<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Website protection Archives - Tarheel Media Digital Marketing</title>
	<atom:link href="https://tarheel.media/tag/website-protection/feed/" rel="self" type="application/rss+xml" />
	<link>https://tarheel.media/tag/website-protection/</link>
	<description>Digital Marketing The Right Way</description>
	<lastBuildDate>Wed, 29 Oct 2025 22:11:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://tarheel.media/wp-content/uploads/2022/12/cropped-tarheel-icon-1-32x32.png</url>
	<title>Website protection Archives - Tarheel Media Digital Marketing</title>
	<link>https://tarheel.media/tag/website-protection/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Breaking News: Web Service Scandal Unfolds with Polyfill.io and Cloudflare</title>
		<link>https://tarheel.media/security-bulletin/2024/06/28/breaking-news-web-service-scandal-unfolds-with-polyfill-io-and-cloudflare/</link>
		
		<dc:creator><![CDATA[Mike W.]]></dc:creator>
		<pubDate>Fri, 28 Jun 2024 14:03:22 +0000</pubDate>
				<category><![CDATA[Security Bulletin]]></category>
		<category><![CDATA[browser compatibility]]></category>
		<category><![CDATA[CDNJS]]></category>
		<category><![CDATA[Cloudflare]]></category>
		<category><![CDATA[code injection]]></category>
		<category><![CDATA[code integrity]]></category>
		<category><![CDATA[content delivery network]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[internet safety]]></category>
		<category><![CDATA[JavaScript library]]></category>
		<category><![CDATA[malicious script]]></category>
		<category><![CDATA[online trust]]></category>
		<category><![CDATA[Polyfill.io]]></category>
		<category><![CDATA[reverse proxy]]></category>
		<category><![CDATA[script replacement]]></category>
		<category><![CDATA[secure browsing]]></category>
		<category><![CDATA[SEO optimization]]></category>
		<category><![CDATA[supply chain attack]]></category>
		<category><![CDATA[tech scandal]]></category>
		<category><![CDATA[User experience]]></category>
		<category><![CDATA[web development]]></category>
		<category><![CDATA[web security]]></category>
		<category><![CDATA[web services]]></category>
		<category><![CDATA[Website performance]]></category>
		<category><![CDATA[Website protection]]></category>
		<guid isPermaLink="false">https://tarheel.media/?p=6597</guid>

					<description><![CDATA[<p>Polyfill.io supply‑chain incident: what happened In the past few days a supply‑chain incident involving Polyfill.io disrupted a large number of websites. Polyfill.io, a service that delivers small JavaScript polyfills to add missing browser features, allegedly distributed suspicious code that injected into many sites. Some reports estimate the impact reached more than 100,000 domains. Operators and  [...]</p>
<p>The post <a href="https://tarheel.media/security-bulletin/2024/06/28/breaking-news-web-service-scandal-unfolds-with-polyfill-io-and-cloudflare/">Breaking News: Web Service Scandal Unfolds with Polyfill.io and Cloudflare</a> appeared first on <a href="https://tarheel.media">Tarheel Media Digital Marketing</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><!--StartFragment --></p>
<p><!--StartFragment --></p>
<h2>Polyfill.io supply‑chain incident: what happened</h2>
<p>In the past few days a supply‑chain incident involving Polyfill.io disrupted a large number of websites. Polyfill.io, a service that delivers small JavaScript polyfills to add missing browser features, allegedly distributed suspicious code that injected into many sites. Some reports estimate the impact reached more than 100,000 domains. Operators and investigators took the Polyfill.io domain offline while they responded.</p>
<h2>How Cloudflare responded</h2>
<p>Cloudflare moved quickly to reduce exposure. The company replaced references to Polyfill.io with a secure mirror served through cdnjs and has said it never recommended Polyfill.io. Cloudflare’s action reduced the risk of further automatic propagation through CDNs and reverse proxies.</p>
<h2>Polyfill.io’s response and ownership concerns</h2>
<p>Polyfill.io has publicly disputed the allegations. At the same time, reporting shows the project was in the process of being acquired by a Chinese firm, which raised additional concern because of that buyer’s reported ties to the Chinese government. Polyfill.io’s public statement is here: <a href="https://twitter.com/Polyfill_Global/status/1805923380857897277">https://twitter.com/Polyfill_Global/status/1805923380857897277</a>.</p>
