<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/wordfence-security-news" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Wordfence Security News</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/wordfence-security-news</itunes:new-feed-url>
    <description>Wordfence Security News is a weekly cybersecurity news podcast covering the top news stories from the world of WordPress security and the broader cybersecurity threat landscape. Hosted by cybersecurity expert and Wordfence researcher Alex Thomas.</description>
    <copyright>2012-2026 Defiant Inc. All Rights Reserved</copyright>
    <podcast:guid>294fd773-073d-5608-bb6d-08964562719f</podcast:guid>
    <podcast:locked>yes</podcast:locked>
    <language>en</language>
    <pubDate>Fri, 03 Apr 2026 12:28:05 -0700</pubDate>
    <lastBuildDate>Fri, 17 Apr 2026 15:04:30 -0700</lastBuildDate>
    <link>https://www.wordfence.com</link>
    <image>
      <url>https://img.transistorcdn.com/Wq_-Nf8t4p9FMeTFUnB2VFtU_MTLRjwTzZznjj5L4hs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yNjZm/M2NiNzczNWQ4MDdh/OTYyMTg5MDQ5ODk3/ODI5ZC5wbmc.jpg</url>
      <title>Wordfence Security News</title>
      <link>https://www.wordfence.com</link>
    </image>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <itunes:category text="Technology"/>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Wordfence</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/Wq_-Nf8t4p9FMeTFUnB2VFtU_MTLRjwTzZznjj5L4hs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yNjZm/M2NiNzczNWQ4MDdh/OTYyMTg5MDQ5ODk3/ODI5ZC5wbmc.jpg"/>
    <itunes:summary>Wordfence Security News is a weekly cybersecurity news podcast covering the top news stories from the world of WordPress security and the broader cybersecurity threat landscape. Hosted by cybersecurity expert and Wordfence researcher Alex Thomas.</itunes:summary>
    <itunes:subtitle>Wordfence Security News is a weekly cybersecurity news podcast covering the top news stories from the world of WordPress security and the broader cybersecurity threat landscape.</itunes:subtitle>
    <itunes:keywords>Wordfence, WordPress, WordPress Security, Cybersecurity</itunes:keywords>
    <itunes:owner>
      <itunes:name>Wordfence</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>WordPress 30+ Plugin Supply Chain Attack | Wordfence Security News | Week of April 13, 2026</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>WordPress 30+ Plugin Supply Chain Attack | Wordfence Security News | Week of April 13, 2026</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">056a29cd-c015-42cc-9bdc-992c54a63a6c</guid>
      <link>https://share.transistor.fm/s/170d5314</link>
      <description>
        <![CDATA[<p><strong>This week in Wordfence Security News (Week of Apr 13, 2026):</strong></p><ul><li>Over 30 WordPress plugins purchased on the Flippa marketplace were turned into backdoors that sat dormant for eight months before activating to inject SEO spam into wp-config.php, visible only to Googlebot</li><li>Smart Slider 3 Pro's update infrastructure was compromised, pushing a weaponized build through the official update channel for approximately six hours before being caught</li><li>Microsoft's second-largest Patch Tuesday ever fixes roughly 165 vulnerabilities including a SharePoint spoofing zero-day already under active exploitation and a Defender privilege escalation zero-day linked to the BlueHammer public exploit</li><li>Adobe released an emergency patch for an Acrobat Reader zero-day exploited in the wild since late 2025, discovered via malicious Russian-language PDFs about gas supply disruptions</li><li>ShinyHunters extortion group listed Rockstar Games on its leak site after stealing authentication tokens from cloud analytics platform Anadot and accessing Rockstar's connected Snowflake data warehouse</li><li>A critical pre-authentication remote code execution flaw in Marimo, an open-source Python notebook platform, was exploited within 10 hours of its advisory being published with no public proof of concept</li></ul><p><strong>Timestamps:</strong></p><p>0:00 Introduction<br>0:26 Supply Chain Attack on 30+ Essential Plugin WordPress Plugins<br>2:08 Smart Slider 3 Pro Update Infrastructure Compromised<br>2:55 Kali Forms and Ninja Forms File Upload Exploitation Updates<br>3:21 Microsoft Patch Tuesday with SharePoint and Defender Zero-Days<br>5:31 Adobe Acrobat Reader Zero-Day Emergency Patch<br>6:26 ShinyHunters Breach of Rockstar Games via Anadot Tokens<br>7:16 Marimo RCE Exploited Within 10 Hours of Disclosure</p><p><strong>Story Links:</strong></p><ul><li><strong>30+ Plugins Backdoored After Flippa Acquisition:</strong> <a href="https://anchor.host/someone-bought-30-wordpress-plugins-and-planted-a-backdoor-in-all-of-them/">https://anchor.host/someone-bought-30-wordpress-plugins-and-planted-a-backdoor-in-all-of-them/</a></li><li><strong>Smart Slider 3 Pro — Supply Chain Compromise:</strong> <a