A malicious PHP script, aptly given the name “Magento Killer” by its creator(s), has been found targeting Magento websites. While it doesn’t actually kill the…
WordPress activity logs can be helpful when troubleshooting or trying to identify a hack. In this article, you’ll learn about the seven things you should…
The WordPress plugin WP Statistics, which has an active installation base of 500k users, has an unauthenticated stored XSS vulnerability on versions prior to 12.6.7.…
Nowadays, DDoS is a pretty recognizable term. Though many webmasters don’t know exactly what a DDoS attack is—its method is very subtle to identify—they’re pretty…
Across various social media platforms there are verification checkmark symbols that appear near the name of the account’s page we view. For example, this verified…
We recently found this malware on a windows hosting server where the web.config file was modified with the following code. The code redirects multiple user…
There appears to be a general misunderstanding among internet users about the difference between malware and viruses. The two terms are often used interchangeably and…