We just added two tools to generate OSSEC rules online.
You May Also Like
Release the Prisoners – Rename .Suspected Backdoors
- January 3, 2017
When webmasters or hosting companies look for malware, they usually search for encrypted code, encoded payloads, suspicious functions and much more. If they happen to…
Password Attacks 101
- June 11, 2021
According to the 2020 Data Breaches report by Verizon, 25% of all breaches involved the use of stolen credentials. And for small businesses, that number…
WordPress Hacks: 5 Ways to Protect WordPress from Hacking
- May 31, 2019
WordPress is one of the most popular content management systems (CMS) out there. That’s why it is vital to prevent WordPress hacking. Statistically, over 33%…
Manually Identifying an X-Cart Credit Card Skimmer
- May 5, 2022
During a recent investigation, a new client came to us reporting that their antivirus had detected a suspicious domain loading on their website’s checkout page.…
Steps to Keep Your Site Clean: Access Points
- March 13, 2018
Unfortunately, most website owners know what it’s like to have a site hacked – the panic, the rush to find anyone out there that can…
New Drupal Website Security Best Practices Guide
- May 7, 2020
When it comes to content management systems (CMS) for websites, Drupal is a highly flexible and extendible open-source solution. It is often preferred by technical…
Top 10 Website Hardening Tips
- October 14, 2019
Website hardening means adding layers of protection to reduce the risk of website attacks, a process known as “defense in depth.” Here are our top…
Shifting Malware Tactics & Use of Non-Executable .txt & .log Files
- Last Updated: March 4, 2024
The malware landscape is constantly evolving — and bad actors are always devising new techniques to evade detection. Our analysts most commonly find website malware…
Analysis of a Phishing Kit (that targets Chase Bank)
- September 1, 2021
Most of us are already familiar with phishing: A common type of internet scam where unsuspecting victims are conned into entering their real login credentials…
How to Protect Personally Identifiable Information (PII) from Search Engines
- March 30, 2020
In today’s internet age we take our privacy for granted. We sign up for many services which are “free.” We participate in giveaways and generally…









