Hackers exploit cross-site scripting vulnerability in WordPress plugin to attack Mailgun site
None of the applications, including the APIs, dashboard and customer data, were affected by the attack

Cybercriminals attacked Mailgun's website by exploiting an unpatched cross-site scripting vulnerability in a WordPress plugin.
On Wednesday, Mailgun's website was hacked as part of a coordinated spray-and-pray hacking campaign that has hit several other WordPress websites in recent months. To carry out the attack, hackers exploited...
More on Security
Google revises Disclosure Policy to help improve patch adoption
Google's Project Zero will not share technical details of the bug for 30 days if a vendor fixes the vulnerability within a 90-day deadline
US sanctions six tech firms for supporting Russian intelligence services
Named firms are Positive Technologies, ERA Technopolis, Neobit, Advanced System Technology (AST), Pasit and SVA
US government to announce Russian sanctions in response to cyber attacks
The sanctions will target Russian diplomats in the USA, as well as threatening the country's wider economy by banning the purchase of ruble bonds
Microsoft patches five zero-day bugs in April 2021 Patch Tuesday update
In total, 110 bugs have been fixed
Data protection has never been a hotter topic, and that's good news for every organisation
Data protection is evolving into data management
Back to Top