This is a brief glossary of common vulnerability attacks on WordPress.
Tag: WordPress check Page 2/8
Malware infections are spreading in WordPress that cleverly disguise themselves as common programs.
If a page you do not remember creating is registered in Google Search Console, it is possible that your WordPress site was infected with malware and generated a malicious page.
This section describes the installation of a fake plugin Super Socialat spreading in WordPress.
We will explain how to investigate unauthorized access to admin-ajax.php in WordPress
Here are five minimum security precautions to take when managing a WordPress site. In our experience, this will prevent more than 90% of hacking attempts.
Here is what to do if you are unable to download a WordPress plugin.
Vulnerability testing of WordPress plugins should be performed on a regular basis. We will explain the reasons for this.
Many of today’s malware spread infection to all folders beyond the domain folders in the server. In this article, we will discuss the infection of initial subdomain folders on unused servers, which is often overlooked.
There is a type of WordPress malware that registers fraudulent e-commerce site pages in Google search results without permission. We will explain whether (and when) such malicious search results disappear after the malware is removed.
We are currently unable to update the vulnerability database of our malware scan plug-ins due to the fact that NIST has stopped updating the database.
Malware infection is not only a WordPress problem, but is common to all CMS. (WordPress stands out because of its overwhelming popularity, but…) There are an increasing number of cases where old Movable Type is left unattended on a server and malware infection spreads to Wo
This section explains what to do if you do not know the location of infected malware or if you cannot find it.
We will explain how to find backdoors in a hacked and defaced WordPress site.
Here is what to do if your WordPress site is being warned by Search Console of a large number of noindexes on non-existent WordPress search results pages.
We will explain how an infection (tampering) with the WordPress database can cause the files on the site (server) to be tampered with.
The new WordPress tampering technique, the inclusion of .ccss malware, will be explained.
This section describes the defacing of a WordPress site by adding an unauthorized user.