Tag: WordPress removal Page 1/13

Malware infection of wordpress mu-plugins folder

Malware infection of wordpress mu-plugins folder

There have been an increasing number of cases of malware infection of the wordpress mu-plugins folder. This case study will be explained.

Read more

Vulnerability in WordPress WP File Manager plugin

Vulnerability in WordPress WP File Manager plugin

Since the WP File Manager plugin is installed on a large number of malware-infected sites, hacking that targets vulnerabilities in this plugin may be a current trend.

Read more

Online WordPress malware scanning site.

Online WordPress malware scanning site.

Here are some sites online where you can scan your WordPress output for malware (not a vulnerability scan) to see if there is any malicious code mixed in with the HTML of your site.

Read more

How to identify suspicious files in the top directory of WordPress

How to identify suspicious files in the top directory of WordPress

This section explains how to identify suspicious files (malware files) in the top directory of WordPress.

Read more

What are the characters such as \x2e and\161,\u etc. that are commonly found in WordPress malware infected files? How to read them back

What are the characters such as \x2e and\161,\u etc. that are commonly found in WordPress malware infected files? How to read them back

We will explain about the characters such as \x2e and \161,\u etc. that are commonly found in WordPress malware infected files and how to read them back.

Read more

WordPress content injection case study, online casino site operating on its own server

WordPress content injection case study, online casino site operating on its own server

Here is a case study of a WordPress content injection that caused an online casino site to operate on its own server.

Read more

What is an injection attack in which malicious content is inserted into a WordPress page?

What is an injection attack in which malicious content is inserted into a WordPress page?

This section describes injection attacks in which malicious content is inserted into WordPress pages.

Read more

What character strings should not be used in the admin password of a WordPress site?

What character strings should not be used in the admin password of a WordPress site?

This section describes the character strings that should not be used in the administrator password of a WordPress site.

Read more

What kind of attacks can hackers launch on a WordPress site?

What kind of attacks can hackers launch on a WordPress site?

What kind of attacks can hackers launch on a WordPress site? We will explain about the following

Read more

Malware removal for a group of WordPress sites spanning multiple domains on a single server

Malware removal for a group of WordPress sites spanning multiple domains on a single server

We have compiled a list of precautions for malware removal for a group of WordPress sites spanning multiple domains on a single server.

Read more

Why WordPress is infected with malware and no matter how many times you remove the malicious code, it comes back after a while.

Why WordPress is infected with malware and no matter how many times you remove the malicious code, it comes back after a while.

We will explain why a site is infected with malware in WordPress and moves itself to another site, and why the malicious code comes back after a while, no matter how many times you remove it.

Read more

Malware contamination of the WordPress staging environment should also be noted

Malware contamination of the WordPress staging environment should also be noted

There have been cases where the WordPress staging environment has been contaminated with malware and malware has spread to this site. It is necessary to operate the WordPress staging environment in a security-conscious manner.

Read more

Malware wp-blog-header.php, wp-cron.php, .htaccess proliferating outside of the public folder on the server in WordPress

Malware wp-blog-header.php, wp-cron.php, .htaccess proliferating outside of the public folder on the server in WordPress

If you find multiple wp-blog-header.php, wp-cron.php, and .htaccess files outside of the public folder on your server in WordPress, be careful. These files are most likely malware that propagates automatically.

Read more

Analysis of WordPress malware that revives in an instant or changes permissions (write permissions) of index.php and htaccess files

Analysis of WordPress malware that revives in an instant or changes permissions (write permissions) of index.php and htaccess files

Analyze wordpress malware that revives in an instant or changes the permissions (write permissions) of index.php and htaccess files.

Read more

Detect WordPress hacks and block IPs!

Detect WordPress hacks and block IPs!

WordPress sites, no matter how small, are actually exposed to hacking attacks on a daily basis. We will explain how to detect this WordPress hacking and block IPs.

Read more

Cases where public_html or www folders are not writable, permissions cannot be changed, and malware cannot be removed.

Cases where public_html or www folders are not writable, permissions cannot be changed, and malware cannot be removed.

We will describe a case where the public_html folder was not writable due to malware infecting WordPress, and the permissions could not be changed, making it impossible to remove the malware.

Read more

Malware in wordpress with $wp_update_file=" reads files that do not originally exist and writes them to various folders

Malware in wordpress with $wp_update_file=” reads files that do not originally exist and writes them to various folders

Malware that reads files that do not originally exist and writes them to various folders with “$wp_update_file=” in WordPress is detected very often these days.

Read more

The 3 most targeted and most dangerous vulnerabilities in WordPress

The 3 most targeted and most dangerous vulnerabilities in WordPress

The following are the three vulnerabilities that are most likely to be exploited if discovered on a WordPress site. If your site contains any plug-ins or other components that are vulnerable to these vulnerabilities, we recommend that you take action as soon as possible.

Read more

Page 1/13