During an active research investigation, we found an interesting bash script described by the author as Clean Logs After Rooting. This script is used once…
Our team recently came across a password changer for WordPress that allows attackers to modify WordPress user passwords within a compromised environment. By default, the…
Editorial: This post was last updated 13th, 2022. What is 2FA? Two-factor authentication (2FA) offers a second layer of security to help protect an account…
As a company that’s dedicated to providing high-quality website security, we like to partner with like-minded companies that understand how important this is. Website security…
Protecting our users’ information and privacy is extremely important to us. As a cloud-based security service, we’re fully committed to complying with the requirements of…
This is a story about the SoakSoak malware campaign that proved that you can’t underestimate impact of security issues in popular premium software. These days,…
In past posts, we’ve discussed the more popular reasons why hackers target smaller websites. Today, we’ll focus instead on how hackers use compromised websites to…