> <li>For Android users: do not download APKs from third-party sources;</li> <li>For iOS users: do not install a non-trusted third-party mobile config.</li> </ul> <p style="margin-bottom:0!important">For further information about this threat actor, please refer to our previous blog posts about Roaming mantis:</p> <p style="margin-bottom:0!important">Kaspersky Lab products detect this malware for Android as:</p> <ul> <li>HEUR:Trojan-Banker.AndroidOS.Wroba</li> <li>HEUR:Trojan-Dropper.AndroidOS.Wroba</li> </ul> <p>Finally, we would like to show our appreciation to the Japanese researchers @ninoseki and @papa_anniekey, who have shared and discussed with us their results of Roaming Mantis campaign research. The criminals are still rapidly improving their methods: we discovered some updated sagawa.apk Type A this April, the fresh sample has embedded DES algorithm instead of some decryption feature. We’re going to track Roaming Mantis activity and publish any new activities in the future.</p> <h2 id="indicators-of-compromise-iocs-examples">Indicators of compromise (IoCs) examples</h2> <h4 id="malicious-hosts">Malicious hosts:</h4> <table class="c-1-left c-2-left c-3-left c-4-left c-5-left"> <tr/> <tr> <td>114.43.155[.]227</td> <td>real C2</td> </tr> <tr> <td>220.136.47[.]169</td> <td>real C2</td> </tr> <tr> <td>220.136.49[.]137</td> <td>real C2</td> </tr> <tr> <td>220.136.39[.]1</td> <td>real C2</td> </tr> <tr> <td>118.168.130[.]236</td> <td>real C2</td> </tr> <tr> <td>171.244.33[.]114</td> <td>RogueDNS</td> </tr> <tr> <td>171.244.33[.]116</td> <td>RogueDNS</td> </tr> <tr> <td>61.230.153[.]211</td> <td>Landing page</td> </tr> <tr> <td>154.223.62[.]130</td> <td>Landing page</td> </tr> <tr> <td>ffakecg[.]com</td> <td>Landing page</td> </tr> <tr> <td>sagawa-mwm[.]com</td> <td>Landing page</td> </tr> <tr> <td>sagawa-mqd[.]com</td> <td>Landing page</td> </tr> <tr> <td>sagawa-bz[.]com</td> <td>Landing page</td> </tr> <tr> <td>nttdocomo-qae[.]com</td> <td>Landing page</td> </tr> <tr> <td>nttdocomo-qat[.]com</td> <td>Landing page</td> </tr> </table> <h4 id="suspicious-twitter-accounts">Suspicious Twitter accounts:</h4> <ul> <li>luckyone1232</li> <li>sadwqewqeqw</li> <li>gyugyu87418490</li> <li>lucky88755</li> <li>lucky98745</li> <li>lucky876543</li> </ul> <h4 id="sagawa-apk-type-a-and-its-modules">sagawa.apk Type A and its modules:</h4> <table class="c-1-left c-2-left c-3-left c-4-left c-5-left"> <tr/> <tr> <td>417a6af1172042986f602cc0e2e681dc</td> <td>APK file</td> </tr> <tr> <td>651b6888b3f419fc1aac535921535324</td> <td>APK file</td> </tr> <tr> <td>0a4e8d3fe5ee383ba3a22d0f00670ce3</td> <td>APK file</td> </tr> <tr> <td>870697ddb36a8f205478c2338d7e6bc7</td> <td>APK file</td> </tr> <tr> <td>7e247800b95c643a3c9d4a320b12726b</td> <td>classes.dex</td> </tr> <tr> <td>7cfb9ed812e0250bfcb4022c567771ec</td> <td>classes.dex</td> </tr> <tr> <td>8358d2a39d412edbd1cf662e0d8a9f19</td> <td>classes.dex</td> </tr> <tr> <td>7cfb9ed812e0250bfcb4022c567771ec</td> <td>classes.dex</td> </tr> <tr> <td>af2890a472b85d473faee501337564a9</td> <td>Decrypted dex file</td> </tr> <tr> <td>c8d7475a27fb7d669ec3787fe3e9c031</td> <td>Decrypted dex file</td> </tr> <tr> <td>d0848d71a14e0f07c6e64bf84c30ee39</td> <td>Decrypted dex file</td> </tr> <tr> <td>e2b557721902bc97382d268f1785e085</td> <td>Decrypted dex file</td> </tr> </table> </div> <p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script><br /> <br /><br /> <br /><a href="https://securelist.com/roaming-mantis-part-iv/90332/">Source link </a></p> <div class="post-views post-4625 entry-meta"> <span class="post-views-icon dashicons dashicons-chart-bar"></span> <span class="post-views-label">Post Views: </span> <span class="post-views-count">8,032</span> </div> </div> <footer> <div class="td-post-source-tags"> </div> <div class="td-post-sharing-bottom"><div class="td-post-sharing-classic"><iframe frameBorder="0" src="https://www.facebook.com/plugins/like.php?href=https://techbizweb.com/roaming-mantis-part-iv-securelist/&layout=button_count&show_faces=false&width=105&action=like&colorscheme=light&height=21" style="border:none; overflow:hidden; width:105px; height:21px; background-color:transparent;"></iframe></div><div id="td_social_sharing_article_bottom" class="td-post-sharing td-ps-bg td-ps-notext td-post-sharing-style1 "><div class="td-post-sharing-visible"><a class="td-social-sharing-button td-social-sharing-button-js td-social-network td-social-facebook" href="https://www.facebook.com/sharer.php?u=https%3A%2F%2Ftechbizweb.com%2Froaming-mantis-part-iv-securelist%2F"> <div class="td-social-but-icon"><i class="td-icon-facebook"></i></div> <div class="td-social-but-text">Facebook</div> </a><a class="td-social-sharing-button td-social-sharing-button-js td-social-network td-social-twitter" href="https://twitter.com/intent/tweet?text=Roaming+Mantis%2C+part+IV+%7C+Securelist&url=https%3A%2F%2Ftechbizweb.com%2Froaming-mantis-part-iv-securelist%2F&via=TechBizWeb"> <div class="td-social-but-icon"><i class="td-icon-twitter"></i></div> <div class="td-social-but-text">Twitter</div> </a><a class="td-social-sharing-button td-social-sharing-button-js td-social-network td-social-googleplus" href="https://plus.google.com/share?url=https://techbizweb.com/roaming-mantis-part-iv-securelist/"> <div class="td-social-but-icon"><i class="td-icon-googleplus"></i></div> <div class="td-social-but-text">Google+</div> </a><a class="td-social-sharing-button td-social-sharing-button-js td-social-network