It’s midnight on a Saturday, you’re finally getting to that nice REM cycle. You’re on call, but it’s been a relatively quiet week. Besides, you feel good, you have done everything necessary to ensure that the web properties you are responsible for are operational. You have deployed redundant data centers, each on opposite ends of […]
Steps To Recovering Servers Post-Hack
After a hack, should an organization restore its servers from a new OS or from the backup? This is the question that we were posed with during a recent incident response case. The organization had been given two very different opinions, and wanted to know what we would do. The recommendations they had received came […]
Automated Attacks Against WordPress Target Old Vulnerabilities
There is no denying WordPress’ dominance on the web. It’s used by almost every major organization in the world, and is the platform of choice for a lot of first time entrepreneurs. And if you ever want confirmation, just look at what hosting companies are focusing on. They all dedicate countless resources to streamlining its […]