During a recent investigation into a compromised Magento ecommerce environment, we discovered the presence of five different backdoors that would...
Recently we have been seeing a rash of WordPress website compromises with attackers abusing the plugin upload functionality in the wp-admin dashboard to redirect visitors and...
When it comes to the ABCs of website security server side scans and file integrity monitoring are the “A” and “B”. In fact, our server side...
Realtime Blackhole Lists (RBLs) can be a great tool in your security arsenal. You may not know you’re using them, but all email providers and company...
In an effort to maintain unauthorized access or profit off a website’s environment long after an initial compromise, attackers commonly leverage a variety of different techniques...