Network of platforms with bots on top botnet cybersecurity concept 3D illustration

The Challenges of DIY Botnet Detection – and How to Overcome Them

Botnets have been around for over two decades, and with the rise of the Internet of Things (IoT) they have spread further to devices no one imagined they would – printers, webcams, ...
Fragmented SQL Injection Attacks – The Solution

Fragmented SQL Injection Attacks – The Solution

Ask someone how they'd detect whether a SQL Injection vulnerability exists in a web application and they're likely to suggest putting a single quote into a parameter in the application. Then, if ...
OWASP Top 10  Security Risks – Part I

OWASP Top 10 Security Risks – Part I

It is National Cyber Security Awareness Month and in order to bring awareness to what threatens the integrity of websites, we would like to start a series of post on the OWASP ...
RSA 2018 – Chaos Engineering

RSA 2018 – Chaos Engineering

When surrounded with chaos, it is normal to cling to that which is comforting like a NGFW or SIEM. The post RSA 2018 – Chaos Engineering appeared first on Anitian ...
Explained: SQL injection

Explained: SQL injection

SQL injection is one of the most common attacks against businesses, with a high rate of success. So what can you do to prevent them? Categories: Business Security world Tags: breachcodedrop tableinjectionphp ...
Drinkman and Smilianets Sentenced: The End to Our Longest Databreach Saga?

Drinkman and Smilianets Sentenced: The End to Our Longest Databreach Saga?

On Thursday, February 15, 2018, we may have finally reached the end of the Albert Gonzalez Databreach Saga. Vladimir Drinkman, age 37, was sentenced to 144 months in prison, after pleading guilty ...
On the Anniversary of the Islamic Revolution, 30 Iranian News sites hacked to show death of Ayatollah Khamenei

On the Anniversary of the Islamic Revolution, 30 Iranian News sites hacked to show death of Ayatollah Khamenei

February 11th marked the 39th aniversary of the Islamic Revolution in Iran, the day when the Shah was overthrown and the government replaced by the Ayatollah Khomeini, called "The Supreme Leader" of ...
SQLi Vulnerability in YITH WooCommerce Wishlist

SQLi Vulnerability in YITH WooCommerce Wishlist

As part of our regular research audits for our Sucuri Firewall, we discovered an SQL Injection vulnerability affecting the YITH WooCommerce Wishlist plugin for WordPress. This plugin allows visitors and potential customers ...
Oracle Patches Critical Vulnerabilities in PeopleSoft Applications

Oracle Patches Critical Vulnerabilities in PeopleSoft Applications

Oracle has released out-of-band security patches for a component used by multiple ERP applications from its PeopleSoft suite. The updates fix five vulnerabilities, including two critical ones that can be exploited to ...
Meltdown Patch Causing Problems

Update Your WordPress Website Now, Researcher Warns

WordPress version 4.8.3, released Oct. 31, fixes a serious security issue that could result in SQL injection attacks. Details about the vulnerability are now public, so attacks could soon follow. “If you ...