Over 65,000 Home Routers Are Proxying Bad Traffic for Botnets, APTs

Botnet operators and cyber-espionage groups (APTs) are abusing the Universal Plug and Play (UPnP) protocol that comes with all modern routers to proxy bad traffic and hide their real location from investigators. In a report published on Monday, Akamai revealed that it detected bad actors abusing at least 65,000 routers to create proxy networks for various types of secret or illegal activities.

SE Labs Test Shows CylancePROTECT Identifies and Blocks Threats Years Before Malware Appears in the Wild

Cylance Inc., the company that revolutionized the antivirus and endpoint protection industry with true AI powered prevention that blocks advanced cyberattacks, including fileless attacks, malware, advanced persistent threats, and zero-day attacks, today announced the results of SE Labs’ Predictive Malware Response Test of CylancePROTECT, its prevention-focused AI endpoint security product.

Avoiding Holes in Your AWS Buckets

Enterprises are moving to the cloud at a breathtaking pace, and they’re taking valuable data with them. Hackers are right behind them, hot on the trail of as much data as they can steal. The cloud upends traditional notions of networks and hosts, and it topples security practices that use them as a proxy to protect data access. In public clouds, networks and hosts are no longer the most adequate control options available for resources and data.

The Three Great Threats to Modern Civilization

Throughout the history of mankind, civilizations have risen and fallen due to a variety of factors. For the most part, the collapse of a civilization wasn’t sudden, but a gradual decline brought on by multiple causes like changing culture, climate or even the introduction of a new culture (such as when Europeans came to the “new world”).

Find Out First

We have learned from public disclosures that, there are millions, if not billions of sensitive, private, confidential, and even secret data object offering unfettered accessibility on the Internet, which are open for anyone with a modicum of OSINT skill to discover, view, download, and where applicable abuse to their own deviant end.

Microsoft Regional Director (Redux)

I received a very nice email this week:

Congratulations, your nomination has been accepted to the Microsoft Regional Director program! I am pleased to welcome you back to this worldwide community of technology thought leaders and thank you for being a part of this community.

How to Fix a Hacked WordPress Site

Getting hacked is among the most discouraging experiences you’ll deal with as a website owner. No matter how secure your site is, there is always a chance that your site may get hacked. According to Forbes, about 30,000 websites are hacked every day, and who knows if/when hackers will target your site next. Many new WordPress users don’t care about their website’s security, so eventually, it ends up as a hacked website.Now think: your site is getting popular, you work very hard for it, and somehow it gets hacked. How frustrating it is! You almost lose everything on your site; no way hackers will give your site back to you.Luckily, it’s possible to find out precisely how your site was hacked with some easy sleuthing in your site’s logs. When you have determined how the hacker has infiltrated your site, you can spot the security hole to avoid the breach occurring again.How to Know If Your Site Got HackedNo matter which popular Control Management System (CMS) you are using – WordPress, Drupal, Joomla, etc. – anything can get hacked. If you think you have been hacked, the first thing you have to do is make sure you got hacked. Many times, WordPress users panic that their site has been hacked because their site is not responding or getting spam comments. They even pay WordPress specialists thinking that they need help recovering their site. They can’t figure it out if it is their website’s technical problem or if it has been really hacked.But it is not hard to find out if the site has been hacked. There are some common signs of a hacked site. These include the following:   Unnecessary pop-ups appearing that you didn’t add   Your site is automatically getting redirected to other spammy websites   Your website frizzes continuously   Displaying unwanted text in the footer or header that you didn’t implement   Auto-linking of keywords to other external websites   You received a notice from your hosting provider that you are doing something maliciousIn the event you detect any of the indicators above, you need to make sure to secure your WordPress site right way.Step 1: Identify the Hack and Change Your PasswordIt is very stressful work to fix a hacked WordPress site if you are non-techie. But it is not as hard as you think. The first thing you need is to keep calm and write down some questions that will clarify if it is really hacked:   Can you access your WordPress admin panel?   Has Google marked your website as insecure?   After login, is your website redirecting to another website?Write down those answers, as they will help you on to the next step. It is also beneficial that you change your password before you do any further step, and don’t forget to change the password after securing your website again.Step 2: Contact Your Hosting Company’s Support TeamMany beginners commit the first mistake by choosing a poor hosting company. Selecting a good web hosting company will take care all of your security concerns. Many good hosting providers are really practical in these type of circumstances. Their support staff has dealt with these sorts of problems tons of times before, so they should be fully equipped to help with that. That’s why prior to doing anything yourself, contact your web hosting provider and follow their guidance.As I mentioned before, if you are using a cheap web hosting provider that doesn’t provide any security features, you also can’t see if a hacker gained access to your website through another website on your server. With a good hosting company, your hosting provider can oftentimes provide insight into how the hack started and spread. Also, there’s a good chance they can inform you where the backdoor to your website is and from where the hackers discovered their method. There is a good chance that your hosting provider can fix your hacked website. If not, then choose another option below.Step 3: Scan Your Website with a Security Tool/PluginIf you don’t update your WordPress theme or plugin regularly, then there’s a possibility that hackers might use out-of-date files to access your WordPress website. Once they’re in, they can create a backdoor to quickly gain access to your site in the future.That’s why it’s so crucial to have a good WordPress security plugin installed on your site so you can track any changes made to your site in real-time.I recommended the Wordfence security plugin. It is a freemium plugin, and it works great. This plugin has many premium security features i.e. web application firewall, malware scanner, real-time traffic measuring, country blocking, and much more.Read How to Choose a WordPress Security Plugin that is Right for You here.Step 4: Restore Your WordPress BackupIt’s a good practice to back up your WordPress site daily. In case your site crashed or got hacked, you can restore the previous version from the backup. But remember: you have to restore a version before your site got hacked.When you restore a backup, you will get all files of your site as of the backup date. That means you will lose those changes that were made after the last backup. Inconvenient, yes. But it is better to have a clean website instead of a malicious one.After restoring your site, you can manually remove any file, plugin or theme that causes the problem.Step 5: Check Your Users’ Permissions