Global CyberSecurity
Abandoned US Congressional Website Used in Asian Gambling Spam Infection
Post Views: 385 Website owners and developers tend to buy a lot of domains. With different projects on the go and working with ...
Global CyberSecurity
How to Scan A Website for Vulnerabilities
Post Views: 531 Even the most diligent site owners should consider when they had their last website security check. As our own research ...
Global CyberSecurity
How to Recognize & Avoid Phishing Emails: A Cautionary Tale
Post Views: 541 We’ve all received spam and phishing emails — our inboxes are often full of them. They let us know that ...
Global CyberSecurity
Massive Google Colaboratory Abuse: Gambling and Subscription Scam
Post Views: 546 This investigation started with a small and quite simple piece of PHP malware found on a hacked website. We located ...
Global CyberSecurity
Malicious Injection Redirects Traffic via Parked Domain
Post Views: 548 During a recent investigation, our malware remediation team encountered a variant of a common malware injection that has been active ...
Global CyberSecurity
How to Harden WordPress: A Basic Overview
Post Views: 595 Out-of-the-box security configurations tend to not be very secure. This is usually true for all software and WordPress is no ...
Global CyberSecurity
What is php.ini? Where It’s Located, How to Edit & Common Directives
Post Views: 2,723 The php.ini file, a critical configuration file containing your web server’s PHP settings, is integral to the functioning of your ...