PHP hack tools are created and used by attackers to help automate frequent or tedious tasks. During a recent investigation,…
Malicious pop-ups and redirects have become two extremely common techniques used by attackers to drive traffic wherever they want. During…
In an attempt to avoid detection, attackers and malware authors are always experimenting with different methods to obfuscate their malicious…
Our team recently came across a malicious script used on a Magento website titled gstaticapi, which targeted checkout processes to…
Short scripts that deliver malware to a website are nothing new, but during a recent investigation we found a script…
Employees at companies of all sizes can be targets of phishing attacks, but certain corporations or industries can be more…
Website reinfections are a serious problem for website owners, and it can often be difficult to determine the cause behind…
It’s common for hackers to utilize post-compromise tools that contain a graphical user interface (GUI) that can be loaded in…
Email will continue to be the dominant mode of digital communication for the foreseeable future. However, the email framework was…
An alarm or monitoring system is a great tool that can be used to improve the security of a home…