Recently our research team saw an extremely large spike of RCE attacks where the attacker infects servers with crypto-mining malware. In this post we will analyze these attacks, drill down into a malicious crypto-mining script,
This week in app security: Olympic Destroyer malware, cryptocurrency-mining malware found on government sites, ransomware at the Sacramento Bee, Google AdWords bitcoin phishing, teenager arrested for DDoS attacks in The Netherlands, and more.
Announcing the latest addition to our global network with the operational launch of our data center in Taiwan! This regional data center will enhance website performance with decreased latency, and provide security in Taiwan and countries
We are excited to announce the launch of our first data center on the Africa continent in Johannesburg! With this latest addition to our global network, customers will experience enhanced website performance with decreased latency, enjoy sub-second
Cloud security is based on a model of “shared responsibility”. In the final post of our series on cloud migration, we’ve put together a list of strategic and immediate considerations for your applications and data
On Monday, February 5, 2018, a vulnerability was discovered in the WordPress core, specifically in modules used to load JS and CSS files. These modules were designed to increase page-loading speeds but have effectively rendered
The 2017 OWASP Top 10 is out. Three new vulnerabilities have been added. Here's our take on the good, the bad and the ugly. What's your view of the OWASP Top 10?
In our previous blog post, we discussed some of the security vulnerabilities to your ICO and cryptocurrency account. We now focus on cryptocurrency exchanges and look at where the currency is vulnerable after successful completion
The popularity of cryptocurrency has opened new areas for exploitation. In this blog post we explain what insecure deserialization vulnerabilities are, show the growing trend of attacks exploiting these vulnerabilities and explain what attackers do