As big tech continues to push AI onto the masses, AI is a great new way for hackers to gain access to sensitive information. Microsoft just patched an AI security…
The WordPress plugin All-In-One Sticky Floating Contact Form was found to have a vulnerability involving authorization bypasses. When you develop plugins for WordPress, it’s important to ensure that the user…
As a home owner, you rely on your security cameras for home protection. Modern CCTV systems have an LCD panel in your house, but you can also connect to the…
Every input sent in a server request should be inspected, sanitized, and validated before processing it in your code. WordPress plugins are great for adding features to your site for…
They say that we should only install software from a known trusted developer, but what happens when that trusted developer goes rogue? Cybersecurity researchers recently found that a popular Chrome…
You might have heard of typosquatting in cybersecurity and phishing, but it’s hard to find examples before they’ve been removed. A recent Nuget vulnerability shows exactly what can happen when…
If you use any Sneeit WordPress themes or plugins, you should probably update it now. The Sneeit framework was found to have several vulnerabilities including remote code execution detailed in…
The CSV-to-SortTable WordPress plugin is a handy little tool for site owners, but its codebase shows that it was not built with hackers in mind. CSV-to-SortTable does not validate files…
I recently refreshed my WordPress theme and plugins after performance issues and errors on an eight year old theme. It was a fun theme, but it needed to go. After…
Ecommerce fraud is a favorite for hackers all year, but Christmas time is especially popular for account takeover and credential stuffing. Account takeover (ATO) happens when an attacker has a…
