We are currently unable to update the vulnerability database of our malware scan plug-ins due to the fact that NIST has stopped updating the database.
Category: WordPress Security Page 3/14
Learn about sitemap injection, which can register incorrect pages from your WordPress site in Google’s search results without your permission, and how to deal with it.
I would like to explain why WordPress malware (tampering) spreads to all sites on the server.
Malware infection is not only a WordPress problem, but is common to all CMS. (WordPress stands out because of its overwhelming popularity, but…) There are an increasing number of cases where old Movable Type is left unattended on a server and malware infection spreads to Wo
We will explain how to restore (decode) a malware file that has infected WordPress.
If you have unused or abandoned WordPress sites on your server, we recommend that you delete them. We will explain the reasons for this and how to delete an abandoned site.
This section explains what to do if you do not know the location of infected malware or if you cannot find it.
There are two types of malware infecting WordPress, one made of javascript and the other made of php.
We will explain how to find backdoors in a hacked and defaced WordPress site.
Malware that infects WordPress is quite different from ordinary computer viruses. Here is an explanation of what makes them different.
Here is what to do if your WordPress site is being warned by Search Console of a large number of noindexes on non-existent WordPress search results pages.
This section explains how WordPress customer information can be leaked if WordPress is hacked.
We will explain how an infection (tampering) with the WordPress database can cause the files on the site (server) to be tampered with.
Hackers target vulnerabilities in WordPress to gain various unauthorized access. The most common of these attacks is against admin-ajax.php.
WordPress outputs user login IDs and ID numbers in JSON. Although this is a specification, it may make your site more vulnerable to hackers for security reasons.
We would like to introduce you to the malware that is installed in the top directory of WordPress.
User 123@abc.com, which you don’t remember creating in WordPress, is an admin user that hackers add illegally.
The new WordPress tampering technique, the inclusion of .ccss malware, will be explained.