Global CyberSecurity
Magento Supply Chain Attack Targets Extension Developer FishPig
Post Views: 691 Magento store owners using the popular FishPig extensions should be wary of a recent supply chain attack which compromised their ...
Global CyberSecurity
Gambling Spam in Visual Composer Raw HTML Element: [vc_raw_html]
Post Views: 726 Bad actors often look for clever ways to boost the rankings and visibility of their spam pages in search. One ...
Global CyberSecurity
What Is Clickjacking and How Do I Prevent It?
Post Views: 540 There are a plethora of techniques that attackers use to redirect site visitors and harvest sensitive information on compromised websites. ...
Global CyberSecurity
How Are Favicon (.ico) Files Used in Website Malware?
Post Views: 567 When a website is hacked symptoms can sometimes include unexpected, unfamiliar and strangely located favicon or .ico files. Other symptoms ...
Global CyberSecurity
What Is a 500 Internal Server Error & How to Fix It
Post Views: 676 A frustrating interruption to anyone’s day is the infamous 500 internal server error. When it happens not only do you ...
Global CyberSecurity
WordPress Vulnerabilities & Patch Roundup — August 2022
Post Views: 670 Vulnerability reports and responsible disclosures are essential for website security awareness and education. Automated attacks targeting known software vulnerabilities are ...
Global CyberSecurity
Post-Hack Instructions: SEO Spam & 404 Errors in Search Console
Post Views: 872 Every once in a while, we get a glimpse into the strange behavior that happens after a site is compromised. ...