SiteLock is passionate about the open-source community, and we are fortunate to attend a new content management systems (CMS) event nearly every single weekend. These events include WordPress, Joomla!, and Drupal events. While we love every event we attend, we’ve rounded some of our favorites from the past year so you can start marking the calendar for opportunities that fit your business or personal needs (hence the title—SiteLock Reviews: Events We Love in 2018). Each of these events are focused on education and networking, so whether you or your organization is an avid user of a CMS platform or seeking to expand your options in this category, these events provide the ideal setting for understanding best practices on a variety of topics such as coding, blogging, and security. As a bonus, even if you can’t attend, video recordings and live streams are available for most events.
In March, Drupal released version 8.5.1 addressing several critical security vulnerabilities. At that time, there was no evidence of the vulnerability being exploited to attack Drupal sites However, on April 12, 2018, a security research firm released a detailed analysis of the vulnerability and steps to exploit it. In the days since this release, multiple exploits of the Drupalgeddon2 vulnerability have been reported.
Last weekend I had the opportunity to check out the Drupal community in San Diego, during the 10th annual SANDCamp. SiteLock protects many Drupal sites in addition to WordPress sites, so it was a joy to meet everyone in the community and learn more about the current state of Drupal.
On March 28, 2018 Drupal released a highly critical security update affecting Drupal sites using version 7.x and 8.x. This security update addresses a critical vulnerability impacting approximately 1 million websites that could allow attackers to exploit multiple access points and take control of Drupal sites. In order to address the issue, Drupal has released two new versions and is recommending that all Drupal sites be updated as soon as possible.