I hope it is just a false alarm.
Thank you for bringing this point to attention. First of all, I want to guarantee that despite the attack suffered, no data was corrupted and no one outside had access to the server. Even if this had happened, it would have no impact at this point as everything was reset based on an offline backup.
That said, I analyzed the situation.
1. The "favicon.ico" file simply does not exist on the server. But what is favicon.ico? This file is used by many websites, to generate the website logo icon that appears in the browser window. In the case of TalkImg, this type of file is not used for this icon. If you look at the source code of the website's home page, you can see that this icon is obtained as follows:
2. The alert is pointing to
http:// talkimg.com /... and access to the site must always be via https and not http.
The question is: did you write the address directly in the browser, or click on a link? If so, where was it? It is always recommended to directly type the address to access the site.
3. This was one of the requests used by part of the DDoS attack. Which is normal, this attack usually tends to use non-existent requests on the server to overload it. Since this was one of the links attempted by the attack, in the various reports the link may be associated with some type of threat. But in this case, no such file exists and most requests to this effect have been mitigated by Cloudflare.
In that sense, this is clearly a false positive. And always remember to check the links you click.