Page 2/14

Investigate unauthorized access to wordpress admin-ajax.php (how to deal with it)

Investigate unauthorized access to wordpress admin-ajax.php (how to deal with it)

We will explain how to investigate unauthorized access to admin-ajax.php in WordPress

Read more

What to do if a wordpress site has an include statement in index.php that loads and executes malware

What to do if a wordpress site has an include statement in index.php that loads and executes malware

Here is what to do if your wordpress site has an include statement in index.php that loads and executes malware.

Read more

Minimum security precautions for WordPress site management

Minimum security precautions for WordPress site management

Here are five minimum security precautions to take when managing a WordPress site. In our experience, this will prevent more than 90% of hacking attempts.

Read more

What to do if you are unable to download a wordpress plugin

What to do if you are unable to download a wordpress plugin

Here is what to do if you are unable to download a WordPress plugin.

Read more

Analyze malware hidden in processes that automatically rewrite index.php and htaccess files

Analyze malware hidden in processes that automatically rewrite index.php and htaccess files

We will analyze the malware hidden in the process of automatically rewriting index.php and htaccess files and explain how it works.

Read more

Why you should test your WordPress plugins for vulnerabilities.

Why you should test your WordPress plugins for vulnerabilities.

Vulnerability testing of WordPress plugins should be performed on a regular basis. We will explain the reasons for this.

Read more

Example of malware spreading to initial subdomain folders of a server

Example of malware spreading to initial subdomain folders of a server

Many of today’s malware spread infection to all folders beyond the domain folders in the server. In this article, we will discuss the infection of initial subdomain folders on unused servers, which is often overlooked.

Read more

What is a brute force attack, a brute force attempt to try and break through a WordPress user's password?

What is a brute force attack, a brute force attempt to try and break through a WordPress user’s password?

This section describes a brute force attack that tries and breaks through WordPress users’ passwords by brute force and how to deal with it.

Read more

Can the hacking (defacing) of a WordPress site lead to a case for damages for users who accessed the site?

Can the hacking (defacing) of a WordPress site lead to a case for damages for users who accessed the site?

We would like to talk about whether hacking (tampering) with a WordPress site can lead to a case for damages for users who access the site, based on our experience.

Read more

Malware using text copy and paste service in WordPress

Malware using text copy and paste service in WordPress

This section describes malware that uses a text copy and paste service in WordPress.

Read more

Top 10 fraudulent user login IDs and email addresses created in WordPress

Top 10 fraudulent user login IDs and email addresses created in WordPress

Around 30% of the WordPress sites we receive these days have rogue WordPress users, and the hacking technique of creating rogue users on WordPress is spreading.

Read more

Malware displays fake Chrome update screen on WordPress site

Malware displays fake Chrome update screen on WordPress site

We will explain a new type of malware that is spreading these days: fake updates.

Read more

How do WordPress hackers find site vulnerabilities and deface sites? What are effective security measures?

How do WordPress hackers find site vulnerabilities and deface sites? What are effective security measures?

When a site is hacked and defaced, some webmasters generally assume that hackers have targeted your site and infiltrated it with advanced technology, but this is not the case with WordPress. This is not the case with WordPress.

Read more

Will WordPress malware removal restore contaminated search results?

Will WordPress malware removal restore contaminated search results?

There is a type of WordPress malware that registers fraudulent e-commerce site pages in Google search results without permission. We will explain whether (and when) such malicious search results disappear after the malware is removed.

Read more

Notes on what to do if multiple WordPress sites across the server have been infected (tampered with) by malware.

Notes on what to do if multiple WordPress sites across the server have been infected (tampered with) by malware.

We will explain the precautions to take when multiple WordPress sites across the server have been infected (tampered with) by malware.

Read more

Case of malware being written to WPCode - Insert Headers and Footers plugin in WordPress

Case of malware being written to WPCode – Insert Headers and Footers plugin in WordPress

We have discovered a case of malware (redirect code) being written to the WPCode – Insert Headers and Footers plugin in WordPress.

Read more

What is a web shell, a piece of malware that can be installed via a vulnerability in WordPress?

What is a web shell, a piece of malware that can be installed via a vulnerability in WordPress?

This section describes a web shell that can be installed via a vulnerability in WordPress.

Read more

How to test for vulnerabilities in the WordPress mainframe and plugins

How to test for vulnerabilities in the WordPress mainframe and plugins

Here are some ways to test for vulnerabilities in the WordPress mainframe and plugins.

Read more

Page 2/14