td-social-pinterest" href="https://pinterest.com/pin/create/button/?url=https://techbizweb.com/roaming-mantis-part-iv-securelist/&media=https://techbizweb.com/wp-content/uploads/2019/03/mobile-malware-evolution-2018-securelist.jpeg&description=Roaming+Mantis%2C+part+IV+%7C+Securelist"> <div class="td-social-but-icon"><i class="td-icon-pinterest"></i></div> <div class="td-social-but-text">Pinterest</div> </a><a class="td-social-sharing-button td-social-sharing-button-js td-social-network td-social-whatsapp" href="whatsapp://send?text=Roaming Mantis, part IV | Securelist %0A%0A https://techbizweb.com/roaming-mantis-part-iv-securelist/"> <div class="td-social-but-icon"><i class="td-icon-whatsapp"></i></div> <div class="td-social-but-text">WhatsApp</div> </a></div><div class="td-social-sharing-hidden"><ul class="td-pulldown-filter-list"></ul><a class="td-social-sharing-button td-social-handler td-social-expand-tabs" href="#" data-block-uid="td_social_sharing_article_bottom"> <div class="td-social-but-icon"><i class="td-icon-plus td-social-expand-tabs-icon"></i></div> </a></div></div></div> <div class="td-block-row td-post-next-prev"><div class="td-block-span6 td-post-prev-post"><div class="td-post-next-prev-content"><span>Previous article</span><a href="https://techbizweb.com/whatsapps-brian-acton-to-talk-signal-foundation-and-leaving-facebook-at-disrupt-sf-techcrunch/">WhatsApp’s Brian Acton to talk Signal Foundation and leaving Facebook at Disrupt SF – TechCrunch</a></div></div><div class="td-next-prev-separator"></div><div class="td-block-span6 td-post-next-post"><div class="td-post-next-prev-content"><span>Next article</span><a href="https://techbizweb.com/long-equipment-life-cycles-expose-manufacturing-industry-to-attacks-study/">Long Equipment Life Cycles Expose Manufacturing Industry to Attacks: Study</a></div></div></div> <div class="author-box-wrap"><a href="https://techbizweb.com/author/great/"><img alt='' src='https://secure.gravatar.com/avatar/?s=96&d=mm&r=g' srcset='https://secure.gravatar.com/avatar/?s=192&d=mm&r=g 2x' class='avatar avatar-96 photo avatar-default' height='96' width='96' loading='lazy'/></a><div class="desc"><div class="td-author-name vcard author"><span class="fn"><a href="https://techbizweb.com/author/great/">GReAT</a></span></div><div class="td-author-description"></div><div class="td-author-social"></div><div class="clearfix"></div></div></div> <span class="td-page-meta" itemprop="author" itemscope itemtype="https://schema.org/Person"><meta itemprop="name" content="GReAT"></span><meta itemprop="datePublished" content="2019-04-03T16:30:54+00:00"><meta itemprop="dateModified" content="2019-04-03T16:43:38+00:00"><meta itemscope itemprop="mainEntityOfPage" itemType="https://schema.org/WebPage" itemid="https://techbizweb.com/roaming-mantis-part-iv-securelist/"/><span class="td-page-meta" itemprop="publisher" itemscope itemtype="https://schema.org/Organization"><span class="td-page-meta" itemprop="logo" itemscope itemtype="https://schema.org/ImageObject"><meta itemprop="url" content="https://techbizweb.com/wp-content/uploads/2019/04/GtPQPpEK_400x400.jpg"></span><meta itemprop="name" content="TechBizWeb"></span><meta itemprop="headline " content="Roaming Mantis, part IV | Securelist"><span class="td-page-meta" itemprop="image" itemscope itemtype="https://schema.org/ImageObject"><meta itemprop="url" content="https://techbizweb.com/wp-content/uploads/2019/03/mobile-malware-evolution-2018-securelist.jpeg"><meta itemprop="width" content="1200"><meta itemprop="height" content="800"></span> </footer> </article> <!-- /.post --> <div class="td_block_wrap td_block_related_posts td_uid_2_5f73ccb915854_rand td_with_ajax_pagination td-pb-border-top td_block_template_1" data-td-block-uid="td_uid_2_5f73ccb915854" ><script>var block_td_uid_2_5f73ccb915854 = new tdBlock(); block_td_uid_2_5f73ccb915854.id = "td_uid_2_5f73ccb915854"; block_td_uid_2_5f73ccb915854.atts = '{"limit":6,"ajax_pagination":"next_prev","live_filter":"cur_post_same_categories","td_ajax_filter_type":"td_custom_related","class":"td_uid_2_5f73ccb915854_rand","td_column_number":3,"live_filter_cur_post_id":4625,"live_filter_cur_post_author":"36","block_template_id":"","header_color":"","ajax_pagination_infinite_stop":"","offset":"","td_ajax_preloading":"","td_filter_default_txt":"","td_ajax_filter_ids":"","el_class":"","color_preset":"","border_top":"","css":"","tdc_css":"","tdc_css_class":"td_uid_2_5f73ccb915854_rand","tdc_css_class_style":"td_uid_2_5f73ccb915854_rand_style"}'; block_td_uid_2_5f73ccb915854.td_column_number = "3"; block_td_uid_2_5f73ccb915854.block_type = "td_block_related_posts"; block_td_uid_2_5f73ccb915854.post_count = "6"; block_td_uid_2_5f73ccb915854.found_posts = "4334"; block_td_uid_2_5f73ccb915854.header_color = ""; block_td_uid_2_5f73ccb915854.ajax_pagination_infinite_stop = ""; block_td_uid_2_5f73ccb915854.max_num_pages = "723"; tdBlocksArray.push(block_td_uid_2_5f73ccb915854); </script><h4 class="td-related-title td-block-title"><a id="td_uid_3_5f73ccb92165d" class="td-related-left td-cur-simple-item" data-td_filter_value="" data-td_block_id="td_uid_2_5f73ccb915854" href="#">RELATED ARTICLES</a><a id="td_uid_4_5f73ccb921667" class="td-related-right" data-td_filter_value="td_related_more_from_author" data-td_block_id="td_uid_2_5f73ccb915854" href="#">MORE FROM AUTHOR</a></h4><div id=td_uid_2_5f73ccb915854 class="td_block_inner"> <div class="td-related-row"> <div class="td-related-span4"> <div class="td_module_related_posts td-animation-stack td_mod_related_posts"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://techbizweb.com/the-most-important-cybersecurity-tips-for-your-website/" rel="bookmark" class="td-image-wrap" title="The Most Important Cybersecurity Tips for Your Website"><img class="entry-thumb" src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAANoAAACWAQMAAACCSQSPAAAAA1BMVEWurq51dlI4AAAAAXRSTlMmkutdmwAAABpJREFUWMPtwQENAAAAwiD7p7bHBwwAAAAg7RD+AAGXD7BoAAAAAElFTkSuQmCC"alt="" data-type="image_tag" data-img-url="https://techbizweb.com/wp-content/themes/Newspaper/images/no-thumb/td_218x150.png" width="218" height="150" /></a></div> <a href="https://techbizweb.com/category/cyber-security/" class="td-post-category">Cyber Security</a> </div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://techbizweb.com/the-most-important-cybersecurity-tips-for-your-website/" rel="bookmark" title="The Most Important Cybersecurity Tips for Your Website">The Most Important Cybersecurity Tips for Your Website</a></h3> </div> </div> </div> <!