After many suggestions, we decide to setup a blog to better communicate with our users. Expect updates from http://sucuri.net and some security-related posts from us.
You May Also Like
How to Use Splunk with Sucuri Audit Trails
- Jon Watson
- April 25, 2017
The Sucuri Firewall dashboard provides a rich set of API functions that can be used to control your firewall settings remotely. In addition, there is…
Malware vs Virus: What’s the Difference?
- Stephen Johnston
- June 21, 2019
There appears to be a general misunderstanding among internet users about the difference between malware and viruses. The two terms are often used interchangeably and…
CDN-Filestore Credit Card Stealer for Magento
- Krasimir Konov
- August 18, 2020
During a website remediation, we recently discovered a new version of a Magento credit card stealer which sends all compromised data to the malicious domain…
How to Know If You Are Under DDoS Attack
- Stephen Johnston
- July 1, 2019
Nowadays, DDoS is a pretty recognizable term. Though many webmasters don’t know exactly what a DDoS attack is—its method is very subtle to identify—they’re pretty…
Phishing the Right Phish
- Fernando Barbosa
- July 4, 2017
Social engineering techniques, like phishing, can be powerful in persuading users into performing specific actions or disclosing confidential information. In these types of scenarios, attackers…
Analyzing & Decrypting L4NC34’s Simple Ransomware
- Cesar Anjos
- April 6, 2020
We’re constantly seeing news about computers being infected by ransomware, but very little do we hear about it affecting websites. That being said, the impact…
Labs Notes Monthly Recap – Sep/2016
- Estevao Avillez
- October 6, 2016
Sharing what we learn in the form of content and tools has been a staple here at Sucuri since our inception. Our greatest challenge is having…
Dissecting the WordPress 5.2.3 Update
- Marc-Alexandre Montpas
- September 13, 2019
Last week, WordPress released version 5.2.3 which was a security and maintenance update, and as such, contained many security fixes. Part of our day to…
Outdated Duplicator Plugin RCE Abused
- Peter Gramantik
- September 14, 2018
We’re seeing an increase in the number of cases where attackers are disabling WordPress sites by removing or rewriting its wp-config.php file. These cases are all linked…
Common Website Hacking Techniques
- Rianna MacLeod
- December 5, 2023
Website hacking — the act of exploiting weaknesses to gain unauthorized access to a website, database, cPanel, or admin dashboard — is a reality that…
2 comments
“/>
“/>
[click here](javascript:alert(document.domain))
Comments are closed.