Fake Media Download Sites

12222015_FakeDownloadSites_v2

Your website is a huge part of your brand reputation. It serves as a place to build your audience and helps you get noticed by new visitors from search engines. You spend time working hard to build authority and trustworthiness. When your pages rank
Read More

Using WPScan: Finding WordPress Vulnerabilities

Usingwpscan_blog

When using WPScan you can scan your WordPress website for known vulnerabilities within the core version, plugins, and themes. You can also find out if any weak passwords, users, and security configuration issues are present. The database at
Read More

Vulnerability Details: Joomla! Remote Code Execution

1-sessions

The Joomla! team released a new version of Joomla! CMS yesterday to patch a serious and easy to exploit remote code execution vulnerability that affected pretty much all versions of the platform up to 3.4.5. As soon as the patch was released, we were
Read More

Critical 0-day Remote Command Execution Vulnerability in Joomla

Disclosure-Image---Joomla!

The Joomla security team have just released a new version of Joomla to patch a critical remote command execution vulnerability that affects all versions from 1.5 to 3.4. This is a serious vulnerability that can be easily exploited and is already
Read More

Website Malware – Evolution of Pseudo Darkleech

DarkLeech

Last March we described a WordPress attack that was responsible for hidden iframe injections that resembled Darkleech injections: declarations of styles with random names and coordinates, iframes with No-IP host names, and random dimensions where the
Read More

Server Security: OSSEC Updated With GeoIP Support

OSSEC HIDS GeoIP

We leverage OSSEC extensively to help monitor and protect our servers. If you are not familiar with OSSEC, it is an open source Host-Based Intrusion Detection System (HIDS); it has a powerful correlation and analysis engine that integrates log
Read More

Increased Popularity in DDoS Extortion Campaigns

DDoS BitCoin Ransom

Over the past few months, our security operations group have identified and mitigated an increasing number of DDoS attacks tied to extortion attempts from different cyber crime groups, including DD4BC, Armada Collective and a few more unnamed ones.
Read More

Sucuri += HTTP/2 — Announcing HTTP/2 Support

HTTP2_Blog_V1r2

We are happy to announce that we are now offering HTTP/2 support to all clients using our Website Firewall (CloudProxy) product. Our own site already supports HTTP/2 (including this blog) and we will be rolling out HTTP/2 to all account dashboards
Read More

Unwanted Software and Harmful Programs

Unwanted Software Google Blacklist

We frequently clean blacklisted websites and submit reconsideration requests to have them de-listed. We have encountered many kinds of blacklist warnings including search engines, anti-virus programs, firewalls and and e-mail spam. Recently I came
Read More

Spam Campaign Causes “DDoS” by Googlebot

11032015_GoogleBotDDos_Blog

Every once in a while we get a glimpse into rare and strange behavior that doesn't involve the website being hacked, but causes major problems for website owners. We have spoken recently about malicious referral spam in Google Analytics and Google
Read More