Global CyberSecurity
Server Side Data Exfiltration via Telegram API
Post Views: 53 One of the themes commonly highlighted on this blog includes the many creative methods and techniques attackers employ to steal ...
Global CyberSecurity
Magento 2 PHP Credit Card Skimmer Saves to JPG
Post Views: 60 Bad actors often leverage creative techniques to conceal malicious behaviour and harvest sensitive information from ecommerce websites. A recent investigation ...
Global CyberSecurity
Trojan Spyware and BEC Attacks
Post Views: 54 When it comes to an organization’s security, business email compromise (BEC) attacks are a big problem. One primary reason impacts ...
Global CyberSecurity
SQL Triggers in Website Backdoors
Post Views: 48 Over the past year, there’s been an increasing trend of WordPress malware using SQL triggers to hide malicious SQL queries ...
Global CyberSecurity
UCEPROTECT: When RBLs Go Bad
Post Views: 56 Realtime Blackhole Lists (RBLs) can be a great tool in your security arsenal. You may not know you’re using them, ...
Global CyberSecurity
Optimizing Performance and Behavior with WordPress and the Sucuri WAF
Post Views: 56 Aside from providing significant protection from a wide range of threats, the Sucuri WAF also acts as a CDN due ...
Global CyberSecurity
Whitespace Steganography Conceals Web Shell in PHP Malware
Post Views: 76 Last November, we wrote about how attackers are using JavaScript injections to load malicious code from legitimate CSS files. At ...