HDAnalytics is a fast, cookieless WordPress analytics plugin delivering actionable insights, full GDPR/CCPA compliance, ...
Gootloader malware resurfaced in late October 2025 after a nine-month hiatus, used to stage ransomware attacks Delivered via malicious JavaScript hidden in custom web fonts, enabling stealthy remote ...
Cybersecurity researchers are calling attention to a nefarious campaign targeting WordPress sites to make malicious JavaScript injections that are designed to redirect users to sketchy sites. "Site ...
Push notifications are now being used as malware delivery systems, and users are unknowingly subscribing to them Fake CAPTCHA prompts are now the gateway to persistent browser hijacks and phishing ...
A new malware campaign targeting WordPress sites employs a malicious plugin disguised as a security tool to trick users into installing and trusting it. According to Wordfence researchers, the malware ...
The humble robots.txt file often sits quietly in the background of a WordPress site, but the default is somewhat basic out of the box and, of course, doesn’t contribute towards any customized ...
Elementor Editor is the world’s most popular WordPress page builder plugin. It currently has a market share of 17% and is used by 12% of all websites. It simplifies website creation using four core ...
Sucuri has discovered multiple malware families deployed in the WordPress mu-plugins directory to evade routine security checks. Malicious hackers have been caught hiding their WordPress malware in ...
Threat actors have taken a campaign that uses fake browser updates to spread malware to a new level, weaponizing scores of WordPress plug-ins to deliver malicious infostealing payloads, after using ...
WordPress drama went up another notch on Wednesday after WordPress.org, the open source web-hosting software, banned hosting provider WP Engine from accessing its resources. In a post on WordPress.org ...
A threat actor or actors has compromised multiple plug-ins on the WordPress.org site with code aimed at giving attackers administrative privileges as well as conducting further malicious activity. Of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results