Global CyberSecurity
WordPress Admin Creator – A Simple, But Effective Attack
Post Views: 865 Malicious admin users get added to vulnerable WordPress sites often. This can happen in a variety of different ways, and ...
Global CyberSecurity
What We’ve Learned About SSH Brute Force Attacks
Post Views: 982 The first time I encountered brute force attacks I was a hosting specialist who received calls from frustrated site owners ...
Global CyberSecurity
Why You Shouldn’t Use SMS For 2FA
Post Views: 957 Two factor authentication (2FA) provides an extra layer of security that passwords alone can’t provide. Requiring an extra step for ...
Global CyberSecurity
An Overview of Website Reinfection Vectors
Post Views: 917 The website security landscape is as complicated as it is treacherous. We often deal with clients who become reinfected over ...
Global CyberSecurity
What is a Website Backdoor?
Post Views: 851 What is a Backdoor? A backdoor provides a shortcut for authorized or unauthorized users to gain access to an unauthorized ...
Global CyberSecurity
Fake Ransomware Infection Spooks Website Owners
Post Views: 873 Starting this past Friday we have seen a number of websites showing a fake ransomware infection. Google search results for ...
Global CyberSecurity
Understanding .htaccess Malware
Post Views: 808 The .htaccess file is notorious for being targeted by attackers. Whether it’s using the file to hide malware, redirect search ...