Throwback Threat Thursday: JCE Vulnerability

http://feedproxy.google.com/~r/sucuri/blog/~3/t1I_dtotBbQ/throwback-threat-thursday-jce-vulnerability.html

Despite WordPress’ market share completely overshadowing other CMS’, Joomla (previously known as Mambo) has still managed to retain its position as the second most popular CMS. In fact, even with a decreasing market share in the overall CMS landscape, there are still well over a million live websites using Joomla to manage their digital content. As a result, this large installation size makes Joomla an attractive target when it comes to malicious users targeting vulnerabilities. Continue reading Throwback Threat Thursday: JCE Vulnerability at Sucuri Blog.

NIST Cybersecurity Framework

http://feedproxy.google.com/~r/sucuri/blog/~3/xyy8dpssRrA/nist-cybersecurity-framework.html

The United States National Institute of Standards and Technology (NIST) has created a  framework for improving critical infrastructure cybersecurity, referred to as the NIST Cybersecurity Framework. The main objective of this framework is to offer organizations a list of items for assessing and enhancing their capacity for preventing, detecting and responding to cyberattacks. According to the framework, cybersecurity should be considered part of an organization’s risk management operations. What the NIST Cybersecurity Framework? The NIST Cybersecurity Framework is a set of best practice guidelines to help organizations and businesses improve their cybersecurity processes. Continue reading NIST Cybersecurity Framework at Sucuri […]

Fake UpdraftPlus Plugins

http://feedproxy.google.com/~r/sucuri/blog/~3/ZG96Ga2PuaE/fake-updraftplus-plugins.html

We often find various fake WordPress plugins installed by hackers during website cleanups. Recently, we’ve noticed a new wave of infections that install fake plugins with backdoor functionality. Malicious Plugins Sourced from UpdraftPlus Attackers have been using different names for these fake plugins, including initiatorseo or updrat123—but any title can be used. While their code differs in terms of variable names, the malicious plugins do share a few things in common: they possess a similar structure and header comments from the popular backup/restore plugin UpdraftPlus. Continue reading Fake UpdraftPlus Plugins at Sucuri Blog.

Cryptominers & Backdoors Found in Fake Plugins

http://feedproxy.google.com/~r/sucuri/blog/~3/Wbo_ye-eui4/cryptominers-backdoors-found-in-fake-plugins.html

When cleaning websites, we regularly find phishing pages, malicious code injected into files, and SEO spam. However, over the past couple of months we’ve also noticed a considerable increase in the number of malicious plugins which have been added to compromised websites as well. These plugins appear to be legitimate, but inspecting the code reveals that the plugin is not just an innocent plugin at all. The fake plugins are actually part of the attack—and in most cases used as a backdoor for the attacker to maintain access to the compromised website environment, even after the initial infection vector has […]

Top 10 Website Hardening Tips

http://feedproxy.google.com/~r/sucuri/blog/~3/rmrG-RVQxog/top-10-website-hardening-tips.html

Website hardening means adding layers of protection to reduce the risk of website attacks, a process known as “defense in depth.” Here are our top 10 virtual hardening principles: 1 – Keep your website updated Every single piece of software required to run your application needs to be kept up to date with the latest patches and security updates. Website vulnerabilities come in all shapes and sizes, so it is important to update your CMS along with any third party components like plugins, themes, and extensions. Continue reading Top 10 Website Hardening Tips at Sucuri Blog.

What Are Ethical Hackers?

http://feedproxy.google.com/~r/sucuri/blog/~3/6fLhjVXGn74/what-are-ethical-hackers.html

There’s an issue with how some people define the word “hacker.” For some, it’s a word synonymous with “cybercriminal,” but not in the infosec community. White hat hackers (the good guys) are the ones who find security issues so they can be fixed. The world is a lot better off because of them. Every day we interact with web applications and services built using programming languages. Hackers, both the white and black hat, comb through millions of lines of source code. Continue reading What Are Ethical Hackers? at Sucuri Blog.

What is the Cost of Cybercrimes & Attacks

http://feedproxy.google.com/~r/sucuri/blog/~3/nOGiKOZylyA/cost-of-cyber-attacks.html

The word cybercrime is no longer just a word you hear coming from Fortune 500 CEOs anymore. This word has being flashed on every good morning news show and radio channel. Cybercrime can target any business or website owner. Even the average person who thought they were safe from hackers because they didn’t own a business – or their business wasn’t “big enough” to be hacked – can become a cybercrime victim. What Constitutes a Cybercrime A cybercrime is classified as any illegal or unethical activity committed through the use of the internet or a computer. Continue reading What is […]

Down the Malware Rabbit Hole – Part 1

http://feedproxy.google.com/~r/sucuri/blog/~3/fvYNq_JE-R8/down-the-malware-rabbit-hole-part-1.html

It’s common for malware to be encoded to hide itself—or its true intentions—but have you ever given thought to what lengths attackers will go to hide their malicious code? In our first post in this series, we’ll describe how bad actors hide their malicious code and the steps taken to reveal its true form. Malware Obfuscation in Simple Terms To begin, you’ll first need to understand a few simple concepts about malware and obfuscation. Continue reading Down the Malware Rabbit Hole – Part 1 at Sucuri Blog.

A New Wave of Buggy WordPress Infections

http://feedproxy.google.com/~r/sucuri/blog/~3/NTMcxT8UyUQ/a-new-wave-of-buggy-wordpress-infections.html

We’ve been following an ongoing malware campaign for the past couple of years now. This campaign is renowned for its prompt addition of exploits for newly discovered WordPress theme and plugin vulnerabilities. Every other week, the attackers introduce new domain names and slightly change the obfuscation of their scripts to prevent detection. For example, last week they started using URLs on the following domains: * dns.createrelativechanging[.]com (Creation Date: 2019-09-19) * bes.belaterbewasthere[.]com  (Creation Date: 2019-09-21) To provide more context, you can find additional posts following the evolution of this malware campaign below. Continue reading A New Wave of Buggy WordPress Infections […]

National Cybersecurity Awareness Month

http://feedproxy.google.com/~r/sucuri/blog/~3/YyCmlxtrqHk/national-cybersecurity-awareness-month.html

Since 2003, October has been recognized as National Cybersecurity Awareness Month. It is an annual campaign to raise awareness about the importance of cybersecurity and being a better digital citizen. October has just started and a majority of security companies are promoting internet security. With the holidays fast approaching, it is a crucial time for website owners, especially ones with an e-commerce website, to be cyber secure. The end of the year is also the season when hackers try to profit the most. Continue reading National Cybersecurity Awareness Month at Sucuri Blog.