The Sucuri Firewall bundles the best of a WAF (Web Application Firewall) and an IDS (Intrusion Detection System) to provide enterprise-level protection against today’s and tomorrow’s threats and attacks. The Sucuri Firewall runs on top...
The Sucuri Firewall bundles the best of a WAF (Web Application Firewall), IDS (Intrusion Detection System) and CDN (Content delivery network) to provide a complete protection against today’s and tomorrow’s threats and attacks. The Sucuri...
The Sucuri CDN is responsible for caching your website automatically. With zero configuration, the CDN is able to speed up your website by up to 60%. You can find the CDN locations on the Sucuri Firewall Locations article. How the Sucuri CDN works...
An inline frame (iframe) is used to embed another document within the current HTML document. Why is it used by the "bad guys"? Because as the definition implies, it allows you to insert another document inside the current HTML page. The...
Conditional redirections are classified differently than the iframe/javascript ones because they are generally done though the HTTP headers (via .htaccess) to redirect users from certain browsers or locations to malware/malicious locations. Referrer...
JavaScript is a coding language that can be executed directly by the browser and many other applications that support it such as: PDF, email readers, etc. Javascript malware Because it is a full programming language executed by the browser...
Layer 7 HTTP Flood – Cache Bypass is the smartest type of attack. The attackers try to use URLs that cause the most damage making the site use up all of its resources without being cached. For example, an attack can do random dictionary...
A distributed denial-of-service (DDoS) attack happens when multiple IP addresses (sources) are trying to DoS (denial-of-service) a chosen target. This means that the targeted site or server gets so many requests that it cannot respond to legitimate...
“An HTTP flood attack is a type of Layer 7 application attack that utilizes the standard valid GET/POST requests used to fetch information, as in typical URL data retrievals (images, information, etc.) during SSL sessions. An HTTP GET/POST flood is...
A Layer 3 DNS Amplification is a type of DDoS attack where the attacker hides the origin of the attack from the targeted site by reflecting the attack off of a third party. It also uses amplification, meaning that the victim receives more byte...