Security Education

Obfuscation Techniques in MARIJUANA Shell “Bypass”

Attackers are always trying to come up with new ways to evade detection from the wide range of security controls…

2 days ago

Evasive Maneuvers in Data Stealing Gateways

We have already shared examples of many kinds of malware that rely on an external gateway to receive or return…

3 weeks ago

ALFA TEaM Shell ~ v4.1-Tesla: A Feature Update Analysis

We’ve seen a wider variety of PHP web shells being used by attackers this year —  including a number of…

1 month ago

Legacy Mauthtoken Malware Continues to Redirect Mobile Users

During malware analysis, we regularly find variations of this injected script on various compromised websites: . The variable “_0x446d” assigns…

1 month ago

CSS-JS Steganography in Fake Flash Player Update Malware

This summer, MalwareBytes researcher Jérôme Segura wrote an article about how criminals use image files (.ico) to hide JavaScript credit…

1 month ago

Bridging the Gap Between Application and Network Security with CleanBrowsing

When we started Sucuri we set out to make enterprise security accessible, affordable, and effective for every day webmasters. It…

1 month ago

5 Places Where You’d Never Expect to Get Hacked

For every gleaming new IoT device that hits the market, a hacker somewhere is figuring out how to compromise it.…

1 month ago

P.A.S. Fork v. 1.0 — A Web Shell Revival

A PHP shell containing multiple functions can easily consist of thousands of lines of code, so it’s no surprise that…

1 month ago

Password Security & Password Managers

In the spirit of National Cyber Security Awareness Month (NCSAM), let’s talk about a security basic that many people overlook:…

1 month ago

Securing Your Online Store for the Holidays

Shopping season is here, and so is the opportunity for ecommerce site owners to grow their business and generate revenue.…

2 months ago