Attackers are always trying to come up with new ways to evade detection from the wide range of security controls…
We have already shared examples of many kinds of malware that rely on an external gateway to receive or return…
We’ve seen a wider variety of PHP web shells being used by attackers this year — including a number of…
During malware analysis, we regularly find variations of this injected script on various compromised websites: . The variable “_0x446d” assigns…
This summer, MalwareBytes researcher Jérôme Segura wrote an article about how criminals use image files (.ico) to hide JavaScript credit…
When we started Sucuri we set out to make enterprise security accessible, affordable, and effective for every day webmasters. It…
For every gleaming new IoT device that hits the market, a hacker somewhere is figuring out how to compromise it.…
A PHP shell containing multiple functions can easily consist of thousands of lines of code, so it’s no surprise that…
In the spirit of National Cyber Security Awareness Month (NCSAM), let’s talk about a security basic that many people overlook:…
Shopping season is here, and so is the opportunity for ecommerce site owners to grow their business and generate revenue.…