We recently had a client that had a persistent malware infection on their shared hosting environment that would re-infect the…
Attackers commonly rely on backdoors to easily gain reentry and maintain control over a website. They also use PHP functions…
We recently noticed an interesting example of network infrastructure resources being used over a period of time by more than…
We are proud to be releasing our latest Hacked Website Trend Report for 2018. This report is based on data…
Christmas is a wonderful time to spend with family and friends. A lot of kids look forward to opening their…
All across the internet, we find guides and tutorials on how to keep your WordPress site secure. Most of them…
Last month, we shared information about yet another series of ongoing massive infections using multiple different vectors to inject malicious…
Finding backdoors is one of the biggest challenges of a website security analyst, as backdoors are designed to be hidden in…
We’re seeing an increase in the number of cases where attackers are disabling WordPress sites by removing or rewriting its wp-config.php file.…
In a previous post, we have explained what website backdoors are and what they look like. Today, we want to…