Insufficient Privilege Validation in SiteGround Optimizer & Caldera Forms Pro

http://feedproxy.google.com/~r/sucuri/blog/~3/cT-CTuQX2e4/vulnerability-disclosure-siteground-optimizer-caldera-forms.html
While investigating the SiteGround Optimizer and Caldera Forms Pro plugins we have discovered a critical privilege escalation vulnerability. It was not being abused externally and impacts over 500,000 sites. It’s urgency is defined by the associated DREAD score that looks at damage, reproducibility, exploitability, affected users, and discoverability. A key contributor to the criticality of these vulnerabilities is that it’s exploitable by any user (it’s not restricted to privileged users – e.g., admins) and is easy to exploit remotely. Continue reading Insufficient Privilege Validation in SiteGround Optimizer & Caldera Forms Pro at Sucuri Blog.

PCI for SMB: Requirement 10 & 11 – Regularly Monitor and Test Networks

http://feedproxy.google.com/~r/sucuri/blog/~3/GaJyEocPGH0/pci-for-smb-requirement-10-11-regularly-monitor-and-test-networks.html
Welcome to the seventh post of a series on understanding the Payment Card Industry Data Security Standard–PCI DSS. We want to show how PCI DSS affects anyone going through the compliance process using the PCI SAQ’s (Self Assessment Questionnaires). In the previous articles written about PCI, we covered the following: Requirement 1: Build and Maintain a Secure Network – Install and maintain a firewall configuration to protect cardholder data Requirement 2: Build and Maintain a Secure Network – Do not use vendor-supplied defaults for system passwords or other security parameters Requirement 3 & 4: Secure Cardholder Data Requirement 5 & […]

Spotlight on Women in Cybersecurity

http://feedproxy.google.com/~r/sucuri/blog/~3/6TDruypkbOk/spotlight-on-women-in-cybersecurity.html
Sucuri is committed to helping women develop their careers in technology. On International Women’s Day, Sucuri team members share their insights into working in cybersecurity. Spotlight on Sucuri Women in Cybersecurity We have asked some of the women who work at Sucuri 3 questions: What do you do at Sucuri? How did you decide to work with technology? What do you think the future looks like for women in cybersecurity? Continue reading Spotlight on Women in Cybersecurity at Sucuri Blog.

How to Add SSL & Move WordPress from HTTP to HTTPS

http://feedproxy.google.com/~r/sucuri/blog/~3/GbIBlRrCNf4/how-to-add-ssl-move-wordpress-from-http-to-https.html
Moving a WordPress website from HTTP to HTTPS should be a priority for any webmaster. Recent statistics show that over 33% of website administrators across the web use WordPress and many of these websites have still not added an SSL certificate. Why is Important to Have a WordPress SSL Certificate? SSL has become increasingly important in the past couple of years, not only for securely transmitting information to and from your website, but also to increase visibility and lower the chances of being penalized by website authorities. Continue reading How to Add SSL & Move WordPress from HTTP to HTTPS […]

Hacked Website Trend Report – 2018

http://feedproxy.google.com/~r/sucuri/blog/~3/RYPoagVxOxY/hacked-website-trend-report-2018.html
We are proud to be releasing our latest Hacked Website Trend Report for 2018. This report is based on data collected and analyzed by the GoDaddy Security / Sucuri team, which includes the Incident Response Team (IRT) and the Malware Research Team (MRT). The data presented is based on the analysis of 25,168 cleanup requests and summarizes the latest trends by bad actors. We’ve built this analysis from prior reports to identify the latest tactics, techniques, and procedures (TTPs) detected by our Remediation Group. Continue reading Hacked Website Trend Report – 2018 at Sucuri Blog.

Fake Browser Updates Push Ransomware and Bank Malware

http://feedproxy.google.com/~r/sucuri/blog/~3/ewKHoT_aOD8/fake-browser-updates-push-ransomware-and-bank-malware.html
Recently we came across a malicious campaign injecting scripts that push fake browser updates onto site visitors. This is what a typical fake update request looks like: Users see a message box that says it’s an “Update Center” for your browser type (in my case it’s Firefox, but they also have such messages for Chrome, Internet Explorer and Edge browsers). The message reads: “A critical error has occurred due to the outdated version of the browser. Continue reading Fake Browser Updates Push Ransomware and Bank Malware at Sucuri Blog.

Google Analytics and Angular in Magento Credit Card Stealing Scripts

http://feedproxy.google.com/~r/sucuri/blog/~3/h_nVww4C3g0/google-analytics-and-angular-in-magento-credit-card-stealing-scripts.html
Over the last few months, we’ve noticed several credit card-stealing scripts that use variations of the Google Analytics name to make them look less suspicious and evade detection by website owners. The malicious code is obfuscated and injected into legitimate JS files, such as skin/frontend/default/theme122k/js/jquery.jscrollpane.min.js, js/meigee/jquery.min.js, and js/varien/js.js. The obfuscated code loads another script from www.google-analytics[.]cm/analytics.js. Continue reading Google Analytics and Angular in Magento Credit Card Stealing Scripts at Sucuri Blog.

Hackers Use Fake Google reCAPTCHA to Cloak Banking Malware

http://feedproxy.google.com/~r/sucuri/blog/~3/7A-g8bD4Rvs/hackers-use-fake-google-recaptcha-to-cloak-banking-malware.html
The most effective phishing and malware campaigns usually employ one of the following two age-old social engineering techniques: Impersonation These online phishing campaigns impersonate a popular brand or product through specially crafted emails, SMS, or social media networks. These campaigns employ various methods including email spoofing, fake or real employee names, and recognized branding to trick users into believing they are from a legitimate source. Impersonation phishing campaigns may also contain a victim’s name, email address, account number, or some other personal detail. Continue reading Hackers Use Fake Google reCAPTCHA to Cloak Banking Malware at Sucuri Blog.

The Importance of Website Logs

http://feedproxy.google.com/~r/sucuri/blog/~3/c-SJ-3r2FAg/the-importance-of-website-logs.html
As a security company, we deal with a lot of compromised websites. Unfortunately, in most cases, we have limited access to customer logs, which is one of the reasons why we don’t offer forensic analysis. Sucuri offers website monitoring, protection, and clean up, but sometimes we go that extra mile and investigate how websites become compromised in the first place. This usually happens when websites become reinfected after a cleanup. The reinfection itself can be caused by something as simple as a compromised admin user. Continue reading The Importance of Website Logs at Sucuri Blog.

Add Security to Your Website Agency Portfolio

http://feedproxy.google.com/~r/sucuri/blog/~3/6MoSwY0pXhg/add-security-to-your-website-agency-portfolio.html
As a website industry professional, you are aware of the importance of website security. This is especially true when managing 10 or more sites. How can you convey this message to your customers? Offering Website Security to Clients Website security should be part of any web professional’s portfolio. How can you get started talking with your clients about website security? Here are some ways to approach this topic and have customers onboard with a website security offering. Continue reading Add Security to Your Website Agency Portfolio at Sucuri Blog.