Tag: Wordpress

WP Live Chat

Cross-site Scripting Vulnerability in WP Live Chat Plugin Let Hackers to Inject Malicious JavaScript...

An Unauthenticated Persistent Cross-Site Scripting vulnerability in WP Live Chat Support WordPress plugin allows hackers to inject malicious JavaScript payloads in the...

WordPress Websites Hit by a Barrage of Attacks

Attackers exploit the vulnerability of the Yuzo Related Posts plugin.Email automation service Mailgun has added a long list of companies that were...
WPScan

WPScan – Penetration Testing Tool to Find The Security Vulnerabilities in Your WordPress...

WPScan is a WordPress security scan for detecting and reporting WordPress vulnerabilities. WordPress is a free online Open source content Managed system focused on PHP...
Zero-day Stored XSS

Zero-day Stored XSS Vulnerability in WordPress Social Share Plug-in let Hackers to Compromise 70,000...

Researchers discovered a critical Stored XSS Zero-day flaw in widely used social sharing plug-in called "Social Warfare" let attackers inject the malicious...
WooCommerce

4 Million Shops Installed WooCommerce Plugin RCE Flaw Allows Attacker to Gain WordPress Sites...

Wordpress based E-commerce websites that powered by E-commerce plugin WooCommerce contains Critical Remote code execution vulnerability that allows nor managers to gain admin-level privilege...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Infosec Resource

Most Important Security Tools and Resources For Security Researcher and Malware...

Security Professionals always need to learn many tools, techniques, and concepts to analyze sophisticated Threats and current cyber attacks.

Key Elements and Important Steps to General Data Protection Regulation (GDPR)

The General Data Protection Regulation (GDPR) applied on 25 May 2018, this new law applies to all companies that collect and process data...

Radio Tech Used to Hack Everything From Airplanes to Defibrillators

Earlier this year an experienced team of researchers at Northeastern University's Khoury College of Computer Sciences in Boston proved that an airliner's complex radio-navigation...

A Perfect Way to Start and Strengthen Your Cyber Security Career

Breaking into a cybersecurity career is no different than any other career path or profession. In fact, in some ways, we’d even argue that...

Surprising Differences between TLS and SSL Protocol

TLS is simply a successor of SSL 3.0, TLS is a protocol which provides Data encryption and Integrity between communication channels. SSL...