<h2>Who this affects</h2>
<p>We do not use Polyfill.io, so our systems were not directly dependent on it. However, sites that relied on CDNs, reverse proxies, or other intermediaries sometimes received Polyfill.io assets even if the site owner never included them directly. That’s why some organizations saw collateral impact despite not calling Polyfill.io in their own code.</p>
<h2>What you should do now</h2>
<p>Remove any references to Polyfill.io from your projects and replace them with a trusted alternative. Cloudflare’s cdnjs mirror offers a non‑breaking option that serves the same polyfill content. Also audit other third‑party front‑end dependencies, and prefer self‑hosting critical libraries or pinning and hosting copies you control when practical.</p>
<h2>Offer of help and next steps</h2>
<p>If you want assistance locating or replacing Polyfill.io references, or if you’d like a broader audit of third‑party scripts and CDNs, we can help. We will continue to monitor the situation and share verified updates as more information becomes available</p>
<p><!--EndFragment --></p>
<p><!--EndFragment --></p>
<p>The post <a href="https://tarheel.media/security-bulletin/2024/06/28/breaking-news-web-service-scandal-unfolds-with-polyfill-io-and-cloudflare/">Breaking News: Web Service Scandal Unfolds with Polyfill.io and Cloudflare</a> appeared first on <a href="https://tarheel.media">Tarheel Media Digital Marketing</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WordPress Website Security: Protecting Your Online Presence</title>
		<link>https://tarheel.media/website-security/2023/06/14/wordpress-website-security-protecting-your-online-presence/</link>
		
		<dc:creator><![CDATA[Michael Gilmore]]></dc:creator>
		<pubDate>Wed, 14 Jun 2023 18:26:34 +0000</pubDate>
				<category><![CDATA[Web Hosting]]></category>
		<category><![CDATA[Website Security]]></category>
		<category><![CDATA[malware scanning]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[password management]]></category>
		<category><![CDATA[secure hosting]]></category>
		<category><![CDATA[security plugins]]></category>
		<category><![CDATA[two-factor authentication]]></category>
		<category><![CDATA[user authentication]]></category>
		<category><![CDATA[website backups]]></category>
		<category><![CDATA[Website protection]]></category>
		<category><![CDATA[WordPress security]]></category>
		<guid isPermaLink="false">https://tarheel.media/?p=3617</guid>

					<description><![CDATA[<p>In an era where cybersecurity threats are on the rise, securing your WordPress website is paramount. With its popularity and widespread use, WordPress websites often become targets for malicious activities. In this blog post, we will explore the basics of WordPress website security and provide practical tips to safeguard your website. Additionally, we will shed  [...]</p>
<p>The post <a href="https://tarheel.media/website-security/2023/06/14/wordpress-website-security-protecting-your-online-presence/">WordPress Website Security: Protecting Your Online Presence</a> appeared first on <a href="https://tarheel.media">Tarheel Media Digital Marketing</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In an era where cybersecurity threats are on the rise, securing your WordPress website is paramount. With its popularity and widespread use, WordPress websites often become targets for malicious activities. In this blog post, we will explore the basics of WordPress website security and provide practical tips to safeguard your website. Additionally, we will shed light on the importance of securing your website username and password and how Wordfence can help fortify your online presence.</p>
<ol>
<li><strong>Strong Usernames and Passwords</strong><br />
The first line of defense for your WordPress website is a robust username and password combination. Avoid using common usernames like &#8220;admin&#8221; and create unique, complex passwords that include a combination of letters, numbers, and special characters. Regularly update your passwords and consider using password management tools to securely store and generate strong passwords.</li>
<li><strong>Two-Factor Authentication</strong><br />
