Unpathed Critical Vulnerability in Magento

Posted on May 25, 2017 by Yury Sergeev


Unpathed Critical Vulnerability in Magento

Popular CMS are always under attack. To keep your online business secure, you should always be aware of high-risk web vulnerabilities. Today, it is crucial to know how to mitigate the vulnerabilities which may harm the income.


Tags: security e-commerce magento


Securing Websites with Threat Intelligence API

Posted on January 04, 2017 by Yury Sergeev


Securing Websites with Threat Intelligence API

Many researchers have been monitoring malicious activities of cyber criminals who compromised vulnerable e-commerce websites in an effort to steal payment card information provided by their customers. Those hackers often injected a keylogger code function directly into the sites. It was the Javascript, PHP or another language keylogger which installed as a part of the websites and captured payment information entered by users. For examples, Magento Commerce and OpenCart platforms were impacted in 2016.


Tags: Threat Intelligence IP reputation machine learning security e-commerce


8 reasons why your site can be hacked

Posted on October 18, 2016 by Nikolay Arefiev


8 reasons why your site can be hacked

When you use the Internet for your business, you are confronted with a task of protecting your Internet resource. Some small Internet-based companies believe that if they don’t store the customer payment information at their web resource, no hacker attack can significantly harm their business. However, nowadays there are exist attacks that indirectly influence all participating parties, even though your resource may not have been the target of the attack.


Tags: signatures IP reputation machine learning log analysis anomalies security


Analysis of Blackhat SEO attacks

Posted on July 21, 2016 by Yury Sergeev


Analysis of Blackhat SEO attacks

Hackers are using new sophisticated botnet-driven SEO attacks to promote adult sites and online pharmacies. Web search engines use different algorithms to rank a site, but one of the most significant parameters is how many sites contain links to the website, and how high-ranked are these sites. Therefore, attackers exploit hundreds of websites to increase the search engine ranking of sites which they promote by injecting links.


Tags: bots web attacks seo IP reputation security


The importance of IP reputation monitoring

Posted on July 07, 2016 by Yury Sergeev


The importance of IP reputation monitoring

Today, online business is affected by numerous attacks. Some of them are performed by people and some by bots which are simply software applications that run different automated tasks to compromise websites. However, both use dynamic IP rotation as a way to evade security solutions using Tor networks and open proxies to disguise their real IP addresses. In that case, as defenders, we should use threat intelligence data to check IP reputation of visitors and if we have special software to protect web applications from attacks, configure our security systems to block malicious human and bot traffic.


Tags: performance bots web attacks IP reputation security