My corporate website has been hit by a phishing attack that slipped malicious code into both the JavaScript files and the database. I need an experienced security specialist who can move quickly to identify every compromised asset, strip out the rogue snippets, and harden the site so the infection does not return. You’ll begin by running a full-scope malware scan, digging through server logs, JS bundles, and database tables to pinpoint the phishing payloads. Once located, I expect a clean removal with zero data loss, followed by patching any exploitable weaknesses you discover (SQL injection vectors, outdated libraries, misconfigured permissions, etc.). Please document each change as you work; I need a concise remediation report outlining what was found, what was fixed, and recommendations for ongoing prevention. Familiarity with common corporate stacks—PHP/Node, MySQL/PostgreSQL, Nginx/Apache—and standard security frameworks or tools like OWASP ZAP, ClamAV, or Sucuri will help you hit the ground running. Deliverables: • Fully cleaned codebase and database, free of phishing scripts • Security patches applied and verified • Post-cleanup report with before/after evidence and preventive best practices If you can complete the job swiftly and prove the site is once again trustworthy, let’s get started right away.