Global CyberSecurity
The Dangers of Using Abandoned Plugins & Themes
Post Views: 891 It’s not very often that we see abandoned components being used on a website — but when we do, it’s ...
Global CyberSecurity
Why You Should Monitor Your Website
Post Views: 855 In an effort to maintain unauthorized access or profit off a website’s environment long after an initial compromise, attackers commonly ...
Global CyberSecurity
Malware Dropper Takes Advantage of COVID-19 Pandemic
Post Views: 861 Since April, our team has been tracking the spread of a PHP malware dropper. It’s impacting unsuspecting victims who thought ...
Global CyberSecurity
Fake WordPress Functions Conceal assert() Backdoor
Post Views: 860 A few weeks ago, I was manually inspecting some files on a compromised website. While checking on a specific WooCommerce ...
Global CyberSecurity
Obfuscation Techniques in MARIJUANA Shell “Bypass”
Post Views: 867 Attackers are always trying to come up with new ways to evade detection from the wide range of security controls ...
Global CyberSecurity
“Free” Symchanger Malware Tricks Users Into Installing Backdoor
Post Views: 874 In a previous post, I discussed how attackers can trick website owners into installing malware onto a website — granting ...
Global CyberSecurity
Hackers Love Expired Domains
Post Views: 879 Sometimes, website owners no longer want to own a domain name and they allow it to expire without attempting to ...