While string concatenation has many valuable applications in development — such as making code more efficient or functions more effective…
We recently found a simple malicious script leveraging Magento’s internal functions to create a new admin user with the admin…
Fake WordPress plugins appear to be trending as an effective way of establishing a foothold on compromised websites. During a…
In today’s internet age we take our privacy for granted. We sign up for many services which are “free.” We…
While we deal with a lot of phishing cases, we rarely see mobile applications used as part of a phishing…
When cleaning websites, we regularly find phishing pages, malicious code injected into files, and SEO spam. However, over the past…
During a recent cleanup, we found an interesting malicious WordPress plugin, “WP Security”, that was being used to encrypt blog…
Logs can be very useful because they are a record of what was done by whom. They are especially useful…
These days, the majority of store owners opt-in for the easiest closed-source ecommerce platform options. For the most part, these…
As a security company, we deal with a lot of compromised websites. Unfortunately, in most cases, we have limited access…