Seite wählen
Choosing the right HTTPS certificate for your WordPress website

Choosing the right HTTPS certificate for your WordPress website

https://www.wpwhitesecurity.com/choosing-https-certificate-wordpress-website/In our previous post WordPress HTTPS, SSL and TLS – a guide for website administrators, we explained what HTTPS and all the other technical terms are, and how it works. In this article,...
Authentication Bypass Vulnerability in GiveWP Plugin

Authentication Bypass Vulnerability in GiveWP Plugin

Authentication Bypass Vulnerability in GiveWP Plugin Description: Authentication Bypass with Information DisclosureCVSS v3.0 Score: 7.5 (High)CVSS Vector String: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NAffected Plugin: GiveWPPlugin Slug: giveAffected...
8 WordPress Security Infographics to Download & Share

8 WordPress Security Infographics to Download & Share

https://ithemes.com/wordpress-security-infographics/Love infographics? We do, too! From WordPress security basics to how to secure your website, we have 8 WordPress security infographics for you to download and share. 1. Five Ways to Secure Your WordPress Website It...
Zero-Day RCE in vBulletin v5.0.0-v5.5.4

Zero-Day RCE in vBulletin v5.0.0-v5.5.4

http://feedproxy.google.com/~r/sucuri/blog/~3/C0lXQcD0tyc/zero-day-rce-in-vbulletin-v5-0-0-v5-5-4.html A new remote code execution (RCE) zero-day vulnerability has been disclosed by an anonymous researcher on the Full Disclosure mailing list this past Monday....
Stop WordPress from Changing .htaccess

Stop WordPress from Changing .htaccess

https://perishablepress.com/stop-wordpress-changing-htaccess/ In a recent tutorial, I explain how to Stop WordPress from modifying .htaccess. That post explains several ways to prevent WordPress from making changes to .htaccess. This post explains an even better way...
The Hacker Returns: A Backdoor Edition

The Hacker Returns: A Backdoor Edition

http://feedproxy.google.com/~r/sucuri/blog/~3/7zkxQvxRAUo/the-hacker-returns-a-backdoor-edition.html Once an attacker manages to hack and gain access to a target site or system, they typically work hard to maintain their access—as long as it can to help them...
Share This