Category: SiteLock Research (Page 1 of 4)

SiteLock Website Security Insider

Introducing the SiteLock Website Security Insider

SiteLock is excited to announce the publication of its first quarterly website security report, The SiteLock Website Security Insider Q2 2017!

The SiteLock Website Security Insider Q2 2017 includes analysis and trends based on proprietary data from over 6 million websites. The report delivers exclusive insight into the most common threats website owners faced in Q2 2017, including:

Read More

Malware

Apache Struts Vulnerability Found and Patched

A vulnerability was recently discovered in Apache Struts, a popular framework for web-based Java applications, which allows for remote code execution on affected servers and allows for complete control of the application. The framework is commonly used by large, sophisticated organizations such as Lockheed Martin and Citigroup, meaning the vulnerability could affect up to 65% of Fortune 100 companies, resulting in large scale data breaches and private consumer data theft.

Found by lgtm.com security researcher Man Yue Mo, the vulnerability stems from unsafe deserialization of user supplied data to the REST plugin, which allows API access to the Java application. Researchers contacted the Apache Foundation directly, allowing the plugin developers to patch the issue before widespread exploitation. As of this writing, at least one live exploit has been seen in the wild, and a Metasploit module was released.

Apache Struts joins a growing fraternity of widely used applications to see an API vulnerability this year, including WordPress and Instagram. WordPress shared a similar experience where the exploit was discovered before widespread attacks, but many users failed to update and suffered compromise and data loss. The Struts vulnerability is more complicated to exploit which should result in a less dramatic rise in attacks. Regardless, patches should be applied as soon as possible, as a proactive security stance is more effective.

Apache Struts users are urged to upgrade to version 2.3.34 or 2.5.13 respectively, and additional information is provided by Apache on the official struts webpage at: https://cwiki.apache.org/confluence/display/WW/Version+Notes+2.3.34 and   https://struts.apache.org/announce.html#a20170905.

More sophisticated exploits are likely to occur as this vulnerability is examined. The best option for mitigation is to patch Struts as soon as possible to the recommended versions and regularly check for updates. Website owners should also consider adding a web application firewall and malware scanner to mitigate or reduce the severity of compromise.

SiteLock TrueShield customers are already protected against this exploit. Attempted attacks will be caught and blocked by the TrueShield WAF. If your website isn’t protected, call SiteLock at 888.878.2417 to get TrueShield installed today.

Malware

Magento Infection Sends Stolen Credit Card Data To Black Market

Authors: SiteLock Research Analysts, Josh Martin and Michael Veenstra

While investigating suspicious files on a customer’s eCommerce site, the SiteLock Research Team found malicious payment processing code injected into Magento application files that skimmed credit card data and administrative login credentials. The malicious code sent stolen credit card data directly to a publicly accessible carding market where victim’s card details were listed for sale. In this article we analyze the infection, take a deeper look at the carding market, and discuss ways you can keep your site and your credit card data secure.

Read More

Website security

Fake Joomla! Plugin Keyscaptcha Still in the Wild

Fake plugins and extensions are a favorite, and particularly sneaky, way to inject malicious content into popular CMS platforms. Fake plugins disguise their malicious intent by mimicking the form and function of legitimate plugins. We will discuss a not-so-well-known fake Joomla! extension, what it does, and what you can do to protect your site from such attacks.

Read More

cyber monday secure shopping

Avoid Cyberstress This Holiday Shopping Season [Infographic]

With Cyber Monday just one week away, learn more about how consumers feel about the security of online shopping and what you can do to help prevent your data being stolen.

Read More

SiteLock Security By Obscurity

Security by Obscurity [Infographic]

The term, “security by obscurity” implies that the less popular and attention grabbing your website is, the less likely it is to be targeted by cybercriminals. The truth is, there is no such thing as “too small to hack.” Read our infographic to learn more.

The data from this infographic was updated in Q2 2017. Be sure to check out our updated Security by Obscurity infographic with new data.

Read More

website popularity cyberattack

The More Popular The Website, The More Likely The Cyberattack

Today, over 760,000 websites are breached each year. However, only 6 percent of website owners use proactive website monitoring for suspicious activity, while 84 percent don’t find out about cyberattacks until after they’ve been compromised.

Read More

SiteLock Popularity Infographic

Popular but Insecure [Infographic]

The more popular the website, the more likely the cyberattack. Find out your website’s risk of being compromised.

Read More

LawFirm_DataBreach

Law Firm Data Breach Infographic

With 80 percent of the biggest law firms in the country being hacked since 2011, law firms are prime targets for data breaches. This infographic covers why cybercriminals go after law firms, what types of attacks they use and how you can protect your firm from becoming a victim.

SiteLock offers comprehensive, automated cyber security protection, designed to protect law firms from a data breach.

Read More

SiteLock Website Security

See How Fast SiteLock Mitigates Cyber Threats [Infographic]

Did you know that SiteLock scans more web pages in a day than McDonald’s sells hamburgers? How about that we analyze more source code files per day than Dominos sells pizzas in a year? We’ve put together this infographic to give you an idea of how quickly we work to mitigate cyber threats.

Read More

Page 1 of 4

Powered by WordPress & Theme by Anders Norén