Attackers often aim to conceal their presence using different methods, such as injecting redirect scripts, creating spam pages, or hiding a mailer in checkout pages…
Hackers are constantly scanning the internet for exploitable sites, which is why even small, new sites should be fully patched and protected. At the same…
For years, Google has been actively seeking ways to encourage website owners to implement SSL certificates. SSL allows websites to be accessed over HTTPS, which…
Recently, during an incident response process, we worked on an interesting Magento website. This site was reported to having a strange redirection when users visited…
During an incident response investigation, we detected an interesting backdoor that was small but had the potential to give the attacker full access to your…
We’ve covered a lot of personal security practices, but many people forget how important it is to secure mobile devices, which are riddled with personal…
When talking about compromised environments, we often think that the website itself is the end goal but that’s not always true. In some cases, attackers…