The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘uwp_sort_by’ parameter in all versions up to, and including, 1.2.10 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Security Links is a curated list of websites for cybersecurity. Find cutting edge information and trends.

2024-07-08 15:52:38French elections: political cyber attacks and Internet traffic shifts

Check the dynamics of the 2024 French legislative elections, the surprising election results’ impact on Internet traffic changes, and the cyber attacks targeting political parties

by Cloudflare


Computer Weekly stands out from the many technology news websites on offer through its unique history, extensive reader community and in-depth coverage of the issues, challenges and trends facing today’s IT leaders.

This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.

Blog from Adam Chester, Hacker and InfoSec Researcher.

The Red Team Village is focused on training the art of critical thinking, collaboration, and strategy in offensive security. The RTV brings together information security professionals to share new tactics and techniques in offensive security. Attendees may spend all three days engaged in introductory workshops or challenge themselves in an immersive Capture the Flag competition to put their newly obtained skills to the test.

The latest news and articles about cybersecurity, critical event management, asset tracking, and secure Internet of Things including automotive from BlackBerry.

Find latest cybersecurity news from every corner of the globe at, your online source for breaking international news coverage.

Stay up to date with the latest cybersecurity news and expert insights.

Researchers in the Lookout Threat Lab leverage the world’s largest mobile telemetry dataset to track APT activity, discover new mobile malware, and provide actionable intelligence.

The Forensics Wiki has transitioned to this new domain and platform; read more about it at Transitioning Forensics Wiki to GitHub.


Hacktoria creates CTF Games for OSINT and Digital Forensics enthusiasts. Overlaying fictional events and organizations over our real world, we create immersive games that make learning fun.


Internet threats and cybersecurity are constantly evolving. To protect yourself and your systems, make sure you know the latest threats and solutions. Learn more from our internet security blog.


PeeringDB is a freely available, user-maintained, database of networks, and the go-to location for interconnection data. The database facilitates the global interconnection of networks at Internet Exchange Points (IXPs), data centers, and other interconnection facilities, and is the first stop in making interconnection decisions.


Understandable online privacy & cybersecurity information to keep you and your data safe. Latest cybersecurity research & trends.


Explore cybersecurity courses and certificates. Many organizations have been victims of cybersecurity breaches. Cybersecurity specialists play a critical role in protecting against these attacks. Learn how to become a cybersecurity specialist with online cybersecurity courses offered through edX.


Check if your email address is in a data breach. Have I Been Pwned allows you to search across multiple data breaches to see if your email address or phone number has been compromised.


Quickly check if your email has been sold. Report the GDPR-violator, then learn how to prevent this from happening again by scrolling down.


Explore the latest news and expert commentary on IT Infrastructure brought to you by the editors of ITPro Today.


With a massive growth in new malware and infections, macOS security awareness is now more important than ever. Yet many people believe that if they are using macOS they are safe and should not be concerned about getting infected. Even though malware for macOS is years behind Windows malware in the sense of sophistication, complexity and number of infections, macOS malware is becoming more sophisticated as time goes by. Furthermore, it uses more ways to infect, evade and abuse the macOS architecture to deliver malware, for example - using applications signed with legitimate Apple developer certificates to avoid detection.


At Objective-See our goal is simple, create free open-source security tools for macOS!


Global Cybersecurity Threat Analysis and Hunting.


Keep up to date with Halcyon's announcements and research here.


The RRA (Recent Ransomware Attacks) site acts as a watchtower, providing near real-time ransomware tracking of attacks, groups and their victims. Given threat actors' overarching. lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.