Authentication and authorization – they sound alike, often get used interchangeably, and are absolutely crucial for web application security. But let’s be real, getting them…
Many webmasters may not be aware that hackers are able to maliciously redirect cPanel pages. The specific tactic we describe in this article is unique.…
When a site gets hacked, the attack doesn’t end with the malicious payload or spam content. Hackers know that most website administrators will clean up…
Yesterday, Joomla! 3.6.4 was released, patching a critical privilege escalation and arbitrary account creation vulnerability. As we’ve seen some exploits attempts occurring in the wild,…
This past summer we noticed a trend of more and more Blackhat SEO hacks trying to verify additional accounts as owners of compromised sites in Google Search…
If you have poked around a server before you have probably encountered file permissions. In fact, all computer file systems offer permissions based on the…
In recent years there has been a proliferation of great tools and services in the web development space. Content management systems (CMS) like WordPress, Joomla!,…
Today we are launching the new and improved Protected Page capability in our Website Firewall. It allows for a simple (1-click) activation of secondary authentication…