xmlrpc.php overload (Wordpress) - en doe er wat aan!
Geplaatst door Peter-Support-Helpburo.eu Support aan 17-08-2015 15:16 |
|
as this overload is caused by regular requests (although those requests are coming sometimes in a big amount), there is nothing a control panel can detect about them. The requests to xmlrpc.php are a quite common problem - and are not solved by deleting that file, as then the requests are redirected to the index.php and overloading your site again. Verder lezen... | |
(HERRINERING) The bruteforce attacks against WordPress and Joomla login pages
Geplaatst door Mike-Support Helpburo.eu aan 13-07-2015 13:16 |
|
We herhalen het nog maar eens! The bruteforce attacks against WordPress and Joomla login pages - as written here already: https://www.helpburo.eu/index.php?/News/NewsItem/View/67/massale-brute-force-pogingen-op-wordpress-sites - are getting worse all over the internet, not only on your server. Even worse are the WordPress xmlrpc pingback attacks which are well known Verder lezen... | |
Patchman voor veiligere websites op alle webhosting accounts & reseller pakketten (NIEUW)
Geplaatst door Mark-Support Helpburo.eu aan 12-06-2015 13:22 |
|
Patchman op alle webhosting accounts & reseller pakketten Patchman scant alle websites op onze hosting servers dagelijks en detecteert software lekken en malware. Verder lezen... | |
Critical severity vulnerability in the WordPress WooCommerce plugin
Geplaatst door Mike-Support Helpburo.eu aan 11-06-2015 10:07 |
|
Critical severity vulnerability in the WordPress WooCommerce plugin Are You At Risk?The vulnerability is only present when WooCommerce’s “PayPal Identity Token” option is set. If it is, your site is vulnerable to an Object Injection type of vulnerability, which essentially means that depending on the context the site is running in, it may be used to do a variety of things. We managed to use a combination of WordPress and WooCommerce components with a known PHP bug (CVE-2013-1643) to Verder lezen... | |
Landelijke storing AMS-IX veel websites tijdelijk of niet bereikbaar v.a ca. 12.30 - 12.50 uur (update 14.15 uur - gesloten)
Geplaatst door Mark-Support Helpburo.eu aan 13-05-2015 12:57 |
|
Update: 14.15 uur: (gesloten) Verder lezen... | |
Critical Security Advisory for All Versions of Magento “shoplift” bug
Geplaatst door Mark-Support Helpburo.eu aan 30-04-2015 20:29 |
|
Critical Security Advisory for All Versions of Magento Enterprise Edition and Magento Community Edition
The remote code execution (RCE) vulnerability, or “shoplift” bug, was reported to us by Check Point Software Technologies in late January 2015. It affects both Magento Enterprise Edition and Magento Community Edition and allows attackers to obtain control over a store and its sensitive data, including personal customer information. Magento issued a patch for this issue on February Verder lezen... | |