Cryptocurrency mining malware is typically a stealthy malware that farms the resources on a system (computers, smartphones, and other electronic devices connected to the internet)…
When considering why hackers are attacking websites, you might think that there’s a specific reason they target you as a website owner—your business, your reputation,…
What are internet cookies, how should you feel about them? Are they helpful, harmless, dangerous? Cookies are key to our modern online experience with targeted…
Recently, one of our analysts @kpetku came across a series of semi-randomised malware injections in multiple WordPress environments. Typical of spam redirect infections, the malware…
Most of us are already familiar with phishing: A common type of internet scam where unsuspecting victims are conned into entering their real login credentials…
Can you think of an online service that doesn’t require a password? Everything on the internet requires a password. However, constantly creating and remembering new…
While unpatched installations of Magento 2 contain many vulnerabilities, I’m going to focus my attention on Magento 1 for this article. This is because Magento…
From answering beginner questions like ‘What is SEO spam?’ to breaking down the spammers’ code and exactly how they hide their injections in compromised websites,…
Adobe has recently released several critical security patches for both their open source and commercial versions of their ecommerce platform. There are a total of…