Category Archives 911 Hack Removal

Critical XSS Vulnerability in FB messenger live chat

Owing to the widespread presence of WordPress, hackers, in fact try incessantly to make past every popular WordPress plugin. As a result, vulnerability disclosures in WordPress plugins almost seem like a never ending process. This time its Fb messenger live chat by Zotabox. So, FB messenger live chat by Zotabox has recently been disclosed to have persistent XSS vulnerability.

Popular Plugin Ninja Forms Vulenrable to Arbitrary File Upload & Path Traversal

Ninja Forms, is a WordPress plugin which allows websites to facilitate creating and customizing forms just by dragging and dropping. Moreover, it is currently in use on 1 million+ websites. This data, obviously, hints at the popularity Ninja forms when enjoying when the news of Ninja Forms' "File upload" extension being vulnerable to arbitrary file upload and path traversal surfaced a day ago. And it was quite a shocker.

WordPress Website Hacked & Sending Spam: Symptoms, Causes & Cleanup

WordPress is probably the cheapest and easiest solution for online content management. WordPress has been around for a long time and powers a major section of the web now. However, this popularity comes with a heavy cost as it is also one of the most commonly targeted CMS in the world. As a result, users often complain of issues like WordPress hacked sending spam to their customers. And dealing with WordPress spam can prove to be more frustrating for you for it can sabotage the reputation of your site in the long run.

Git Repositories (GitHub, GitLab & BitBucket) Hacked

This weekend, another shocking news started doing rounds. Git Repositories, the distributed version control for open source software was hacked. It includes GitHub, GitLab & Bitbucket as its extended channels. According to GitHub search, as many as 392 user accounts has been hacked. Further, the malefactor has deleted programmer's source codes and version histories and replaced it.

PHP SQL Injection: All You Need To Know

In the class of injection attacks, SQL injection attack has come out highly prominent. The majority of websites are vulnerable to it. According to Akamai, in 2017, more than 50 % attacks were done on web using SQL injection. In this article, we would discuss how SQL injection is carried out and how we can prevent the same in PHP applications.

Fake Payment Method Added in Magento Store - Credit Card Info Getting Leaked

In this attack, the hacker either adds a new payment method or plants a fake payment form. These tricks let him fish valuable credit card info. This particular hack was disclosed when one of Magento users reported to us that something fishy was going on with his website's payment gateway. When our engineers, scanned the website, they found that it indeed was hacked.

PrestaShop Malware Attack - How to Secure PrestaShop Store in Real Time

Being a successful e-commerce platform, Prestashop, no doubt, is a lucrative target for hackers. Hackers are continuously on hunt for an overlooked vulnerability in popular CMS(s). They are on the look out for new methods to deliver their payload like injecting malware in the traffic of open Wi-Fi via ARP poisoning. Further, a PrestaShop Malware is any kind of malicious code deployed by the hackers via a vulnerability in order to exploit a Prestashop store.

Close