-- ./td-related-span4 --> <div class="td-related-span4"> <div class="td_module_related_posts td-animation-stack td_mod_related_posts"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://techbizweb.com/ways-to-make-eco-pods-relaxing/" rel="bookmark" class="td-image-wrap" title="Ways to Make Eco-pods Relaxing"><img class="entry-thumb" src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAANoAAACWAQMAAACCSQSPAAAAA1BMVEWurq51dlI4AAAAAXRSTlMmkutdmwAAABpJREFUWMPtwQENAAAAwiD7p7bHBwwAAAAg7RD+AAGXD7BoAAAAAElFTkSuQmCC"alt="" title="Ways to Make Eco-pods Relaxing" data-type="image_tag" data-img-url="https://techbizweb.com/wp-content/uploads/2020/04/Canva-Stylish-Modern-Freestanding-Boat-Shaped-Bathtub-218x150.jpg" width="218" height="150" /></a></div> <a href="https://techbizweb.com/category/cyber-security/" class="td-post-category">Cyber Security</a> </div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://techbizweb.com/ways-to-make-eco-pods-relaxing/" rel="bookmark" title="Ways to Make Eco-pods Relaxing">Ways to Make Eco-pods Relaxing</a></h3> </div> </div> </div> <!-- ./td-related-span4 --> <div class="td-related-span4"> <div class="td_module_related_posts td-animation-stack td_mod_related_posts"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://techbizweb.com/coronavirus-themed-emails-deliver-malware-phishing-scams/" rel="bookmark" class="td-image-wrap" title="Coronavirus-Themed Emails Deliver Malware, Phishing, Scams"><img class="entry-thumb" src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAANoAAACWAQMAAACCSQSPAAAAA1BMVEWurq51dlI4AAAAAXRSTlMmkutdmwAAABpJREFUWMPtwQENAAAAwiD7p7bHBwwAAAAg7RD+AAGXD7BoAAAAAElFTkSuQmCC"alt="" title="Coronavirus-Themed Emails Deliver Malware, Phishing, Scams" data-type="image_tag" data-img-url="https://techbizweb.com/wp-content/uploads/2020/02/coronavirus-themed-emails-deliver-malware-phishing-scams-218x150.png" width="218" height="150" /></a></div> <a href="https://techbizweb.com/category/cyber-security/" class="td-post-category">Cyber Security</a> </div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://techbizweb.com/coronavirus-themed-emails-deliver-malware-phishing-scams/" rel="bookmark" title="Coronavirus-Themed Emails Deliver Malware, Phishing, Scams">Coronavirus-Themed Emails Deliver Malware, Phishing, Scams</a></h3> </div> </div> </div> <!-- ./td-related-span4 --></div><!--./row-fluid--> <div class="td-related-row"> <div class="td-related-span4"> <div class="td_module_related_posts td-animation-stack td_mod_related_posts"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://techbizweb.com/microsoft-releases-february-2020-security-updates/" rel="bookmark" class="td-image-wrap" title="Microsoft Releases February 2020 Security Updates |"><img class="entry-thumb" src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAANoAAACWAQMAAACCSQSPAAAAA1BMVEWurq51dlI4AAAAAXRSTlMmkutdmwAAABpJREFUWMPtwQENAAAAwiD7p7bHBwwAAAAg7RD+AAGXD7BoAAAAAElFTkSuQmCC"alt="" title="Microsoft Releases February 2020 Security Updates |" data-type="image_tag" data-img-url="https://techbizweb.com/wp-content/uploads/2019/11/infiltrate-2019-marco-ivaldis-a-bugs-life-story-of-a-solaris-0day-218x150.png" width="218" height="150" /></a></div> <a href="https://techbizweb.com/category/cyber-security/" class="td-post-category">Cyber Security</a> </div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://techbizweb.com/microsoft-releases-february-2020-security-updates/" rel="bookmark" title="Microsoft Releases February 2020 Security Updates |">Microsoft Releases February 2020 Security Updates |</a></h3> </div> </div> </div> <!-- ./td-related-span4 --> <div class="td-related-span4"> <div class="td_module_related_posts td-animation-stack td_mod_related_posts"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://techbizweb.com/beauty-and-the-breach-estee-lauder-exposes-440-million-records-in-unprotected-database/" rel="bookmark" class="td-image-wrap" title="Beauty and the Breach: Estée Lauder Exposes 440 Million Records in Unprotected Database"><img class="entry-thumb" src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAANoAAACWAQMAAACCSQSPAAAAA1BMVEWurq51dlI4AAAAAXRSTlMmkutdmwAAABpJREFUWMPtwQENAAAAwiD7p7bHBwwAAAAg7RD+AAGXD7BoAAAAAElFTkSuQmCC"alt="" title="Beauty and the Breach: Estée Lauder Exposes 440 Million Records in Unprotected Database" data-type="image_tag" data-img-url="https://techbizweb.com/wp-content/uploads/2019/01/reddit-locks-down-accounts-due-to-security-concern.php" width="1" height="1" /></a></div> <a href="https://techbizweb.com/category/cyber-security/" class="td-post-category">Cyber Security</a> </div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://techbizweb.com/beauty-and-the-breach-estee-lauder-exposes-440-million-records-in-unprotected-database/" rel="bookmark" title="Beauty and the Breach: Estée Lauder Exposes 440 Million Records in Unprotected Database">Beauty and the Breach: Estée Lauder Exposes 440 Million Records in Unprotected Database</a></h3> </div> </div> </div> <!