Website Security
R_Evil WordPress Hacktool & Malicious JavaScript Injections
We often see hackers reusing the same malware, with only a few new adjustments to obfuscate the code so that it is more difficult for scanning tools to detect. However, sometimes entirely ...
A Quick Glance at Cross-Origin Resource Sharing Security Headers
Thanks to the rapid growth of JavaScript frameworks such as Angular, Vue, and React, CORS has become a popular word in the developer’s vocabulary. When requesting information from an external source such ...
Securing Your Online Store for the Holidays
Shopping season is here, and so is the opportunity for ecommerce site owners to grow their business and generate revenue. In lieu of the changing global ecommerce climate that this pandemic has ...
Magento Phishing Leverages JavaScript For Exfiltration
During a recent investigation, a Magento admin login phishing page was found on a compromised website using the file name wp-order.php. This is an odd file name choice for a Magento phishing ...
Redirects to YouTube Defacement Channel
During a recent investigation, we found an infected website was redirecting to YouTube after its main index.php file had been modified to include the following line of HTML: <meta http-equiv='refresh' content='2;url=https://youtu.be/fsqzjDAO2Ug'> This ...
Opening the Conversation about Website Security
The responsibility of ensuring that a website is protected falls on the website owner, but the security expectation may fall on the web service provider too. As a professional, you are the ...
SiteCheck Malware Report: September Summary
Our free SiteCheck tool helps website owners remotely scan their website to detect malware infections, blacklisting status, website errors, and other anomalies. Scanning a website’s external HTML source code provides immediate results, ...
Backdoor Shell Dropper Deploys CMS-Specific Malware
A large majority of the malware we find on compromised websites are backdoors that allow an attacker to maintain unauthorized access to the site and execute whatever commands they want. Another common ...
Data in the browser is data at risk
Many third party web applications share sensitive data with parties other than the website owner. This sharing can be intentional or inadvertent, but to prevent breaches and manage risk, website owners should ...
Data in the browser is data at risk
Many third party web applications share sensitive data with parties other than the website owner. This sharing can be intentional or inadvertent, but to prevent breaches and manage risk, website owners should ...
