“Over the years since I became ill, the drugs have cost me my home and bled my family dry. Sir, can you tell me which family doesn’t have a patient, and can you guarantee that you’ll have a lifetime free of illness?”
A set of high-severity vulnerabilities in Drupal that were disclosed last month are now the target of widespread attacks by a malware campaign.
Researcher Troy Mursch of Bad Packets Report has spotted hundreds of compromised Drupal sites being used to host "cryptojacking" malware that uses the CPUs of visitors to mine cryptocurrency via CoinHive.
If you need to create a website for your business, event, or portfolio, you are probably hearing the word CMS pop up during your research. That’s because a CMS, or content management system, can be an important part of creating your website. In this article, we go over what a CMS is, the pros and cons of using one, and the top 3 most popular content management systems.
After the publication of two severe security flaws in the Drupal CMS, cybercrime groups have turned their sights on this web technology in the hopes of finding new ground to plant malware on servers and make money through illegal cryptocurrency mining.
Five hours after the Drupal team published a security update for the Drupal CMS, hackers have found a way to weaponize the patched vulnerability, and are actively exploiting it in the wild.
This vulnerability should not be confused with Drupalgeddon 2 (CVE-2018-7600), another Drupal CMS security issue patched last month, which is also heavily exploited. This issue —tracked as CVE-2018-7602— was patched today.