Website Security

Common Website Hacking Techniques

Website hacking — the act of exploiting weaknesses to gain unauthorized access to a website, database, cPanel, or admin dashboard — is a reality that some webmasters struggle with. In the hands of bad actors, automated hack tools and exploit kits make it especially easy for hackers to gain access to a plethora of information,

[ Read More ]

HTTPS Protocol: What is the Default Port for SSL & Common TCP Ports

SSL port numbers serve as communication endpoints for transmitting or receiving data. One of the primary functions of these ports is to establish a secure connection between a web page and  a website hosting server or the CDN/WAF that might sit in front of it. These add an extra layer of security by leveraging either

[ Read More ]

New Email Course: Common Website Threats & Malware

The digital world isn’t all rainbows, unicorns, and cat gifs; it also has a dark side. As threats become increasingly sophisticated, website owners and administrators need to up their game. That’s why we’ve created this tailored email course — to help you navigate common website malware and vulnerabilities. We’ve picked apart data from over 43,000

[ Read More ]

How to Harden & Secure a Website (12 Steps)

Attackers are always on the hunt for vulnerable websites. Whether you have a WordPress, Magento, or Joomla website — you’ll want to take steps to secure your site and server from attacks and malware. In today’s post, we’ll be outlining the top twelve steps you can take to harden your website and enhance the security

[ Read More ]

New Hacked Database Guide

Your website’s database is a treasure trove of valuable information. However, this also makes it a prime target for hackers looking to steal sensitive data or modify your site’s content and behavior. The unfortunate reality is that a compromised website database can lead to a loss of essential customer information, impacting your website’s reputation and

[ Read More ]

FakeUpdateRU Chrome Update Infection Spreads Trojan Malware

Fake Google chrome update malware, often associated with the notorious SocGholish infection, is something that we have been tracking for a number of years. It is one of the most common types of website malware. It tricks unsuspecting users into downloading what appears to be an update to their Chrome browser, but is actually a

[ Read More ]

Shifting Malware Tactics & Stealthy Use of Non-Executable .txt & .log Files

The malware landscape is constantly evolving — and bad actors are always devising new techniques to evade detection. Our analysts most commonly find website malware nestled within JavaScript or PHP files, which can be directly executed by browsers or servers. However, we’re encountering more and more instances of malware that use code from non-executable files

[ Read More ]

What is HSTS: HTTP Strict Transport Security

HSTS or HTTP Strict Transport Security is a protocol that can make it more difficult for attackers to modify or intercept traffic between a user and your website. Understanding what HSTS is and how it functions is crucial for anyone keen on protecting their site, as proper implementation can help to ensure that your website’s

[ Read More ]

How to Find & Fix Japanese SEO Spam

Japanese SEO Spam, also known as “Japanese keyword hack” or “Japanese SEO poisoning,” is a spammy search engine optimization technique used by black hat SEO artists to make a website show up in search engine results for spam keywords in Japanese language when they shouldn’t. In this post, we’ll detail what Japanese SEO spam is,

[ Read More ]