In the ever-evolving landscape of cybersecurity, web applications face a constant barrage of threats. To fortify the digital fortresses surrounding our online presence, web developers and administrators turn to robust security measures, and one such crucial defender...
Log4Shell Vulnerability Protection As of 10 December, three critical vulnerabilities were reported in Apache’s Log4Shell component. Log4J is a library made in Java that is used to write log files. It is estimated that more than 35,000 applications use Log4J and...
The brute force is one of the most common ways used by hackers to gain access to a server. This method is used against many targets: SSHFTPMail accountsCMS like WordPress and Joomla! In the lasts times there have been a huge increment in BF attacks against WordPress...
What is a web shell? A web shell is a script that is often uploaded to a server with the aim of giving a hacker the remote control of a machine. Web servers that become infected can either be internal to the network or internet-facing, where the shell is utilized to...
WordPress Vulnerability CVE-2018-6389 February, 5th, 2017. A new WordPress vulnerability was discovered by Israeli researcher Barak Tawily. According to the official WordPress website, 29% of the existing websites use this platform and, therefore, are affected by this...