Backdoors are found in 72% of infected websites, according to our latest reports. Backdoors are files left on the server by attackers in order to retain…
This month, our Malware Research and Incident Response teams wrote about redirects that deliver malware and ads to visitors, as well as a backdoor method…
If you suffer multiple reinfections and your site is one of many in an account, the odds are high that you’re suffering from cross-site contamination.…
During an incident response investigation, we detected an interesting backdoor that was hidden in a fake image. The attacker was quite creative in creating an…
PHP contains an interesting but rarely used feature called Phar, which stands for PHp ARchive, that allows developers to package entire applications as a single…
Drupal is an open-source content management system and website builder with a unique structure that allows it to be highly flexible and extendible. For these…
Phishers usually want to protect their pages from being detected by search engines and security companies. To achieve that, they add .htaccess files that deny…
In a compromised environment, attackers may inject malicious code into different files, including the core of different CMSs, in order to maintain access to the…
Social engineering techniques, like phishing, can be powerful in persuading users into performing specific actions or disclosing confidential information. In these types of scenarios, attackers…