Hacked Website
Use this path when malware, spam pages or visible compromise already exist.
Go to hacked website help →Start here when a hacked website, malware finding, abuse pattern or suspicious security event requires a fast and structured response. This page helps you choose the most direct path into cleanup, recovery and stronger protection afterwards.
Start here when something has already happened and the priority is to stop the damage, restore the service and secure the next step. This page helps you move quickly to the right help after intrusion, malware or suspected compromise.
Some issues start with obvious compromise. Others start as instability, downtime or WordPress symptoms. The important part is getting to the right response path fast.
Use this path when malware, spam pages or visible compromise already exist.
Go to hacked website help →Continue here when the incident is tied to a WordPress environment that needs hardening.
Go to WordPress security →Use this route when the first symptom is downtime and the cause still needs to be isolated.
Go to website down help →A good incident route is not only about cleanup. It is about stopping spread, restoring trust and making the environment harder to hit the same way again.
The first priority is to stop ongoing damage, isolate what is exposed and avoid turning one incident into several.
Recovery only creates value when the original attack path is understood and closed as part of the same work.
The best incident response naturally continues into monitoring, hardening and a better operational baseline afterwards.
The next step is often broader than one emergency page. These routes help turn the response into a safer operating model.
Return to the broader emergency hub if the symptom is still unclear or more than one issue is involved.
See emergency help →Use the main hub when the incident needs to turn into long-term platform, product or compliance work.
See cybersecurity hub →Use this route when you need to explain an active situation and want us to guide the right first step.
Talk to us →Use the form when the site is compromised, unstable or under visible threat and you need help choosing the right incident route.