This section explains how to prevent a brute force attack on XMLRPC.php in WordPress.
We would like to introduce a case in which malware infection led to a lawsuit by a client who requested us to investigate the status of malware infection.
We will explain the vulnerabilities that you should be especially aware of in WordPress.
There is an increasing amount of malware infecting index.php in every folder in WordPress. This malware will be explained.
This section describes the features that should be implemented in the WordPress security plugin.
This section describes the problem of wordpress upgrade.php and install.php leaking the wordpress version and how to deal with it.
This is a brief glossary of common vulnerability attacks on WordPress.
Here is what to do if a user complains that a WordPress site sends them to another site.
Malware infections are spreading in WordPress that cleverly disguise themselves as common programs.
We will explain how to directly edit plug-ins and other plug-ins to close vulnerabilities in WordPress plug-ins without updating the plug-ins.
Unlike common computer viruses, malware that infects WordPress often rewrites the legitimate WordPress core files to become a parasite. We will explain the reasons for this and how to deal with it.
Cookie hijacking, which is the theft of cookies from logged-in WordPress users, will be explained.
We will explain the malware (a malicious program that is embedded after a WordPress site is defaced) that uses raw.githubusercontent.com to infect WordPress.
If a page you do not remember creating is registered in Google Search Console, it is possible that your WordPress site was infected with malware and generated a malicious page.
This section explains how to disable WordPress’ standard search function and return a 404 page.
WordPress is a CMS that basically does not hide the user ID = login ID. This means that a hacker attempting to gain unauthorized access to the site can log in as long as they know the password. We will explain how to completely hide your WordPress administrator ID.
A vulnerability affecting 5 million sites has been discovered in the popular WordPress cache plugin LiteSpeed Cache 6.3.0.1 and below. We recommend updating as soon as possible.
This section describes the installation of a fake plugin Super Socialat spreading in WordPress.