1Threat Hunting and Log Analysis – What to look for in your logs (opens in new tab)(trunc.org)3sucuri21y ago0
2Compressing SQLite databases with ZFS – 3 times+ in storage savings (opens in new tab)(trunc.org)2sucuri21y ago0
3How to analyze Linux malware – A case study of Symbiote (opens in new tab)(cybergeeks.tech)2sucuri23y ago0
6Thousands of WordPress Sites Hacked with SEO Spam Hidden inside wp-includes (opens in new tab)(blog.sucuri.net)4sucuri211y ago0
7Security Case Studies - What we learned from the 2009 phpbb.com compromise (opens in new tab)(blog.sucuri.net)1sucuri212y ago0
10WordPress Plugin Social Media Widget Hiding Spam (opens in new tab)(blog.sucuri.net)10sucuri212y ago7
12Virtual Patching for Websites with Sucuri CloudProxy (opens in new tab)(blog.sucuri.net)1sucuri213y ago0
15Mass web site infections leading to spam and porn (opens in new tab)(blog.sucuri.net)1sucuri213y ago0