Category: Cybersecurity News Page 1 of 10

A Cybersecurity Checklist for the Modern Small Business [Top 8 Tips]

Security is one of the most important aspects of any website. This is especially true today considering the fact that cybercrime continues to be a serious threat for businesses and users. The FBI states that “Cyber intrusions are becoming more commonplace, more dangerous, and more sophisticated.” In fact, websites experience a staggering 62 attacks per day, according to SiteLock research. Now more than ever, small businesses need a cybersecurity checklist when building and maintaining their websites.

When cybercrime happens to your company website, you can lose money, credibility, and customers. Left unchecked, your website could be taken offline completely if the right hacker gets into it. With that in mind, let’s cover what you need on your cybersecurity checklist to protect yourself, your customers, and your company overall.

1. Set Your Site Up for Success with a Web Application Firewall (WAF)

Read More

Don’t Get Suckered Into the Optimism Bias When It Comes to Website Security

If we concentrate hard enough, most of us can leave our personal biases out of our critical thinking. However, we’re not always consciously aware of the most persistent bias of them all: optimism. The optimism bias is the unfounded belief that we’re more likely to experience positive results than negative ones, even when tangible evidence suggests otherwise.

How does this relate to website cybersecurity?

Read More

Tips to Stop Cybersecurity Threats for Small Businesses

It’s no secret that small to midsize businesses usually have similarly small budgets. As a result, expenses that don’t outwardly contribute to sales growth — like cybersecurity — often fall by the wayside. But small business cyberattack examples abound, defying the misconception that SMBs are safe from cyberthreats.

Misconceptions About Cybersecurity Threats for Small Businesses

Read More

Currently Tracking: WordPress Plugin Vulnerabilities Causing Malicious Redirects

SiteLock research and remediation teams have become aware of several vulnerable WordPress plugins that are affecting our customers. The symptoms most commonly associated with these vulnerabilities are malicious redirects. Essentially, visitors are being sent to another website than the one they are attempting to access. We are still gathering information on these vulnerabilities, and how they are being used. As soon as we have completed our review, we will release more information.

The affected WordPress plugins are:

Read More

SiteLock 2019 Website Security Report: Protecting Websites in the Age of Stealth Attacks

Among the cryptojacking-buzz, Facebook’s data breach saga, and nation-state attacks on companies like Nissan, you likely noticed a trend of high-profile cybercrime in 2018.

However, after studying website attacks that plagued 2018, a new trend arises. Cybercriminals swept the web with secrecy, focusing on stealthy attacks to compromise websites rather than taking a more conspicuous approach.

Read More

When a Good Thing Goes Bad – How Vulnerabilities Were Intentionally Built into pipdig

Don’t just pay attention to the man behind the curtain, tear the curtain down and burn it. That’s been the general sentiment among the InfoSec community on Twitter this past week in the wake of the discovery of multiple vulnerabilities intentionally built into the popular pipdig Power Pack (P3) plugin. I could easily write 3,000 words digging into the code, but that’s been covered incredibly well already by other researchers. Instead, I’m going to focus more on the effects of this situation, and on how we as a security-minded community can make a difference going forward.

Read More

CMS security update

Magento Releases Immediate Security Update Addressing an Unauthenticated SQLi Vulnerability

The popular e-commerce CMS platform, Magento, announced multiple security updates to their commerce and open source versions on March 26, 2018. More than 250,000 active Magento installations are affected by this security flaw, including versions 2.1 prior to 2.1.17, 2.2 prior to 2.2.8, and 2.3 prior to 2.3.1.

Read More

Microsoft Seizes Website

Microsoft takes control of websites from Iranian hackers. Is there an abuse of power in trying to help?

If cybercriminals were creating illegitimate websites to impersonate your brand and steal victims’ information—would you shut down those sites if you could?

That’s exactly what Microsoft did when it took control of 99 websites that Iranian hackers used to try to steal sensitive information from targeted victims, namely United States employees in the public and private sectors. According to Microsoft, the hackers “specifically directed” their attacks on government agencies in Washington.

Read More

4th of July

The Beginner’s Guide to California’s Cybersecurity Laws

California has a history of creating legislation that creates a ripple effect that affects consumers in other states. While the laws only affect California, they often push companies into adopting the rules broadly – for example, California’s strict auto emissions standards have been adopted in 16 other states since 2004. “What California does definitely impacts the national conversation,” says state Senator Scott Wiener. As the home of some of the biggest names in technology, it’s no surprise that California’s legislators are especially concerned about cybersecurity. In 2018 alone, California has passed several laws that they hope will inspire other states – and ultimately, Congress – to passing cybersecurity laws that better address the issues of our time. However, these laws have also attracted criticism from tech companies, cybersecurity experts, and the Federal Government. These laws may come to affect you, which is why we’ve created this guide.

Read More

CMS security update

Joomla! Releases Version 3.8.13 with Security Updates

Last week, Joomla! released version 3.8.13 which included five security updates for the 3.x series of Joomla!. All five of the vulnerabilities addressed are part of the Joomla! application core. Although all of the vulnerabilities are considered low priority, Joomla! is encouraging users to update their applications as soon as possible to avoid possible compromise as a result of them being exploited. The vulnerabilities below were addressed:

Read More

Page 1 of 10

Powered by WordPress & Theme by Anders Norén