-- ./td-related-span4 --> <div class="td-related-span4"> <div class="td_module_related_posts td-animation-stack td_mod_related_posts"> <div class="td-module-image"> <div class="td-module-thumb"><a href="https://techbizweb.com/wifi-a-new-way-to-spread-emotet-malware/" rel="bookmark" class="td-image-wrap" title="WiFi: A New Way to Spread Emotet Malware"><img class="entry-thumb" src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAANoAAACWAQMAAACCSQSPAAAAA1BMVEWurq51dlI4AAAAAXRSTlMmkutdmwAAABpJREFUWMPtwQENAAAAwiD7p7bHBwwAAAAg7RD+AAGXD7BoAAAAAElFTkSuQmCC"alt="" title="WiFi: A New Way to Spread Emotet Malware" data-type="image_tag" data-img-url="https://techbizweb.com/wp-content/uploads/2020/02/wifi-a-new-way-to-spread-emotet-malware-218x150.jpg" width="218" height="150" /></a></div> <a href="https://techbizweb.com/category/cyber-security/" class="td-post-category">Cyber Security</a> </div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://techbizweb.com/wifi-a-new-way-to-spread-emotet-malware/" rel="bookmark" title="WiFi: A New Way to Spread Emotet Malware">WiFi: A New Way to Spread Emotet Malware</a></h3> </div> </div> </div> <!-- ./td-related-span4 --></div><!--./row-fluid--></div><div class="td-next-prev-wrap"><a href="#" class="td-ajax-prev-page ajax-page-disabled" id="prev-page-td_uid_2_5f73ccb915854" data-td_block_id="td_uid_2_5f73ccb915854"><i class="td-icon-font td-icon-menu-left"></i></a><a href="#" class="td-ajax-next-page" id="next-page-td_uid_2_5f73ccb915854" data-td_block_id="td_uid_2_5f73ccb915854"><i class="td-icon-font td-icon-menu-right"></i></a></div></div> <!-- ./block --> <div class="comments" id="comments"> <div id="respond" class="comment-respond"> <h3 id="reply-title" class="comment-reply-title">LEAVE A REPLY <small><a rel="nofollow" id="cancel-comment-reply-link" href="/roaming-mantis-part-iv-securelist/#respond" style="display:none;">Cancel reply</a></small></h3><form action="https://techbizweb.com/wp-comments-post.php" method="post" id="commentform" class="comment-form" novalidate><div class="clearfix"></div> <div class="comment-form-input-wrap td-form-comment"> <textarea placeholder="Comment:" id="comment" name="comment" cols="45" rows="8" aria-required="true"></textarea> <div class="td-warning-comment">Please enter your comment!</div> </div> <div class="comment-form-input-wrap td-form-author"> <input class="" id="author" name="author" placeholder="Name:" type="text" value="" size="30" /> <div class="td-warning-author">Please enter your name here</div> </div> <div class="comment-form-input-wrap td-form-email"> <input class="" id="email" name="email" placeholder="Email:" type="text" value="" size="30" /> <div class="td-warning-email-error">You have entered an incorrect email address!</div> <div class="td-warning-email">Please enter your email address here</div> </div> <div class="comment-form-input-wrap td-form-url"> <input class="" id="url" name="url" placeholder="Website:" type="text" value="" size="30" /> </div> <p class="comment-form-cookies-consent"><input id="wp-comment-cookies-consent" name="wp-comment-cookies-consent" type="checkbox" value="yes" /><label for="wp-comment-cookies-consent">Save my name, email, and website in this browser for the next time I comment.</label></p> <p class="form-submit"><input name="submit" type="submit" id="submit" class="submit" value="Post Comment" /> <input type='hidden' name='comment_post_ID' value='4625' id='comment_post_ID' /> <input type='hidden' name='comment_parent' id='comment_parent' value='0' /> </p></form> </div><!-- #respond --> </div> <!-- /.content --> </div> </div> <div class="td-pb-span4 td-main-sidebar" role="complementary"> <div class="td-ss-main-sidebar"> <div class="td_block_wrap td_block_social_counter td_block_widget td_uid_5_5f73ccb927641_rand td-pb-border-top td_block_template_1"><div class="td-block-title-wrap"><h4 class="block-title td-block-title"><span class="td-pulldown-size">Stay connected</span></h4></div><div class="td-social-list"><div class="td_social_type td-pb-margin-side td_social_facebook"><div class="td-social-box"><div class="td-sp td-sp-facebook"></div><span class="td_social_info">25,000</span><span class="td_social_info td_social_info_name">Fans</span><span class="td_social_button"><a href="https://www.facebook.com/digitpol" >Like</a></span></div></div><div class="td_social_type td-pb-margin-side td_social_twitter"><div class="td-social-box"><div class="td-sp td-sp-twitter"></div><span class="td_social_info">5,444</span><span class="td_social_info td_social_info_name">Followers</span><span class="td_social_button"><a href="https://twitter.com/digitpol_cyber" >Follow</a></span></div></div><div class="td_social_type td-pb-margin-side td_social_youtube"><div class="td-social-box"><div class="td-sp td-sp-youtube"></div><span class="td_social_info">1,020</span><span class="td_social_info td_social_info_name">Subscribers</span><span class="td_social_button"><a href="https://www.youtube.com/digitpol" >Subscribe</a></span></div></div></div></div> <!