unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
E-commerce Website Security Strategy for Holiday Shopping Season
As shopping season approaches once again, we’d like to give you some helpful advice whe...
2021-12-11 07:24:21 | 阅读: 19 |
收藏
|
blog.sucuri.net
malicious
ensuring
ransomware
security
shouldn
PHP Re-Infectors – The Malware that Keeps On Giving
We all know why bad actors infect sites: monetary gain, boosts in SEO ratings for their...
2021-12-09 04:22:15 | 阅读: 22 |
收藏
|
blog.sucuri.net
php
htaccess
attackers
processes
wp
WooCommerce Credit Card Swiper Injected Into Random Plugin Files
It’s that time of year again! While website owners always need to be on guard, the holi...
2021-12-07 04:36:26 | 阅读: 33 |
收藏
|
blog.sucuri.net
wp
php
client
attackers
malicious
Is My Site Hacked? 4 Gut Checks
The consequences of a hacked site have wide-ranging financial repercussions that extend...
2021-12-04 02:53:11 | 阅读: 19 |
收藏
|
blog.sucuri.net
security
sucuri
defacement
allison
unusual
WordPress Admin Creator – A Simple, But Effective Attack
Malicious admin users get added to vulnerable WordPress sites often. This can happen in...
2021-12-02 07:14:02 | 阅读: 29 |
收藏
|
blog.sucuri.net
wordpress
malicious
wp
wpsupport
username
What We’ve Learned About SSH Brute Force Attacks
The first time I encountered brute force attacks I was a hosting specialist who receive...
2021-11-30 05:47:37 | 阅读: 27 |
收藏
|
blog.sucuri.net
attacker
ssh
passwords
webmail
mech
Why You Shouldn’t Use SMS For 2FA
Two factor authentication (2FA) provides an extra layer of security that passwords alon...
2021-11-25 06:37:04 | 阅读: 26 |
收藏
|
blog.sucuri.net
security
victim
phishing
requiring
7 Audacious Hacks & What We Can Learn From Them …
While stressful and costly to the victim, hacks can also be an opportunity for onlooker...
2021-11-23 04:22:48 | 阅读: 30 |
收藏
|
blog.sucuri.net
notpetya
mantra
security
headline
passwords
An Overview of Website Reinfection Vectors
The website security landscape is as complicated as it is treacherous. We often deal wi...
2021-11-20 06:06:25 | 阅读: 28 |
收藏
|
blog.sucuri.net
security
attackers
cpanel
database
software
What is a Website Backdoor?
What is a Backdoor?A backdoor provides a shortcut for authorized or unauthorized users...
2021-11-19 01:11:19 | 阅读: 27 |
收藏
|
blog.sucuri.net
backdoors
software
passwords
infect
ssh
Fake Ransomware Infection Spooks Website Owners
Starting this past Friday we have seen a number of websites showing a fake ransomware i...
2021-11-16 05:02:41 | 阅读: 28 |
收藏
|
blog.sucuri.net
ransomware
wp
database
directorist
attackers
Understanding .htaccess Malware
The .htaccess file is notorious for being targeted by attackers. Whether it’s using the...
2021-11-11 09:19:26 | 阅读: 42 |
收藏
|
blog.sucuri.net
php
rewritecond
htaccess
hxxp
WooCommerce Skimmer Spoofs Checkout Page
Recently a client of ours was reporting a bogus checkout page appearing on their websit...
2021-11-09 06:41:34 | 阅读: 44 |
收藏
|
blog.sucuri.net
attackers
apiujquery
malicious
jquery
wordpress
Product Update: Sucuri Firewall in India
Sucuri is pleased to announce the completion of a strategic expansion, with the opening...
2021-11-04 07:28:14 | 阅读: 47 |
收藏
|
blog.sucuri.net
sucuri
anycast
network
victor
announce
Network Firewall vs. Web Application Firewall (WAF)
When the world shut their doors and began spending more time online, hackers saw a clea...
2021-11-02 06:02:41 | 阅读: 42 |
收藏
|
blog.sucuri.net
network
sucuri
firewalls
security
cloud
How to Set Up a Content Security Policy (CSP) in 3 Steps
What is a Content Security Policy (CSP)?A CSP is a policy that uses headers or meta el...
2021-10-28 01:55:28 | 阅读: 44 |
收藏
|
blog.sucuri.net
security
directives
sucuri
directive
malicious
SSL Within the Context of Website Security
There is a common misconception that if someone adds SSL (Secure Sockets Layer) to thei...
2021-10-20 03:56:05 | 阅读: 29 |
收藏
|
blog.sucuri.net
security
client
allison
visitors
sucuri
5 Tips for Long-Term Remote Workers
If you’ve just started remote working, are remote-curious, or are transitioning into a...
2021-10-07 04:21:06 | 阅读: 44 |
收藏
|
blog.sucuri.net
remote
desk
ergonomic
network
chairs
What is Cryptocurrency Mining Malware?
Cryptocurrency mining malware is typically a stealthy malware that farms the resources...
2021-09-29 04:21:52 | 阅读: 36 |
收藏
|
blog.sucuri.net
software
mine
coinhive
What is Cryptocurrency?
Cryptocurrency is best thought of as a digital currency that only exists on computers....
2021-09-23 04:05:07 | 阅读: 35 |
收藏
|
blog.sucuri.net
currency
ledger
blockchain
security
Previous
14
15
16
17
18
19
20
21
Next