Critical Privilege Escalation Vulnerability in Essential Addons for Elementor Plugin Affecting Over One Million Sites

Introduction A severe vulnerability has been detected in Essential Addons for Elementor (from 5.4.0 through 5.7.1), a WordPress plugin with over one million active installations. This flaw was patched on May 11, 2023, but due to its severity, we believe it’s essential to raise awareness and ensure all affected users have applied the patch. Details … Read more

Vulnerability fixed in WordPress Elementor Pro plugin – How cPGuard handles it

The vulnerability – High severity vulnerability fixed in WordPress Elementor Pro plugin As many of you are aware already, there is a critical vulnerability reported in the WordPress Elementor Pro plugin, which is installed on millions of websites. Though they have already released a patched version already, there are still many websites left unpatched, and … Read more

Use of Zip and Unzip command in Linux

zip-and-unzip

What is Zip ? Zip is a file format that helps to compress one or more files together into a single location. As an archiving tool, zip is used for backup files as well as for transferring the files between servers. The zip file format supports the lossless compression algorithm. In this article, we are discussing … Read more

Defending Yourself From SEO Poisoning

Defending Seo Poisoning

In the midst of the COVID-19 pandemic and its devastating effects on the economy worldwide, cybersecurity concerns have recently taken the spotlight. The number of reported attacks in the US alone rose by 69% in 2020 after hackers broke into a number of private computer systems and encrypted the data for ransom. Threats to website … Read more

What is .ENV files ?

what is .ENV files

Two fundamental components of any computer programming language are variables and constants. Like independent variables in a mathematical equation, these take on values that change the results of the program. Variables and constants both represent unique memory locations containing data the program uses in its calculations. The difference between the two is that variables values … Read more

IPSET with IPTABLES

ipset with iptables

IPSET is an extension to iptables that allows you to create firewall rules that match entire “sets” of addresses at once. Unlike normal iptables chains, which are stored and traversed linearly, IP sets are stored in indexed data structures, like addresses, networks, (TCP/UDP) port numbers, MAC addresses, interface names or combinations of them in a … Read more

Danger behind using older php versions?

Danger behind using older php versions

PHP ( PHP Hypertext Processor ) commonly used programming language for creating websites. Over 78% of all the websites are using PHP, ie. 8 out of 10 websites are PHP websites. WordPress, Joomla, Drupal, and many other CMSs are using PHP as the programming language. The latest PHP version 7.4.9 was released on “06 Aug … Read more

Postfix – Configuration Tips to Fight Spam

Postfix Configuration Tips to Fight Spam

In this guide you will learn how to tweak the default postfix configuration for incoming emails. In Postfix configuration you need to add or edit following directives on /etc/postfix/main.cf configuration file. All configuration directives are explained in the postfix website. Postfix Configuration Parameters smtpd_helo_required = yes Require that a remote SMTP client introduces itself with … Read more

Extending ClamAV Signatures with RFXN Database for PHP Malware’s

extending clamav signatures

You can use 3rd party compiled malware and virus signature databases to extend ClamAV signature database collection with better detection PHP malwares. RFXN (R-FX NETWORKS) Database signature are updated typically once per day or more frequently depending on incoming threat data from the LMD checkout feature, IPS malware extraction and other sources. Installation Add the … Read more