-- ./block --><div class="td_block_wrap td_block_21 td_block_widget td_uid_7_5f73ccb927c88_rand td-pb-border-top td_block_template_1 td-column-1" data-td-block-uid="td_uid_7_5f73ccb927c88" ><script>var block_td_uid_7_5f73ccb927c88 = new tdBlock(); block_td_uid_7_5f73ccb927c88.id = "td_uid_7_5f73ccb927c88"; block_td_uid_7_5f73ccb927c88.atts = '{"sort":"","custom_title":"Latest article","limit":"3","header_color":"","class":"td_block_widget td_uid_7_5f73ccb927c88_rand","separator":"","custom_url":"","block_template_id":"","m16_tl":"","m16_el":"","post_ids":"","category_id":"","category_ids":"","tag_slug":"","autors_id":"","installed_post_types":"","offset":"","el_class":"","td_ajax_filter_type":"","td_ajax_filter_ids":"","td_filter_default_txt":"All","td_ajax_preloading":"","f_header_font_header":"","f_header_font_title":"Block header","f_header_font_settings":"","f_header_font_family":"","f_header_font_size":"","f_header_font_line_height":"","f_header_font_style":"","f_header_font_weight":"","f_header_font_transform":"","f_header_font_spacing":"","f_header_":"","f_ajax_font_title":"Ajax categories","f_ajax_font_settings":"","f_ajax_font_family":"","f_ajax_font_size":"","f_ajax_font_line_height":"","f_ajax_font_style":"","f_ajax_font_weight":"","f_ajax_font_transform":"","f_ajax_font_spacing":"","f_ajax_":"","f_more_font_title":"Load more button","f_more_font_settings":"","f_more_font_family":"","f_more_font_size":"","f_more_font_line_height":"","f_more_font_style":"","f_more_font_weight":"","f_more_font_transform":"","f_more_font_spacing":"","f_more_":"","m16f_title_font_header":"","m16f_title_font_title":"Article title","m16f_title_font_settings":"","m16f_title_font_family":"","m16f_title_font_size":"","m16f_title_font_line_height":"","m16f_title_font_style":"","m16f_title_font_weight":"","m16f_title_font_transform":"","m16f_title_font_spacing":"","m16f_title_":"","m16f_cat_font_title":"Article category tag","m16f_cat_font_settings":"","m16f_cat_font_family":"","m16f_cat_font_size":"","m16f_cat_font_line_height":"","m16f_cat_font_style":"","m16f_cat_font_weight":"","m16f_cat_font_transform":"","m16f_cat_font_spacing":"","m16f_cat_":"","m16f_meta_font_title":"Article meta info","m16f_meta_font_settings":"","m16f_meta_font_family":"","m16f_meta_font_size":"","m16f_meta_font_line_height":"","m16f_meta_font_style":"","m16f_meta_font_weight":"","m16f_meta_font_transform":"","m16f_meta_font_spacing":"","m16f_meta_":"","m16f_ex_font_title":"Article excerpt","m16f_ex_font_settings":"","m16f_ex_font_family":"","m16f_ex_font_size":"","m16f_ex_font_line_height":"","m16f_ex_font_style":"","m16f_ex_font_weight":"","m16f_ex_font_transform":"","m16f_ex_font_spacing":"","m16f_ex_":"","ajax_pagination":"","ajax_pagination_infinite_stop":"","css":"","tdc_css":"","td_column_number":1,"color_preset":"","border_top":"","tdc_css_class":"td_uid_7_5f73ccb927c88_rand","tdc_css_class_style":"td_uid_7_5f73ccb927c88_rand_style"}'; block_td_uid_7_5f73ccb927c88.td_column_number = "1"; block_td_uid_7_5f73ccb927c88.block_type = "td_block_21"; block_td_uid_7_5f73ccb927c88.post_count = "3"; block_td_uid_7_5f73ccb927c88.found_posts = "17980"; block_td_uid_7_5f73ccb927c88.header_color = ""; block_td_uid_7_5f73ccb927c88.ajax_pagination_infinite_stop = ""; block_td_uid_7_5f73ccb927c88.max_num_pages = "5994"; tdBlocksArray.push(block_td_uid_7_5f73ccb927c88); </script><div class="td-block-title-wrap"><h4 class="block-title td-block-title"><span class="td-pulldown-size">Latest article</span></h4></div><div id=td_uid_7_5f73ccb927c88 class="td_block_inner"> <div class="td_module_16 td_module_wrap td-animation-stack"> <div class="td-module-thumb"><a href="https://techbizweb.com/how-to-successfully-manage-a-digital-marketing-campaign-from-start-to-finish/" rel="bookmark" class="td-image-wrap" title="How to Successfully Manage a Digital Marketing Campaign from Start to Finish"><img class="entry-thumb" src=""alt="" data-type="image_tag" data-img-url="https://techbizweb.com/wp-content/themes/Newspaper/images/no-thumb/thumbnail.png" width="" height="" /></a></div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://techbizweb.com/how-to-successfully-manage-a-digital-marketing-campaign-from-start-to-finish/" rel="bookmark" title="How to Successfully Manage a Digital Marketing Campaign from Start to Finish">How to Successfully Manage a Digital Marketing Campaign from Start to Finish</a></h3> <div class="td-module-meta-info"> <a href="https://techbizweb.com/category/business/" class="td-post-category">Business</a> <span class="td-post-author-name"><a href="https://techbizweb.com/author/patrickpressman/">Patrick Pressman</a> <span>-</span> </span> <span class="td-post-date"><time class="entry-date updated td-module-date" datetime="2020-09-18T09:28:17+00:00" >September 18, 2020</time></span> <div class="td-module-comments"><a href="https://techbizweb.com/how-to-successfully-manage-a-digital-marketing-campaign-from-start-to-finish/#respond">0</a></div> </div> <div class="td-excerpt">   The world is digital. Even physical campaigns are made as an afterthought to the main digital campaign that... </div> </div> </div> <div class="td_module_16 td_module_wrap td-animation-stack"> <div class="td-module-thumb"><a href="https://techbizweb.com/the-most-important-cybersecurity-tips-for-your-website/" rel="bookmark" class="td-image-wrap" title="The Most Important Cybersecurity Tips for Your Website"><img class="entry-thumb" src=""alt="" data-type="image_tag" data-img-url="https://techbizweb.com/wp-content/themes/Newspaper/images/no-thumb/thumbnail.png" width="" height="" /></a></div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://techbizweb.com/the-most-important-cybersecurity-tips-for-your-website/" rel="bookmark" title="The Most Important Cybersecurity Tips for Your Website">The Most Important Cybersecurity Tips for Your Website</a></h3> <div class="td-module-meta-info"> <a href="https://techbizweb.com/category/cyber-security/" class="td-post-category">Cyber