Chrome for Android Enables Site Isolation Security Feature for All Sites with Login

After enabling ‘Site Isolation’ security feature in Chrome for desktops last year, Google has now finally introduced ‘the extra line of defence’ for Android smartphone users surfing the Internet over the Chrome web browser.

In brief, Site Isolation is… Continue reading Chrome for Android Enables Site Isolation Security Feature for All Sites with Login

Feds Shut Down Largest Dark Web Child Abuse Site; South Korean Admin Arrested

The United States Department of Justice said today that they had arrested hundreds of criminals in a global crackdown after taking down the largest known child porn site on the dark web and tracing payments made in bitcoins.

With an international coal… Continue reading Feds Shut Down Largest Dark Web Child Abuse Site; South Korean Admin Arrested

Down the Malware Rabbit Hole – Part 1

It’s common for malware to be encoded to hide itself—or its true intentions—but have you ever given thought to what lengths attackers will go to hide their malicious code?
In our first post in this series, we’ll describe how ba… Continue reading Down the Malware Rabbit Hole – Part 1

A New Wave of Buggy WordPress Infections

We’ve been following an ongoing malware campaign for the past couple of years now. This campaign is renowned for its prompt addition of exploits for newly discovered WordPress theme and plugin vulnerabilities.
Every other week, the attackers int… Continue reading A New Wave of Buggy WordPress Infections

Zero-Day RCE in vBulletin v5.0.0-v5.5.4

A new remote code execution (RCE) zero-day vulnerability has been disclosed by an anonymous researcher on the Full Disclosure mailing list this past Monday.
This vulnerability is extremely severe. It allows any website visitors to run PHP code an… Continue reading Zero-Day RCE in vBulletin v5.0.0-v5.5.4

Joomla! Security Best Practices: 12 Ways to Keep Joomla! Secure

At Sucuri, we’re often asked how website owners and webmasters can secure their websites. However, most advice can often be too broad; different content management systems (CMS) exist in this ecosystem, and each requires a unique security config… Continue reading Joomla! Security Best Practices: 12 Ways to Keep Joomla! Secure