After many suggestions, we decide to setup a blog to better communicate with our users. Expect updates from http://sucuri.net and some security-related posts from us.
You May Also Like
PCI for SMB: Requirement 12 – Maintain an Information Security Policy
Victor Santoyo
- April 19, 2019
Update: Read our new PCI Compliance guide. Welcome to the final post to conclude our series on understanding the Payment Card Industry Data Security Standard–PCI…
PCI Compliance, Penetration Testing, and the Sucuri WAF
Marc Kranat
- March 6, 2020
Our support team is often asked, “Can we test our site through the Sucuri Web Application Firewall?” The answer is always yes, with a caveat.…
Cronjob Backdoors
Cesar Anjos
- May 3, 2019
Attackers commonly rely on backdoors to easily gain reentry and maintain control over a website. They also use PHP functions to further deepen the level…
Cross-Origin Resource Sharing (CORS)
Rianna MacLeod
- June 10, 2024
Thanks to the rapid growth of JavaScript frameworks like Angular, React, and Vue, Cross-Origin Resource Sharing (CORS) has become a popular word in the developer’s…
PCI for SMB: Requirement 5 & 6 – Maintain a Vulnerability Management Program
Victor Santoyo
- September 6, 2018
Update: Read our new PCI Compliance guide. This is the fourth post in a series of articles on understanding the Payment Card Industry Data Security…
How to Find & Remove SEO Spam on WordPress
Art Martori
- February 20, 2020
Perhaps the best way to dive into the subject of finding and removing SEO spam on WordPress is with a quick experiment — probably one…
Fake AmeriCommerce Shopping Cart
Denis Sinegubko
- January 23, 2020
Our malware analyst Liam Smith recently found malware on a client’s site that targets ecommerce sites powered by AmeriCommerce software. A popular ecommerce software solution…
How to Know if Your Website Is Hacked
Kyle Knight
- September 27, 2024
Whether you manage a gaming blog, an e-commerce platform, or an enterprise-level website you probably want to be able to detect infections when they occur.…
How to Prevent SSH Brute Force Login Attacks
Rianna MacLeod
- April 20, 2023
What is an SSH brute force attack? A Secure Shell (SSH) brute force attack is a common form of attack that targets remote services, particularly…
How to Find & Fix the Japanese Keyword Hack
Art Martori
- April 2, 2020
If you’re wondering how to find and fix the Japanese keyword hack, get started by identifying a real-life example. First, open Google Translate, and then…
2 comments
“/>
“/>
[click here](javascript:alert(document.domain))
Comments are closed.