Security</a> <span class="td-post-author-name"><a href="https://techbizweb.com/author/patrickpressman/">Patrick Pressman</a> <span>-</span> </span> <span class="td-post-date"><time class="entry-date updated td-module-date" datetime="2020-09-14T13:24:03+00:00" >September 14, 2020</time></span> <div class="td-module-comments"><a href="https://techbizweb.com/the-most-important-cybersecurity-tips-for-your-website/#respond">0</a></div> </div> <div class="td-excerpt"> Cybersecurity is one of the most important things that any webmaster needs to think about. The reasons are clear; not thinking about... </div> </div> </div> <div class="td_module_16 td_module_wrap td-animation-stack"> <div class="td-module-thumb"><a href="https://techbizweb.com/how-to-use-tech-to-improve-your-relationship-with-your-suppliers/" rel="bookmark" class="td-image-wrap" title="How to Use Tech to Improve Your Relationship with Your Suppliers"><img class="entry-thumb" src=""alt="" data-type="image_tag" data-img-url="https://techbizweb.com/wp-content/themes/Newspaper/images/no-thumb/thumbnail.png" width="" height="" /></a></div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://techbizweb.com/how-to-use-tech-to-improve-your-relationship-with-your-suppliers/" rel="bookmark" title="How to Use Tech to Improve Your Relationship with Your Suppliers">How to Use Tech to Improve Your Relationship with Your Suppliers</a></h3> <div class="td-module-meta-info"> <a href="https://techbizweb.com/category/business/" class="td-post-category">Business</a> <span class="td-post-author-name"><a href="https://techbizweb.com/author/patrickpressman/">Patrick Pressman</a> <span>-</span> </span> <span class="td-post-date"><time class="entry-date updated td-module-date" datetime="2020-09-14T13:21:38+00:00" >September 14, 2020</time></span> <div class="td-module-comments"><a href="https://techbizweb.com/how-to-use-tech-to-improve-your-relationship-with-your-suppliers/#respond">0</a></div> </div> <div class="td-excerpt"> Finding the right supplier is like finding your best friend in business. The right supplier does more than just ship you the... </div> </div> </div> </div></div> <!-- ./block --> </div> </div> </div> <!-- /.td-pb-row --> </div> <!-- /.td-container --> </div> <!-- /.td-main-content-wrap --> <!-- Instagram --> <!-- Footer --> <div class="td-footer-wrapper td-container-wrap td-footer-template-4 "> <div class="td-container"> <div class="td-pb-row"> <div class="td-pb-span12"> </div> </div> <div class="td-pb-row"> <div class="td-pb-span12"> <div class="td-footer-info"><div class="footer-logo-wrap"><a href="https://techbizweb.com/"><img class="td-retina-data" src="https://techbizweb.com/wp-content/uploads/2019/04/GtPQPpEK_400x400.jpg" data-retina="https://techbizweb.com/wp-content/uploads/2019/04/GtPQPpEK_400x400.jpg" alt="" title="" width="" /></a></div><div class="footer-text-wrap">TechBizWeb is your news, entertainment, crypto, tech, cyber, digital and forensics. We provide you with the latest breaking news and videos straight from the industry.</div><div class="footer-social-wrap td-social-style-2"> <span class="td-social-icon-wrap"> <a target="_blank" href="#" title="Behance"> <i class="td-icon-font td-icon-behance"></i> </a> </span> <span class="td-social-icon-wrap"> <a target="_blank" href="#" title="Facebook"> <i class="td-icon-font td-icon-facebook"></i> </a> </span> <span class="td-social-icon-wrap"> <a target="_blank" href="#" title="Instagram"> <i class="td-icon-font td-icon-instagram"></i> </a> </span> <span class="td-social-icon-wrap"> <a target="_blank" href="#" title="Twitter"> <i class="td-icon-font td-icon-twitter"></i> </a> </span> <span class="td-social-icon-wrap"> <a target="_blank" href="#" title="Vimeo"> <i class="td-icon-font td-icon-vimeo"></i> </a> </span> <span class="td-social-icon-wrap"> <a target="_blank" href="#" title="VKontakte"> <i class="td-icon-font td-icon-vk"></i> </a> </span></div></div> </div> </div> </div> </div> <!-- Sub Footer --> <div class="td-sub-footer-container td-container-wrap "> <div class="td-container"> <div class="td-pb-row"> <div class="td-pb-span td-sub-footer-menu"> </div> <div class="td-pb-span td-sub-footer-copy"> © @ TechBizWeb 2020 - All rights to the authors and contributors. </div> </div> </div> </div> </div><!--close td-outer-wrap--> <!--googleoff: all--><div id="cookie-law-info-bar"><span>This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.<a role='button' tabindex='0' data-cli_action="accept" id="cookie_action_close_header" class="medium cli-plugin-button cli-plugin-main-button cookie_action_close_header cli_action_button" style="display:inline-block; ">Accept</a> <a href='https://techbizweb.com' id="CONSTANT_OPEN_URL" target="_blank" class="cli-plugin-main-link" style="display:inline-block;" >Read More</a></span></div><div id="cookie-law-info-again" style="display:none;"><span id="cookie_hdr_showagain">Privacy & Cookies Policy</span></div><div class="cli-modal" id="cliSettingsPopup" tabindex="-1" role="dialog" aria-labelledby="cliSettingsPopup" aria-hidden="true"> <div class="cli-modal-dialog" role="document"> <div class="cli-modal-content cli-bar-popup"> <button type="button" class="cli-modal-close" id="cliModalClose"> <svg class="" viewBox="0 0 24 24"><path d="M19 6.41l-1.41-1.41-5.59 5.59-5.59-5.59-1.41 1.41 5.59 5.59-5.59 5.59 1.41 1.41 5.59-5.59 5.59 5.59 1.41-1.41-5.59-5.59z"></path><path d="M0 0h24v24h-24z" fill="none"></path></svg> <span class="wt-cli-sr-only">Close</span> </button> <div class="cli-modal-body"> <div class="cli-container-fluid cli-tab-container"> <div class="cli-row"> <div