Security Education

Understanding & Stopping Malicious Redirects

Many website owners don’t know they’re infected with malicious redirects until they start getting calls from wary customers. Instead of…

7 months ago

Steam Phishing Campaign Uses CS:GO Skin Gambling Lure

Attackers regularly target online gaming accounts as they can quickly sell any transferable items along with account logins to a…

7 months ago

What is FTP? Why use it to clean hacked websites?

The File Transfer Protocol (FTP) is a network protocol used to transfer files between a client server and a network.…

7 months ago

YouTube Account Recovery Phishing

Phishing attacks against targeted channels have been successful in the past, as explained last year on ZDNet. Recently, our Remediation…

7 months ago

Phishing Campaign Targets Poste Italiane & SMS OTP Verification

When creating phishing lures, attackers may cite recent major regulatory changes within the context of their social engineering scheme to…

8 months ago

What is Geolocation?

The Firewall service deploys various heuristic checks and methods to protect your site. One of our most popular security settings,…

8 months ago

What is online gambling spam and what can I do about it?

When it comes to online gambling spam, first think about fantasies of fame and fortune. Who hasn’t imagined defying the…

8 months ago

Top 10 Hacks & Attacks from 2019

Last year was a busy one in the world of website security. Our 2019 Threat Research Report shows that over…

9 months ago

Analyzing & Decrypting L4NC34’s Simple Ransomware

We’re constantly seeing news about computers being infected by ransomware, but very little do we hear about it affecting websites.…

9 months ago

How to Find & Fix the Japanese Keyword Hack

If you’re wondering how to find and fix the Japanese keyword hack, get started by identifying a real-life example. First,…

9 months ago