Hackers are actively exploiting a critical vulnerability in the Breeze Cache plugin for WordPress that allows uploading ...
Pirated (aka nulled) themes and plugins were the most common source of malware infections on WordPress sites in 2020, according to Wordfence, a provider of website application firewall (WAF) solutions ...
WordPress is one of the most widely-used Content Management Systems on the planet. With over 43% of websites using the platform, it’s no surprise that it has a target on its back. That not only means ...
A new WordPress cyberattack campaign puts 1.6 million websites at risk. This was confirmed by the company's security department, Wordfence. LOS ANGELES, CA - JUNE 4: People in the audience are ...
Security researchers have detected a massive campaign that scanned close to 1.6 million WordPress sites for the presence of a vulnerable plugin that allows uploading files without authentication. The ...
A WordPress plug-in installed on more than 4 million websites exposes them to full administrative takeover through a scripting flaw that potentially can be used to launch large-scale automated attacks ...
WordPress security company Wordfence issued an advisory that recommended being vigilant for an increase in hacking activity after Russian attack on Ukraine and offered tips to help prevent becoming a ...
Cybercriminals have been actively exploiting a zero-day vulnerability in Fancy Product Designer, a WordPress plugin used by more than 17,000 websites, according to a blog post by Defiant, which makes ...
A threat actor or actors has compromised multiple plug-ins on the WordPress.org site with code aimed at giving attackers administrative privileges as well as conducting further malicious activity. Of ...
Vulnerable code has been discovered in the payment solution plugin WooCommerce for the WordPress content management system (CMS) that could allow an unauthenticated attacker to gain administrative ...
There are eight fundamental actions that all WordPress publishers should consider in order to mitigate malicious activities and vulnerabilities. Following these best practices will help ensure that a ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results