class="cli-col-12 cli-align-items-stretch cli-px-0"> <div class="cli-privacy-overview"> <div class="cli-privacy-content"> <div class="cli-privacy-content-text"></div> </div> <a class="cli-privacy-readmore" data-readmore-text="Show more" data-readless-text="Show less"></a> </div> </div> <div class="cli-col-12 cli-align-items-stretch cli-px-0 cli-tab-section-container"> <div class="cli-tab-section"> <div class="cli-tab-header"> <a role="button" tabindex="0" class="cli-nav-link cli-settings-mobile" data-target="necessary" data-toggle="cli-toggle-tab"> Necessary </a> <div class="wt-cli-necessary-checkbox"> <input type="checkbox" class="cli-user-preference-checkbox" id="wt-cli-checkbox-necessary" data-id="checkbox-necessary" checked="checked" /> <label class="form-check-label" for="wt-cli-checkbox-necessary">Necessary</label> </div> <span class="cli-necessary-caption">Always Enabled</span> </div> <div class="cli-tab-content"> <div class="cli-tab-pane cli-fade" data-id="necessary"> <p></p> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div class="cli-modal-backdrop cli-fade cli-settings-overlay"></div> <div class="cli-modal-backdrop cli-fade cli-popupbar-overlay"></div> <!--googleon: all--> <div class="td-more-articles-box"> <i class="td-icon-close td-close-more-articles-box"></i> <span class="td-more-articles-box-title">MORE STORIES</span> <div class="td-content-more-articles-box"> <div class="td_module_6 td_module_wrap td-animation-stack"> <div class="td-module-thumb"><a href="https://techbizweb.com/how-to-successfully-manage-a-digital-marketing-campaign-from-start-to-finish/" rel="bookmark" class="td-image-wrap" title="How to Successfully Manage a Digital Marketing Campaign from Start to Finish"><img class="entry-thumb" src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAGQAAABGAQMAAAAASKMqAAAAA1BMVEWurq51dlI4AAAAAXRSTlMmkutdmwAAABBJREFUKM9jGAWjYBQMKwAAA9QAAQWBn6cAAAAASUVORK5CYII="alt="" data-type="image_tag" data-img-url="https://techbizweb.com/wp-content/themes/Newspaper/images/no-thumb/td_100x70.png" width="100" height="70" /></a></div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://techbizweb.com/how-to-successfully-manage-a-digital-marketing-campaign-from-start-to-finish/" rel="bookmark" title="How to Successfully Manage a Digital Marketing Campaign from Start to Finish">How to Successfully Manage a Digital Marketing Campaign from Start to...</a></h3> <div class="td-module-meta-info"> <span class="td-post-date"><time class="entry-date updated td-module-date" datetime="2020-09-18T09:28:17+00:00" >September 18, 2020</time></span> </div> </div> </div> <div class="td_module_6 td_module_wrap td-animation-stack"> <div class="td-module-thumb"><a href="https://techbizweb.com/the-most-important-cybersecurity-tips-for-your-website/" rel="bookmark" class="td-image-wrap" title="The Most Important Cybersecurity Tips for Your Website"><img class="entry-thumb" src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAGQAAABGAQMAAAAASKMqAAAAA1BMVEWurq51dlI4AAAAAXRSTlMmkutdmwAAABBJREFUKM9jGAWjYBQMKwAAA9QAAQWBn6cAAAAASUVORK5CYII="alt="" data-type="image_tag" data-img-url="https://techbizweb.com/wp-content/themes/Newspaper/images/no-thumb/td_100x70.png" width="100" height="70" /></a></div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://techbizweb.com/the-most-important-cybersecurity-tips-for-your-website/" rel="bookmark" title="The Most Important Cybersecurity Tips for Your Website">The Most Important Cybersecurity Tips for Your Website</a></h3> <div class="td-module-meta-info"> <span class="td-post-date"><time class="entry-date updated td-module-date" datetime="2020-09-14T13:24:03+00:00" >September 14, 2020</time></span> </div> </div> </div> <div class="td_module_6 td_module_wrap td-animation-stack"> <div class="td-module-thumb"><a href="https://techbizweb.com/how-to-use-tech-to-improve-your-relationship-with-your-suppliers/" rel="bookmark" class="td-image-wrap" title="How to Use Tech to Improve Your Relationship with Your Suppliers"><img class="entry-thumb" src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAGQAAABGAQMAAAAASKMqAAAAA1BMVEWurq51dlI4AAAAAXRSTlMmkutdmwAAABBJREFUKM9jGAWjYBQMKwAAA9QAAQWBn6cAAAAASUVORK5CYII="alt="" data-type="image_tag" data-img-url="https://techbizweb.com/wp-content/themes/Newspaper/images/no-thumb/td_100x70.png" width="100" height="70" /></a></div> <div class="item-details"> <h3 class="entry-title td-module-title"><a href="https://techbizweb.com/how-to-use-tech-to-improve-your-relationship-with-your-suppliers/" rel="bookmark" title="How to Use Tech to Improve Your Relationship with Your Suppliers">How to Use Tech to Improve Your Relationship with Your Suppliers</a></h3> <div class="td-module-meta-info"> <span class="td-post-date"><time class="entry-date updated td-module-date" datetime="2020-09-14T13:21:38+00:00" >September 14, 2020</time></span> </div> </div> </div> </div> </div> <!