We just added two tools to generate OSSEC rules online.
You May Also Like
What Motivates Website Malware Attacks?
Ben Martin
- May 28, 2025
The depiction in the media of hackers tends to be that of balaclava-wearing villains who type furiously in a dark basement, motivated by nothing but…
Malicious One-Liner Using Hastebin
Krasimir Konov
- September 23, 2020
Short scripts that deliver malware to a website are nothing new, but during a recent investigation we found a script using hastebin[.]com, which is a…
Closed Source E-commerce Platforms Can Be Compromised
Krasimir Konov
- June 3, 2019
These days, the majority of store owners opt-in for the easiest closed-source ecommerce platform options. For the most part, these platforms typically allow users to…
What is Cryptocurrency Mining Malware?
Stephen Johnston
- September 28, 2021
Cryptocurrency mining malware is typically a stealthy malware that farms the resources on a system (computers, smartphones, and other electronic devices connected to the internet)…
What is Steganography? (Or, How Hackers Hide Malware On Websites)
Rianna MacLeod
- May 2, 2023
As a child, I loved sending secret messages to my friends using invisible ink. A quick squeeze of lemon juice was all I needed to…
Top 10 Security Tips to Keep Your WordPress Site Healthy
Allison Bondi
- February 9, 2022
As we go through the winter months and whether changes, many of us go to our local pharmacy and take advantage of a flu shot.…
Fixing “Uncommon Download” Warnings in Google Search Console
Alycia Mitchell
- February 3, 2020
Over the past few months, a lot of website owners have received “uncommon download” warnings from Google Search Console. These warnings can be vague, often…
New Guide on How to Clean a Hacked Drupal Sites
Alycia Mitchell
- July 11, 2017
Drupal is an open-source content management system and website builder with a unique structure that allows it to be highly flexible and extendible. For these…
Understanding CSRF: Cross-site Request Forgery Explained
Kyle Knight
- May 14, 2025
Cross-Site Request Forgery, often called CSRF (or its other nicknames, Session Riding and XSRF), is a tricky type of attack. In short, it lets attackers…
Why Hackers Create Phishing Campaigns
Antony Garand
- December 9, 2019
Phishing is a malicious attempt to obtain personally identifiable information of a victim. The first thing to keep in mind about phishing is the goal…