Implementing two-factor authentication (2FA) adds an extra layer of security to your WordPress login process. It requires users to provide a second form of authentication, such as a temporary code generated by a mobile app or sent via SMS. By enabling 2FA, even if someone obtains your username and password, they would still need the additional authentication factor to gain access.</li>
<li><strong>Keeping WordPress and Plugins Up to Date</strong><br />
Regularly updating your WordPress core files and plugins is crucial for maintaining website security. Updates often include security patches and bug fixes that address vulnerabilities. Enable automatic updates whenever possible, and regularly check for plugin updates from reputable developers. Outdated software is a common entry point for hackers, so staying up to date is essential.</li>
<li><strong>Secure Hosting Environment</strong><br />
Choose a reliable and secure hosting provider for your WordPress website. Look for hosts that offer features like server-level firewalls, intrusion detection systems, and regular backups. A secure hosting environment provides an added layer of protection against potential threats and helps ensure the integrity of your website&#8217;s data.</li>
<li><strong>Limit Login Attempts</strong><br />
Brute-force attacks, where hackers attempt to gain access by trying multiple username and password combinations, are a common threat to WordPress websites. Limiting login attempts can mitigate this risk. Consider using security plugins like Wordfence, which provides functionality to restrict the number of login attempts and lockout suspicious IP addresses.</li>
<li><strong>Wordfence Security Plugin</strong><br />
Wordfence is a powerful security plugin designed specifically for WordPress. It offers a range of features to protect your website, including firewall protection, malware scanning, login security, and blocking suspicious IP addresses. Wordfence also provides real-time threat intelligence, monitoring your website for potential security risks and notifying you of any suspicious activity.</li>
<li><strong>Regular Backups</strong><br />
Creating regular backups of your WordPress website is essential in case of a security breach or other unforeseen events. Backups allow you to restore your website to a previous state and minimize potential damage. Use reliable backup solutions, either through your hosting provider or WordPress backup plugins, to ensure you have recent backups readily available.</li>
<li><strong>Ongoing Monitoring and Maintenance</strong><br />
Website security is an ongoing process that requires continuous monitoring and maintenance. Regularly scan your website for malware or vulnerabilities using security plugins like Wordfence. Stay informed about the latest security practices and potential threats by following reputable sources and forums dedicated to WordPress security.</li>
</ol>
<p>Securing your WordPress website is crucial to protect your online presence, sensitive data, and maintain the trust of your visitors. By implementing strong usernames and passwords, enabling two-factor authentication, keeping WordPress and plugins up to date, choosing a secure hosting environment, limiting login attempts, utilizing security plugins like Wordfence, regularly backing up your website, and performing ongoing monitoring and maintenance, you can significantly enhance the security of your WordPress website and mitigate potential risks.</p>
<p>The post <a href="https://tarheel.media/website-security/2023/06/14/wordpress-website-security-protecting-your-online-presence/">WordPress Website Security: Protecting Your Online Presence</a> appeared first on <a href="https://tarheel.media">Tarheel Media Digital Marketing</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Outdated WordPress Plugins make 60,000 Websites Vulnerable</title>
		<link>https://tarheel.media/security-bulletin/2023/05/17/outdated-wordpress-plugins-make-60000-websites-vulnerable/</link>
		
		<dc:creator><![CDATA[Michael Gilmore]]></dc:creator>
		<pubDate>Wed, 17 May 2023 18:27:20 +0000</pubDate>
				<category><![CDATA[Security Bulletin]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Exploitable plugins]]></category>
		<category><![CDATA[Information system security]]></category>
		<category><![CDATA[Penetration testing]]></category>
