Your basket is currently empty!
If your website has been hacked or compromised and you need to identify exactly what’s happened and how to prevent future issues we can help …
– Imaging your server to preserve evidence.
– Analysing log files to identify what’s happened, when and from where.
– Identifying vulnerabilities that could have enabled the compromise or cause future compromises.
– Location, removal and reverse engineering of malware or backdoor scripts.
Investigating Suspicious WooCommerce Failed Orders
Investigating 104 failed orders presented on the same day to an online shop powered by WooCommerce. The “customer” names were randomly generated and all matched fictitious email addresses so the…
Identify Source of Brute Force Attacks
Investigate how hackers are managing to attempt brute force attacks on a WordPress login despite /wp-login.php being locked down; the answer was via /xmlrpc.php which can be blocked by using…
Identifying and Removing Hacker’s Code
Removing injected cloaked plugin from WordPress site.
WordPress Backdoor Deep Dive
Ever wondered how hackers regain access to WordPress sites? Here’s a breakdown of a typical malware script often left behind as a backdoor. These scripts allow attackers admin access to…