After many suggestions, we decide to setup a blog to better communicate with our users. Expect updates from http://sucuri.net and some security-related posts from us.
You May Also Like
The Importance of Website Logs
Krasimir Konov
- February 19, 2019
As a security company, we deal with a lot of compromised websites. Unfortunately, in most cases, we have limited access to customer logs, which is…
7 Things You Should Monitor in WordPress Activity Logs
Victor Santoyo
- July 8, 2019
WordPress activity logs can be helpful when troubleshooting or trying to identify a hack. In this article, you’ll learn about the seven things you should…
Are all Websites Hackable? Why (not)?
Ashley Sand
- February 4, 2022
Frankly, no security is 100% secure. As infections continue to surge across the web, and attackers think of more innovative ways to remain undetected, many…
What is Cryptocurrency?
Stephen Johnston
- September 22, 2021
Cryptocurrency is best thought of as a digital currency that only exists on computers. It is transferred between peers (there is no middleman like a…
Why is Your Website a Target? The SEO Value of a Website
Douglas Santos
- June 24, 2019
Website security is what we eat, sleep, and breathe. It’s what we do best because we deal with hacked websites every single day, thousands of…
GitHub Hosts Infostealers Part 2: Cryptominers and Credit Card Stealers
Denis Sinegubko
- March 21, 2018
Update – March 28th, 2018: The fake Flash update files referenced in this post have been moved from GitHub to port.so[.]tl, and the bit.wo[.]tc script…
Hiding malicious code from the user using white spaces
Yuliyan Tsvetkov
- February 14, 2017
Over the years, attackers have used different techniques for hiding malicious files on websites. They obfuscated code, changed legit functions to execute malware, modified whole…
How to Secure & Harden Your Joomla! Website in 12 Steps
Victor Santoyo
- October 4, 2022
At Sucuri, we’re often asked how website owners and webmasters can secure their websites. However, advice can often be too broad; different content management systems…
Closed Source E-commerce Platforms Can Be Compromised
Krasimir Konov
- June 3, 2019
These days, the majority of store owners opt-in for the easiest closed-source ecommerce platform options. For the most part, these platforms typically allow users to…
What Are Ethical Hackers?
Alycia Mitchell
- October 11, 2019
There’s an issue with how some people define the word “hacker.” For some, it’s a word synonymous with “cybercriminal,” but not in the infosec community.…
2 comments
“/>
“/>
[click here](javascript:alert(document.domain))
Comments are closed.