Best WordPress Hosting
 

How to Secure & Harden Your Joomla! Website in 12 Steps

At Sucuri, we’re often asked how website owners and webmasters can secure their websites. However, advice can often be too broad; different content management systems (CMS) exist in this ecosystem and each require a unique security configuration. That’s exactly why Continue reading How to Secure & Harden Your Joomla! Website in 12 Steps

WordPress Vulnerability & Patch Roundup September 2022

Vulnerability reports and responsible disclosures are essential for website security awareness and education. Automated attacks targeting known software vulnerabilities are one of the leading causes of website compromises. To help educate website owners on emerging threats to their environments, we’ve Continue reading WordPress Vulnerability & Patch Roundup September 2022

New Malware Variants Serve Bogus CloudFlare DDoS Captcha

The attack is simple: when browsing an infected website, the user receives a notification that insists they must download a file to continue to access the content. What they don’t know is that the file is actually a Remote Access Continue reading New Malware Variants Serve Bogus CloudFlare DDoS Captcha

A Guide to Virtual Patching for Website Vulnerabilities

All software has bugs — but some bugs can lead to serious security vulnerabilities that can impact your website and traffic. Vulnerabilities can be especially dangerous when your software is running over the web, since anyone can reach out and Continue reading A Guide to Virtual Patching for Website Vulnerabilities

Magento Supply Chain Attack Targets Extension Developer FishPig

Magento store owners using the popular FishPig extensions should be wary of a recent supply chain attack which compromised their software repository. FishPig released a detailed security announcement on September 13th, 2022. The attack is estimated to have occurred on Continue reading Magento Supply Chain Attack Targets Extension Developer FishPig

Gambling Spam in Visual Composer Raw HTML Element: [vc_raw_html]

Bad actors often look for clever ways to boost the rankings and visibility of their spam pages in search. One of the many black hat SEO injections that we regularly find on compromised sites involves spammy links hidden inside a Continue reading Gambling Spam in Visual Composer Raw HTML Element: [vc_raw_html]

What Is Clickjacking and How Do I Prevent It?

There are a plethora of techniques that attackers use to redirect site visitors and harvest sensitive information on compromised websites. But when most webmasters think about securing their website, they often don’t think about how attackers can inject clicks on Continue reading What Is Clickjacking and How Do I Prevent It?

What Is a 500 Internal Server Error & How to Fix It

A frustrating interruption to anyone’s day is the infamous 500 internal server error. When it happens not only do you lose traffic or potential site revenue, but it can also reflect badly on your site’s reputation and even affect your Continue reading What Is a 500 Internal Server Error & How to Fix It

WordPress Vulnerabilities & Patch Roundup — August 2022

Vulnerability reports and responsible disclosures are essential for website security awareness and education. Automated attacks targeting known software vulnerabilities are one of the leading causes of website compromises. To help educate website owners on emerging threats to their environments, we’ve Continue reading WordPress Vulnerabilities & Patch Roundup — August 2022

Post-Hack Instructions: SEO Spam & 404 Errors in Search Console

Every once in a while, we get a glimpse into the strange behavior that happens after a site is compromised. Hacked websites are known to result in a plethora of headaches for webmasters, including malicious redirects, broken links, and unwanted Continue reading Post-Hack Instructions: SEO Spam & 404 Errors in Search Console

Examining Less-Common WordPress Credit Card Skimmers

Since 2020 considerable attention has been spent analysing the emergence of MageCart malware within WordPress environments which most commonly affects sites using WooCommerce. As demonstrated in a previous post WordPress has quickly become the most commonly affected CMS platform for Continue reading Examining Less-Common WordPress Credit Card Skimmers

Fake DDoS Pages On WordPress Sites Lead to Drive-By-Downloads

It’s not uncommon for users to experience “DDoS Protection” pages when casually browsing the web. These DDoS protection pages are typically associated with browser checks performed by WAF/CDN services which verify if the site visitor is, in fact, a human Continue reading Fake DDoS Pages On WordPress Sites Lead to Drive-By-Downloads

SocGholish: 5+ Years of Massive Website Infections

Earlier this June, we shared information about the ongoing NDSW/NDSX malware campaign which has been one of the most common website infections detected and cleaned by our remediation team in the last few years. This NDSW/NDSX malware — also referred Continue reading SocGholish: 5+ Years of Massive Website Infections

Fake Instagram Verification & Twitter Badge Phishing

Social media platforms like Instagram and Twitter offer verification badges as a credibility indicator to help show authenticity and integrity to visitors. To obtain a badge, profiles must meet a list of various requirements and undergo verification process. For example, Continue reading Fake Instagram Verification & Twitter Badge Phishing

7 Tips to Clean & Maintain Your Website

Most people would agree — living in a house full of accumulated debris and unnecessary objects can create a chaotic environment, and even cause health problems. This scenario is easily applicable to your website, too. You can think of your Continue reading 7 Tips to Clean & Maintain Your Website