After many suggestions, we decide to setup a blog to better communicate with our users. Expect updates from http://sucuri.net and some security-related posts from us.
You May Also Like
How Do Websites Get Hacked?
- Mike Martens
- March 25, 2021
As much as the web has grown, surprisingly not a lot has changed in how websites get hacked. The most important thing you can do…
SSL Within the Context of Website Security
- Allison Bondi
- October 19, 2021
There is a common misconception that if someone adds SSL (Secure Sockets Layer) to their blog site or company website then it will protect them…
Trojan Spyware and BEC Attacks
- Luke Leal
- March 3, 2021
When it comes to an organization’s security, business email compromise (BEC) attacks are a big problem. One primary reason impacts are so significant is that…
“Google Fonts” popup leads to malware
- Luke Leal
- September 10, 2018
A recent malware injection in a client\’s WordPress file was found to be targeting website visitors that were using the Google Chrome browser to access…
The Anatomy of Website Malware Part 2: Credit Card Stealers
- Peter Gramantik
- December 30, 2019
One of the biggest malicious trends in the last few months and years are credit card stealers — also commonly referred to as credit card…
Redirects to YouTube Defacement Channel
- Luke Leal
- October 13, 2020
During a recent investigation, we found an infected website was redirecting to YouTube after its main index.php file had been modified to include the following…
Understanding Website SQL Injections
- Ashley Sand
- January 17, 2022
SQL injection is one of the most common types of web hacking techniques used today. As data breaches continue to happen to some of the…
Referral Program Update – Now Offering Agency Plan
- Chase Watts
- May 18, 2018
Sucuri’s main objective is to make the internet a safer place for everyone. With that in mind, we created a Referral Program, which gives you…
Beware of Unverified TLS Certificates in PHP & Python
- Peter Kankowski
- March 31, 2016
Web developers today rely on various third-party APIs. For example, these APIs allow you to accept credit card payments, integrate a social network with your…
PCI for SMB: Requirement 12 – Maintain an Information Security Policy
- Victor Santoyo
- April 19, 2019
Update: Read our new PCI Compliance guide. Welcome to the final post to conclude our series on understanding the Payment Card Industry Data Security Standard–PCI…
2 comments
“/>
“/>
[click here](javascript:alert(document.domain))
Comments are closed.