We submit hundreds of blacklist review requests every day after cleaning our clients’ websites. Google’s Deceptive Content warning applies when Google detects dangerous code that…
When a website is compromised, one of the most interesting and challenging tasks we perform is identifying all malware to prevent attackers from regaining access…
We’ve already described several times how credit card stealing malware hides a data collecting script behind an image URL. When people see URLs that end…
If you own a website and collaborate with others, the principle of least privilege should never be questioned. It is a computer science principle which…
Some attackers seem to like signing their scripts. This fact is especially true for defacements and backdoors, where attackers show their pride stating that they…
Recently we’ve seen some WordPress websites displaying unwanted banners at the bottom of the page which appear 15 seconds after browsing the website. Those banners…
During an incident response process, we identified some files located at a website’s root folder. Although they had different filenames (post.php, news.php, home.php, etc), they…
Attackers work hard to make their code very well hidden from the victim and antivirus products, however they might leave some fingerprints (usually not on…