Remove Accountability Remove Authentication Remove Cybersecurity Remove Security Defenses
article thumbnail

WordPress To Require Two-Factor Authentication for Plugin Developers

eSecurity Planet

WordPress is introducing mandatory two-factor authentication (2FA) for all plugin and theme developers to tackle rising security threats, effective October 1, 2024. This move supports the platform’s security by preventing unauthorized access to developer accounts and protecting millions of websites from potential supply-chain attacks​.

article thumbnail

2.9 Billion Records Exposed in NPD Breach: How to Stay Safe

eSecurity Planet

Enable Multi-Factor Authentication (MFA) Even if your password is compromised, MFA adds an extra layer of security by requiring a second verification form, such as a code sent to your phone or generated by an authentication app. This can typically be done in the account settings under the security section.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tracelo Data Breach: 1.4 Million Records Exposed

eSecurity Planet

Additionally, account details like user roles, subscription plans, and even hashed passwords were exposed. Identity theft is another significant risk, with the stolen data potentially being used to open fraudulent accounts or commit other forms of financial fraud.

article thumbnail

5 WordPress Plugins Compromised; Millions of Websites at Risk

eSecurity Planet

Millions of WordPress websites are under threat after a critical security breach involving several popular plugins. Security researchers discovered malicious code injected into these plugins, granting hackers the ability to create unauthorized administrator accounts.

Risk 113
article thumbnail

Vulnerability Recap 7/15/24 – Industry Patches vs Flaw Exploits

eSecurity Planet

The problem: Four unpatched security issues in Gogs, an open-source Git service, enable attackers to exploit three critical flaws ( CVE-2024-39930 , CVE-2024-39931 , CVE-2024-39932 ; CVSS: 9.9) However, exploitation requires authentication and specific configurations. and one high-severity vulnerability ( CVE-2024-39933 ; CVSS: 7.7).

article thumbnail

Vulnerability Recap 6/3/24 – Check Point, Okta & Fortinet Issues

eSecurity Planet

“The attempts we’ve seen so far… focus on remote access scenarios with old local accounts with unrecommended password-only authentication,” the security bulletin said. The fix: Check Point provided a hotfix with instructions for users to follow when patching their Security Gateway products. through 7.1.1

VPN 109
article thumbnail

Vulnerability Recap 9/9/24 – Exploited Vulnerabilities Persist

eSecurity Planet

Companies should improve security by deploying endpoint detection and response (EDR), limiting remote access, and utilizing multi-factor authentication. To avoid further exploitation, impacted organizations should implement incident response policies and consult with cybersecurity specialists. to address the problem.

Firmware 109