Localization and Customization of Credit Card Stealing Malware

Credit card stealing malware is becoming more and more customized. We’ve been regularly seeing injected scripts with URLs that either mimic or include a portion of the victim’s site domain. Sometimes the injected code also references the v… Continue reading Localization and Customization of Credit Card Stealing Malware

10 Steps to Recover from a Hacked Website

A website getting hacked isn’t really news today; it has become an almost common thing. So, what should you do if your website is hacked? How can you work on recovering things and bouncing back? Well, it’s not that difficult. Here’s a… Continue reading 10 Steps to Recover from a Hacked Website

What is Phishing?

Phishing is a serious threat to any industry. We have seen this topic appear in the news more each day. You might have already received a fraudulent email from what seemed to be your bank or even seen the hacking that took place during the 2016 U… Continue reading What is Phishing?

Navigating Data Responsibility

As we take a step back and think about how much the Internet has grown over the past 20 years, we realize how much content/data has been made available to everyone.
Moving forward, there’s no reason to expect data availability to slow down. In f… Continue reading Navigating Data Responsibility

A Scam-Free Cyber Monday for Online Businesses

Every year we see an increase in website attacks during the holidays. 
While business owners see their sales go up due to promotional Black Friday and Cyber Monday campaigns, hackers are in the background working nonstop to create malicious,&#160… Continue reading A Scam-Free Cyber Monday for Online Businesses

PCI for SMB: Requirement 9 – Implement Strong Access Control Measures

Welcome to the sixth post of a series on understanding the Payment Card Industry Data Security Standard–PCI DSS. We want to show how PCI DSS affects anyone going through the compliance process using the PCI SAQ’s (Self Assessment Questionn… Continue reading PCI for SMB: Requirement 9 – Implement Strong Access Control Measures

Real-Time Fine-Tuning of the WAF via API

Though the Sucuri Firewall is simple to set up and protects your website immediately, it’s possible to have granular control of the WAF by using an API.
For instance, there’s a specific filter inside the WAF dashboard called Emergency DDoS… Continue reading Real-Time Fine-Tuning of the WAF via API

Hackers Change WordPress Siteurl to Pastebin

Last Friday, we reported on a hack that used a vulnerability in the popular WP GDPR Compliance plugin to change WordPress siteurl settings to erealitatea[.]net. At that time it was not clear who was behind the massive attack, since the erealitatea[.]n… Continue reading Hackers Change WordPress Siteurl to Pastebin

10 Tips to Improve Your Website Security

Having a website has become easier than ever due to the proliferation of great tools and services in the web development space. Content management systems (CMS) like WordPress, Joomla!, Drupal, Magento, and others allow business owners to build an onl… Continue reading 10 Tips to Improve Your Website Security