SW Ajax WooCommerce Search < 1.2.8 - XSS Vulnerability

A Reflected XSS vulnerability has been found in the SW Ajax WooCommerce Search plugin. Please make…

WordPress Theme Greenmart < 2.5.2 Unauthenticated Reflected XSS Vulnerability

The WordPress Theme Greenmar versions < 2.5.2 have a known XSS vulnerability. This is a Reflected…

A Quick Glance at Cross-Origin Resource Sharing Security Headers

Cross-Origin Resource Sharing (CORS) is a mechanism that uses additional HTTP headers to tell browsers to…

WordPress 5.5.2 Security & Maintenance Update

Today October 29,2020 WordPress released version 5.5.2. This update includes 10 security fixes. Many of these…

Website Security and Merchant Chargeback Fees

Stealing credit card information and identities is big business and can cause you a lot of…

5 Places Where You’d Never Expect to Get Hacked

Everything’s connected.  The majority of electronics are now creating a huge web called the Internet Of…

Is it Safe to use Nulled WordPress Themes?

Let’s go over what a Nulled WordPress Theme is, where you can find them, why and…

How to identify unused WordPress plugins

There’s a few ways to figure out which WordPress plugins are active or deactivated. Method 1:…

How To Use Eventbrite Events With WordPress

We all know that Websites are the best informative resource whenever you are hosting an event.…

WordPress Brute Force Plugin Loginizer SQLi vulnerability Causes Forced Plugin Update

Loginizer is the most popular Brute Force protection plugin for WordPress. Installed on over 1Million websites…