Sharing our performance and security knowledge. A place where we record insights, research and thought leadership.
This articles speaks to exploits against CVE-2021-41773. A vulnerability effecting Apache Web Server.
This articles explores 17,000 spam links on a hacked WordPress website.
This articles explains Arbitrary File Upload Vulnerabilities and why they matter to the security of your website.
This article explains how automating the detection of downtime can be crucial to an organization and DevSecOps team.
This article shows how attacks against WordPress are mostly automated.
This articles talks about forcing updates in the WordPress platform, and provides opinions on how that effects user defined intent.
This articles reports on active exploit attempts targeting the BackupBuddy plugin vulnerability.
This articles speaks to the effectiveness of WAF solutions in protecting against exploits targeting the Log4J vulnerability.
This articles dives into the world of DNSSEC and explores its value to today's domain security.
This articles how hackers hijack a websites SERPs with SEO SPAM links.
This articles explains how the WordPress JSON API and XMLRPC can be used to attack WordPress website using Brute Force techniques.
This article explains how CDN's can have a positive effect on the performance of a website.
This articles shows the techniques used to hack a WordPress site in 2022.
This articles introduces DNSRepo to the NOC.
This articles introduces WebSockets to the NOC CDN / WAF platform.
This articles shares lessons learned about the Log4Shell vulnerability during the first 30 days since its disclosure.
This articles decodes a pice of malware that leads us to the attackers C&C.
This article introduces NMAP, a free open-source network discovery and security auditing tool.
This article explains how cURL can be used to compare performance against different CDN providers (e.g., NOC vs Sucuri, NOC vs CloudFlare).
Apache is a powerful web server and logging is a critical piece to managing a web server. In this article we explain the two log types: access and error, and how to work with them.
This articles explains how optimizing your origin has a positive impact on how your website performance for your users.
Analysis of how a PHP Backdoor on a compromised WordPress site is being used to start DDoS Attacks
This article explains how to protect SSH on web servers using basic Tips but placing emphasis on IP whitelisting.
This articles provides a framework designed to help businesses recover after a cyber attack.
This articles provides a framework designed to help recover servers after a compromise.
This aricle explains the differences between Registries, Registrars and DNS services.
This articles provides a a basic framework that security teams can use to build an incident response plan.
This articles provides a guide on how to harden WordPress to keep hackers out of the website.
This articles talks about two SQLi vulnerabilities in WooCommerce, patched in 2021.
This article explains how CDN's can have a positive effect on the performance of a website.
DNS stands for Domain Name System (DNS), you might hear it used interchangeably with Domain Name Server (DNS).. This article explains DNS, and how it works
This article explains why it's important to monitor assets like servers, websites and domains.
This articles explains why it is important to block administrative panels on platforms like WordPress.
This article explains how cURL can be used to measure the performance of a website.
This articles dives into the 2021 Verizon DBIR and analyzes how Web Applications and their assets contributed to breaches
This articles provides website owners with a basic security framework for their web environment.
This articles explains what hackers do with WordPress once they successfully hack a website.
This articles provides a PSA for the WordPress 5.8.3 security release.