TimThumb Attacks: The Scale of Legacy Malware Infections

These days, we consider a malware campaign massive if it affects a couple thousand websites. However, back in the day when Sucuri first started its operations, the scale of infections was significantly larger — and it was quite typical to see hu… Continue reading TimThumb Attacks: The Scale of Legacy Malware Infections

How Eradicating EV Certificates Will Change the Internet Landscape

EV certificates help provide user assurance and foment trust. Removing them would open to the door to greater security issues. When it comes to web browser security, we’ve all been told that a padlock icon means that the website we’re visiting is secu… Continue reading How Eradicating EV Certificates Will Change the Internet Landscape

Magecart Hackers Compromise 80 More eCommerce Sites to Steal Credit Cards

Cybersecurity researchers have discovered over 80 Magecart compromised e-commerce websites that were actively sending credit card information of online shoppers to the attackers-controlled servers.

Operating their businesses in the United States, Cana… Continue reading Magecart Hackers Compromise 80 More eCommerce Sites to Steal Credit Cards

Internet Cookies: What Are They and Are They Good or Bad?

Cookies! I LOVE Cookies. Oatmeal raisin are one of my particular favorite flavors.
However, we’re not here to talk about baked goods as much as I’d love to. We’re here to talk about itty bitty little files stored on your local machin… Continue reading Internet Cookies: What Are They and Are They Good or Bad?

How Domain Expiration Can Potentially Disrupt Other Websites

A website owner recently reached out to us about a pop-up advertisement problem on their website which occurred any time someone clicked anywhere on the web page.
This irritating pop-up didn’t come from malware placed in the website’s file… Continue reading How Domain Expiration Can Potentially Disrupt Other Websites

The Largest DDoS Attacks & What You Can Learn From Them

A DDoS (Distributed Denial of Service) is an attack that focuses on making the website unavailable to its legitimate users. DDoS attacks can produce service interruptions, introduce large response delays, and cause various business losses.
Denial… Continue reading The Largest DDoS Attacks & What You Can Learn From Them

Google, Mozilla, Apple Block Kazakhstan’s Root CA Certificate to Prevent Spying

In a move to protect its users based in Kazakhstan from government surveillance, Google, Apple and Mozilla finally today came forward and blocked Kazakhstan’s government-issued root CA certificate within their respective web browsing software.

Startin… Continue reading Google, Mozilla, Apple Block Kazakhstan’s Root CA Certificate to Prevent Spying

Sucuri Can Help Secure Your Client Websites

At Sucuri, we understand that most web professionals and web agencies ultimately need to make their clients part of the decision-making process for choosing to secure their sites.
Overall, website security sounds like a good thing, but how do you posi… Continue reading Sucuri Can Help Secure Your Client Websites

What Hackers Do After Gaining Access to a Website

A hack or cyber attack is the act of maliciously entering, taking control over, or manipulating by force a web application, server, or file that belongs to someone else.
Cyber attacks will:

modify files,
retrieve information,
insert commands or scrip… Continue reading What Hackers Do After Gaining Access to a Website