Earlier in 2021, I shared how an attacker could leverage leaked or weak credentials to install fake plugins on a compromised site. Although the plugin featured in that blog post has shown some small changes since it was posted, attackers can upload a variety of malicious software using the same method; so in this article, I'll share with you another recent example (thanks to Luke Leal for sharing it with me).

Read more of this post

Fioravante Souza | July 1, 2021 at 11:00 am | Categories: Vulnerabilities | URL: https://wp.me/p1moTy-xbA