Global CyberSecurity
Magento Supply Chain Attack Targets Extension Developer FishPig
Post Views: 357 Magento store owners using the popular FishPig extensions should be wary of a recent supply chain attack which compromised their ...
Global CyberSecurity
Gambling Spam in Visual Composer Raw HTML Element: [vc_raw_html]
Post Views: 392 Bad actors often look for clever ways to boost the rankings and visibility of their spam pages in search. One ...
Global CyberSecurity
What Is Clickjacking and How Do I Prevent It?
Post Views: 318 There are a plethora of techniques that attackers use to redirect site visitors and harvest sensitive information on compromised websites. ...
Global CyberSecurity
How Are Favicon (.ico) Files Used in Website Malware?
Post Views: 344 When a website is hacked symptoms can sometimes include unexpected, unfamiliar and strangely located favicon or .ico files. Other symptoms ...
Global CyberSecurity
What Is a 500 Internal Server Error & How to Fix It
Post Views: 358 A frustrating interruption to anyone’s day is the infamous 500 internal server error. When it happens not only do you ...
Global CyberSecurity
WordPress Vulnerabilities & Patch Roundup — August 2022
Post Views: 350 Vulnerability reports and responsible disclosures are essential for website security awareness and education. Automated attacks targeting known software vulnerabilities are ...
Global CyberSecurity
Post-Hack Instructions: SEO Spam & 404 Errors in Search Console
Post Views: 530 Every once in a while, we get a glimpse into the strange behavior that happens after a site is compromised. ...