-- Theme: Newspaper by tagDiv.com 2017 Version: 9.2 (rara) Deploy mode: deploy uid: 5f73ccb94be8c --> <script type='text/javascript' id='contact-form-7-js-extra'> /* <![CDATA[ */ var wpcf7 = {"apiSettings":{"root":"https:\/\/techbizweb.com\/wp-json\/contact-form-7\/v1","namespace":"contact-form-7\/v1"}}; /* ]]> */ </script> <script type='text/javascript' src='https://techbizweb.com/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=5.2.2' id='contact-form-7-js'></script> <script type='text/javascript' src='https://www.google.com/recaptcha/api.js?render=6LcDBsAZAAAAAO6pr7SKUaBYk6d-dhwzlXSlc_RO&ver=3.0' id='google-recaptcha-js'></script> <script type='text/javascript' id='wpcf7-recaptcha-js-extra'> /* <![CDATA[ */ var wpcf7_recaptcha = {"sitekey":"6LcDBsAZAAAAAO6pr7SKUaBYk6d-dhwzlXSlc_RO","actions":{"homepage":"homepage","contactform":"contactform"}}; /* ]]> */ </script> <script type='text/javascript' src='https://techbizweb.com/wp-content/plugins/contact-form-7/modules/recaptcha/script.js?ver=5.2.2' id='wpcf7-recaptcha-js'></script> <script type='text/javascript' src='https://techbizweb.com/wp-content/themes/Newspaper/js/tagdiv_theme.min.js?ver=9.2' id='td-site-min-js'></script> <script type='text/javascript' src='https://techbizweb.com/wp-includes/js/comment-reply.min.js?ver=5.5.1' id='comment-reply-js'></script> <script type='text/javascript' src='https://techbizweb.com/wp-includes/js/wp-embed.min.js?ver=5.5.1' id='wp-embed-js'></script> <!-- JS generated by theme --> <script> (function(){ var html_jquery_obj = jQuery('html'); if (html_jquery_obj.length && (html_jquery_obj.is('.ie8') || html_jquery_obj.is('.ie9'))) { var path = 'https://techbizweb.com/wp-content/themes/Newspaper/style.css'; jQuery.get(path, function(data) { var str_split_separator = '#td_css_split_separator'; var arr_splits = data.split(str_split_separator); var arr_length = arr_splits.length; if (arr_length > 1) { var dir_path = 'https://techbizweb.com/wp-content/themes/Newspaper'; var splited_css = ''; for (var i = 0; i < arr_length; i++) { if (i > 0) { arr_splits[i] = str_split_separator + ' ' + arr_splits[i]; } //jQuery('head').append('<style>' + arr_splits[i] + '</style>'); var formated_str = arr_splits[i].replace(/\surl\(\'(?!data\:)/gi, function regex_function(str) { return ' url(\'' + dir_path + '/' + str.replace(/url\(\'/gi, '').replace(/^\s+|\s+$/gm,''); }); splited_css += "<style>" + formated_str + "</style>"; } var td_theme_css = jQuery('link#td-theme-css'); if (td_theme_css.length) { td_theme_css.after(splited_css); } } }); } })(); </script> <div id="tdw-css-writer" style="display: none" class="tdw-drag-dialog tdc-window-sidebar"> <header> <a title="Editor" class="tdw-tab tdc-tab-active" href="#" data-tab-content="tdw-tab-editor">Edit with Live CSS</a> <div class="tdw-less-info" title="This will be red when errors are detected in your CSS and LESS"></div> </header> <div class="tdw-content"> <div class="tdw-tabs-content tdw-tab-editor tdc-tab-content-active"> <script> (function(jQuery, undefined) { jQuery(window).ready(function() { if ( 'undefined' !== typeof tdcAdminIFrameUI ) { var $liveIframe = tdcAdminIFrameUI.getLiveIframe(); if ( $liveIframe.length ) { $liveIframe.load(function() { $liveIframe.contents().find( 'body').append( '<textarea class="tdw-css-writer-editor" style="display: none"></textarea>' ); }); } } }); })(jQuery); </script> <textarea class="tdw-css-writer-editor td_live_css_uid_1_5f73ccb94d062"></textarea> <div id="td_live_css_uid_1_5f73ccb94d062" class="td-code-editor"></div> <script> jQuery(window).load(function (){ if ( 'undefined' !== typeof tdLiveCssInject ) { tdLiveCssInject.init(); var editor_textarea = jQuery('.td_live_css_uid_1_5f73ccb94d062'); var languageTools = ace.require("ace/ext/language_tools"); var tdcCompleter = { getCompletions: function (editor, session, pos, prefix, callback) { if (prefix.length === 0) { callback(null, []); return } if ('undefined' !== typeof tdcAdminIFrameUI) { var data = { error: undefined, getShortcode: '' }; tdcIFrameData.getShortcodeFromData(data); if (!_.isUndefined(data.error)) { tdcDebug.log(data.error); } if (!_.isUndefined(data.getShortcode)) { var regex = /el_class=\"([A-Za-z0-9_-]*\s*)+\"/g, results = data.getShortcode.match(regex); var elClasses = {}; for (var i = 0; i < results.length; i++) { var currentClasses = results[i] .replace('el_class="', '') .replace('"', '') .split(' '); for (var j = 0; j < currentClasses.length; j++) { if (_.isUndefined(elClasses[currentClasses[j]])) { elClasses[currentClasses[j]] = ''; } } } var arrElClasses = []; for (var prop in elClasses) { arrElClasses.push(prop); } callback(null, arrElClasses.map(function (item) { return { name: item, value: item, meta: 'in_page' } })); } } } }; languageTools.addCompleter(tdcCompleter); window.editor = ace.edit("td_live_css_uid_1_5f73ccb94d062"); window.editor.$blockScrolling = Infinity; // 'change' handler is written as function because it's called by tdc_on_add_css_live_components (of wp_footer hook) // We did it to reattach the existing compiled css to the new content received from server. window.editorChangeHandler = function () { //tdwState.lessWasEdited = true; window.onbeforeunload = function () { if (tdwState.lessWasEdited) { return "You have attempted to leave this page. Are you sure?"; } return false; }; var editorValue = editor.getSession().getValue(); editor_textarea.val(editorValue); if ('undefined' !== typeof tdcAdminIFrameUI) { tdcAdminIFrameUI.getLiveIframe().contents().find('.tdw-css-writer-editor:first').val(editorValue); // Mark the content as modified // This is important for showing info when composer closes tdcMain.setContentModified(); } tdLiveCssInject.less(); }; editor.getSession().setValue(editor_textarea.val()); editor.getSession().on('change', editorChangeHandler); editor.setTheme("ace/theme/textmate"); editor.setShowPrintMargin(false); editor.getSession().setMode("ace/mode/less"); editor.getSession().setUseWrapMode(true); editor.setOptions({ enableBasicAutocompletion: true, enableSnippets: true, enableLiveAutocompletion: false }); } }); </script> </div> </div> <footer> <a href="#" class="tdw-save-css">Save</a> <div class="tdw-more-info-text">Write CSS OR LESS and hit save. CTRL + SPACE for auto-complete.</div> <div class="tdw-resize"></div> </footer> </div> </body> </html>