		<category><![CDATA[Plugin vulnerabilities]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Security disclosure process]]></category>
		<category><![CDATA[Security research]]></category>
		<category><![CDATA[SQL injections]]></category>
		<category><![CDATA[Unauthorized access]]></category>
		<category><![CDATA[Vulnerable websites]]></category>
		<category><![CDATA[Website hijacking]]></category>
		<category><![CDATA[Website intrusions]]></category>
		<category><![CDATA[Website maintenance]]></category>
		<category><![CDATA[Website protection]]></category>
		<category><![CDATA[Website security]]></category>
		<category><![CDATA[Website updates]]></category>
		<category><![CDATA[Website vulnerabilities]]></category>
		<category><![CDATA[WordPress database]]></category>
		<category><![CDATA[WordPress security]]></category>
		<guid isPermaLink="false">https://tarheel.media/?p=3160</guid>

					<description><![CDATA[<p>The security firm, Cyllective, identified around 5,000 plugins on WordPress.org that contained various security exploits such as SQL Injections. The Penetration Testing Team lead, Dave Miller said what started as a random experiment turned into a treasure trove for hackers. Once they started the experiment, they were quickly surprised at how relaxed the security was  [...]</p>
<p>The post <a href="https://tarheel.media/security-bulletin/2023/05/17/outdated-wordpress-plugins-make-60000-websites-vulnerable/">Outdated WordPress Plugins make 60,000 Websites Vulnerable</a> appeared first on <a href="https://tarheel.media">Tarheel Media Digital Marketing</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The security firm, Cyllective, identified around 5,000 plugins on WordPress.org that contained various security exploits such as SQL Injections. The Penetration Testing Team lead, Dave Miller said what started as a random experiment turned into a treasure trove for hackers. Once they started the experiment, they were quickly surprised at how relaxed the security was on WordPress.org&#8217;s repository in allowing old and exploitable plugins to remain and be installed.</p>
<p>If that wasn&#8217;t bad enough, Dave&#8217;s team came across remote code execution vulnerabilities or RCE&#8217;s. RCE&#8217;s are usually where bad code allows an attacker to gain administrative or super-user privileges and entirely take over a website or the entire information system.</p>
<p>Dave&#8217;s team, however, focused in on the SQL injections &#8211; a way of appending your own SQL query from code that does not escape its <span style="color: #008080;">$_POST</span> variables which is the variable where the stuff you submit to a website is stored. After just 3 months of research, Dave&#8217;s team found a staggering 35 plugins that had already been exploited by unauthorized users or hackers. While 35 sounds like a low number, those 35 plugins were in operation and were exploited on over 60,500 WordPress websites.</p>
<p>&#8220;Although the vast majority of the vulnerabilities I reported were unauthenticated SQL injection vulnerabilities, which would have enabled an attacker to dump the entire WordPress database contents, these were not the most devastating ones,” Dave said.</p>
<p>“The sitemap-by-click5 plugin suffered from an unauthenticated arbitrary options update flaw, which would have allowed an attacker to maliciously enable the registration functionality and set the default user role to that of an administrator.&#8221;</p>
<p>Dave explained that this would allow an attacker to create their own administrator account and entirely take over the WordPress website. Dave went on to say that he hopes this research forwards the ability to quickly identify security exploits in the future and minimize website intrusions.</p>
<p>After dealing with these WordPress Plugins and WordPress.org a pretty heavy blow, Dave did applaud the WordPress team for how well the disclosure process went in allowing Dave&#8217;s team to reach out and get these updates out there to these vulnerable websites that desperately needed it.</p>
<p>The post <a href="https://tarheel.media/security-bulletin/2023/05/17/outdated-wordpress-plugins-make-60000-websites-vulnerable/">Outdated WordPress Plugins make 60,000 Websites Vulnerable</a> appeared first on <a href="https://tarheel.media">Tarheel Media Digital Marketing</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
