Vulnerabilities data

Despite COVID-19 pandemic, Imperva reports number of vulnerabilities decreased in 2020

Imperva’s report, The State of Vulnerabilities in 2020 has revealed that unlike in previous years, researchers observed a fall in the number of vulnerabilities last year, even as businesses were compelled to ...
Over one million WordPress sites receive forced update to security plugin after severe vulnerability discovered

Over one million WordPress sites receive forced update to security plugin after severe vulnerability discovered

Loginizer, a popular plugin for protecting WordPress blogs from brute force attacks, has been found to contain its own severe vulnerabilities that could be exploited by hackers. The flaw, discovered by vulnerability ...
What Is SQL Injection?

SQL Injection Attack: What It Is & How to Protect Your Business

Web-applications attacks, including SQL injection attacks, more than doubled in 2019, according to data from SonicWall Taking into account the trends for more and more businesses going online, the number... The post ...
Duplicated Vulnerabilities in WordPress Plugins

Duplicated Vulnerabilities in WordPress Plugins

During a recent plugin audit, we noticed a weird pattern among many plugins responsible for performing a specific task: Duplicating a page or a post. With a bit of research, we came ...
SEO spam is everywhere! | #websitesecurity #threatreport #sucurisecurity

Top 10 Hacks & Attacks from 2019

Last year was a busy one in the world of website security. Our 2019 Threat Research Report shows that over 60% of websites we cleaned had a vulnerability at the point of ...
contact form vulnerable for sql injection attack

How To Prevent SQL Injections? (Complete Guide)

The post How To Prevent SQL Injections? (Complete Guide) appeared first on MalCare ...
Injection Vulnerabilities – 20 Years and Counting

Injection Vulnerabilities – 20 Years and Counting

Injection vulnerabilities are one of the oldest exploitable software defects, which unfortunately are still prevalent today. Doing a simple search on cve.mitre.org com for the term injection returns with over 10,852 injection-related ...
SQL Injection loses #1 spot as most dangerous attack technique

SQL Injection loses #1 spot as most dangerous attack technique

The Common Weakness Enumeration (CWE), a community-developed compilation of the most critical errors leading to vulnerabilities in software, has lowered SQL Injection from its #1 spot as the most dangerous attack technique ...
COVID-19

Orchestrating Network Security to Handle Cyberthreats

Unfortunately for companies, cybercriminals don’t need to invent the wheel when choosing a way to hack corporate networks. Black hat hackers have a choice of cyberthreats and attack methods on a silver ...
Security Boulevard
SQL Injection Attacks: So Old, but Still So Relevant. Here’s Why (Charts)

SQL Injection Attacks: So Old, but Still So Relevant. Here’s Why (Charts)

We’re living in the Golden Age of data. Some companies analyze it to better themselves, others trade it for profit, none give it up freely due to its value — for their ...