We will explain the latest password policy (how to determine a unified password) when using WordPress with multiple administrators and editors (contributors).
Tag: WordPress database Page 1/6
We will explain why plug-ins can be compromised even if they are up-to-date – vulnerabilities created by “obsolete plug-ins” based on the attack patterns we have detected.
This section explains what to do if you have installed 2FA or other security plugins for WordPress and can no longer log in yourself.
Here is a simple PHP code (in functions.php) that detects a brute force attack on wordpress and blocks that IP for 1 hour.
A brute force attack may be the cause of the frequent 504 and 403 errors on your WordPress site. We will explain the symptoms and how to deal with this issue.
We will explain five blind spots that are more dangerous for WordPress operators who think they have security measures in place.
People say it’s dangerous not to update your WordPress… I’ll explain exactly what happens if you don’t update your WordPress.
Hackers may install malicious plugins (wp-cleansong, wp-cache, optimize-core, system.php, etc.) once they have successfully infiltrated a WordPress site. This section describes how to deal with the installation of such unauthorized plug-ins.
I would like to explain whether or not it is better to put wp-config.php under a different name or in a different directory, and how to do this.
This presentation will explain how to automate WordPress malware and vulnerability detection and email notification.
The paid version of our WP Doctor Malware Scanner Pro introduces features and settings that are particularly useful for security-related maintenance of WordPress sites.
We will explain about base64_decode and base64_encode, which are commonly found in WordPress malware, why this function often appears and how to recover this function.
This page describes an infection case in which script malware was appended to a large number of posts in WordPress.
This section will explain the most important WordPress security measures to be aware of.
The most important WordPress vulnerabilities to be aware of are Arbitrary file uploads and SQL injection.
There have been an increasing number of cases of malicious JAVASCRIPT being embedded in all WordPress posts. Here is how to deal with this malware.
This section describes a web shell that can infect (or be installed by hackers) WordPress.
This section describes injection attacks in which malicious content is inserted into WordPress pages.





















