Page 2/12

WordPress outputting user login ID and ID number in JSON issue

WordPress outputting user login ID and ID number in JSON issue

WordPress outputs user login IDs and ID numbers in JSON. Although this is a specification, it may make your site more vulnerable to hackers for security reasons.

Read more

Malware installed in the top directory of WordPress

Malware installed in the top directory of WordPress

We would like to introduce you to the malware that is installed in the top directory of WordPress.

Read more

What to do if there is a user 123@abc.com in WordPress that you don't remember creating.

What to do if there is a user 123@abc.com in WordPress that you don’t remember creating.

User 123@abc.com, which you don’t remember creating in WordPress, is an admin user that hackers add illegally.

Read more

New WordPress tampering technique, inclusion of .ccss malware

New WordPress tampering technique, inclusion of .ccss malware

The new WordPress tampering technique, the inclusion of .ccss malware, will be explained.

Read more

New SEO hack to register Chinese and product name wordpress search results in Google search results.

New SEO hack to register Chinese and product name wordpress search results in Google search results.

We have identified a new method of SEO hack that registers WordPress search results in Chinese and product names in Google search results, and we will explain how to deal with it.

Read more

What to do if spam comments don't stop spamming URLs and links in WordPress

What to do if spam comments don’t stop spamming URLs and links in WordPress

Here’s what to do when spam comments don’t stop spamming URLs and links in WordPress.

Read more

How to stop the execution of PHP programs in the wordpress security improvement upload folder

How to stop the execution of PHP programs in the wordpress security improvement upload folder

You can improve security by preventing the execution of PHP programs in the upload folder of WordPress uploaded images and other folders that contain only static files outside of WordPress.

Read more

Check regularly for unauthorized users added to WordPress!

Check regularly for unauthorized users added to WordPress!

This section describes the defacing of a WordPress site by adding an unauthorized user.

Read more

Example of distribution of fake security patches for fake vulnerability CVE-2023-45124

Example of distribution of fake security patches for fake vulnerability CVE-2023-45124

A case of a fake WordPress vulnerability patch being distributed has been uncovered. This fake security patch is malware, and there are currently reported cases of emails to WordPress administrators containing links to this malware.

Read more

What is the obfuscation process used in over 90% of WordPress malware?

What is the obfuscation process used in over 90% of WordPress malware?

More than 90% of WordPress malware has obfuscated PHP programs. This article describes the obfuscation process.

Read more

What is phishing and what is a fake Google login screen on a WordPress site?

What is phishing and what is a fake Google login screen on a WordPress site?

This section describes phishing that displays a fake Google login screen on a WordPress site.

Read more

How Hackers Discover Your WordPress Site Dork

How Hackers Discover Your WordPress Site Dork

It is dangerous to run a WordPress site and think that it will not be targeted because of low traffic. We will explain why low traffic does not necessarily mean that your site will not be hacked.

Read more

Vulnerability in tagDiv Composer plugin bundled with WordPress Newspaper theme allows database rewriting

Vulnerability in tagDiv Composer plugin bundled with WordPress Newspaper theme allows database rewriting

A vulnerability in tagDiv Composer, a plugin included with the WordPress Newspaper theme, has been discovered that allows the database to be rewritten.

Read more

Type of malware that hooks search results of site search in WordPress to search engines.

Type of malware that hooks search results of site search in WordPress to search engines.

We have been consulted about a new type of malware that hooks the search results of site searches in WordPress to search engines, and here is a case study of it.

Read more

What are the strongest permissions to prevent malware infection in WordPress?

What are the strongest permissions to prevent malware infection in WordPress?

We will introduce the strongest file write permissions (permissions) to prevent malware infection in cases such as repeated malware infections in WordPress.

Read more

What to do when a WordPress site displays a red screen saying "This site may cause damage to your computer.

What to do when a WordPress site displays a red screen saying “This site may cause damage to your computer.

This section explains how site operators can deal with a red screen on a WordPress site that says “This site may cause damage to your computer.

Read more

How can I increase the security of the WordPress login screen?

How can I increase the security of the WordPress login screen?

We will explain how to increase the security of the WordPress login screen in order of importance.

Read more

Chinese Malware (Backdoors) Increased in WordPress

Chinese Malware (Backdoors) Increased in WordPress

Recently, Chinese malware (backdoor) has been spreading through WordPress. We will explain about this malware.

Read more

Page 2/12