href="https://smartslider.helpscoutdocs.com/article/2144-wordpress-security-advisory-smart-slider-3-pro-3-5-1-35-compromise">https://smartslider.helpscoutdocs.com/article/2144-wordpress-security-advisory-smart-slider-3-pro-3-5-1-35-compromise</a></li><li><strong>Kali Forms exploitation update:</strong> <a href="https://www.wordfence.com/blog/2026/04/attackers-actively-exploiting-critical-vulnerability-in-kali-forms-plugin/">https://www.wordfence.com/blog/2026/04/attackers-actively-exploiting-critical-vulnerability-in-kali-forms-plugin/</a></li><li><strong>Ninja Forms File Upload exploitation update:</strong> <a href="https://www.wordfence.com/blog/2026/04/50000-wordpress-sites-affected-by-arbitrary-file-upload-vulnerability-in-ninja-forms-file-upload-wordpress-plugin/">https://www.wordfence.com/blog/2026/04/50000-wordpress-sites-affected-by-arbitrary-file-upload-vulnerability-in-ninja-forms-file-upload-wordpress-plugin/</a></li><li><strong>April Patch Tuesday — SharePoint Zero-Day Exploited:</strong> <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/">https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/</a></li><li><strong>BlueHammer — Defender Zero-Day:</strong> <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/">https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/</a></li><li><strong>Adobe Reader Zero-Day — Exploited Since Late 2025:</strong> <a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html">https://helpx.adobe.com/security/products/acrobat/apsb26-43.html</a></li><li><strong>Rockstar Games Breach via Third-Party Analytics:</strong> <a href="https://www.bleepingcomputer.com/news/security/stolen-rockstar-games-analytics-data-leaked-by-extortion-gang/">https://www.bleepingcomputer.com/news/security/stolen-rockstar-games-analytics-data-leaked-by-extortion-gang/</a></li><li><strong>Marimo RCE — Exploited in Under 10 Hours:</strong> <a href="https://www.sysdig.com/blog/marimo-oss-python-notebook-rce-from-disclosure-to-exploitation-in-under-10-hours">https://www.sysdig.com/blog/marimo-oss-python-notebook-rce-from-disclosure-to-exploitation-in-under-10-hours</a></li></ul><p>Stay informed and secure: get the latest WordPress security news on the <a href="https://www.wordfence.com/blog/">Wordfence blog</a> or subscribe to the <a href="https://www.wordfence.com/subscribe-to-the-wordfence-email-list/">WordPress Security Newsletter</a>.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>This week in Wordfence Security News (Week of Apr 13, 2026):</strong></p><ul><li>Over 30 WordPress plugins purchased on the Flippa marketplace were turned into backdoors that sat dormant for eight months before activating to inject SEO spam into wp-config.php, visible only to Googlebot</li><li>Smart Slider 3 Pro's update infrastructure was compromised, pushing a weaponized build through the official update channel for approximately six hours before being caught</li><li>Microsoft's second-largest Patch Tuesday ever fixes roughly 165 vulnerabilities including a SharePoint spoofing zero-day already under active exploitation and a Defender privilege escalation zero-day linked to the BlueHammer public exploit</li><li>Adobe released an emergency patch for an Acrobat Reader zero-day exploited in the wild since late 2025, discovered via malicious Russian-language PDFs about gas supply disruptions</li><li>ShinyHunters extortion group listed Rockstar Games on its leak site after stealing authentication tokens from cloud analytics platform Anadot and accessing Rockstar's connected Snowflake data warehouse</li><li>A critical pre-authentication remote code execution flaw in Marimo, an open-source Python notebook platform, was exploited within 10 hours of its advisory being published with no public proof of concept</li></ul><p><strong>Timestamps:</strong></p><p>0:00 Introduction<br>0:26 Supply Chain Attack on 30+ Essential Plugin WordPress Plugins<br>2:08 Smart Slider 3 Pro Update Infrastructure Compromised<br>2:55 Kali Forms and Ninja Forms File Upload Exploitation Updates<br>3:21 Microsoft Patch Tuesday with SharePoint and Defender Zero-Days<br>5:31 Adobe Acrobat Reader Zero-Day Emergency Patch<br>6:26 ShinyHunters Breach of Rockstar Games via Anadot Tokens<br>7:16 Marimo RCE Exploited Within 10 Hours of Disclosure</p><p><strong>Story Links:</strong></p><ul><li><strong>30+ Plugins Backdoored After Flippa Acquisition:</strong> <a href="https://anchor.host/someone-bought-30-wordpress-plugins-and-planted-a-backdoor-in-all-of-them/">https://anchor.host/someone-bought-30-wordpress-plugins-and-planted-a-backdoor-in-all-of-them/</a></li><li><strong>Smart Slider 3 Pro — Supply Chain Compromise:</strong> <a href="https://smartslider.helpscoutdocs.com/article/2144-wordpress-security-advisory-smart-slider-3-pro-3-5-1-35-compromise">https://smartslider.helpscoutdocs.com/article/2144-wordpress-security-advisory-smart-slider-3-pro-3-5-1-35-compromise</a></li><li><strong>Kali Forms exploitation update:</strong> <a href="https://www.wordfence.com/blog/2026/04/attackers-actively-exploiting-critical-vulnerability-in-kali-forms-plugin/">https://www.wordfence.com/blog/2026/04/attackers-actively-exploiting-critical-vulnerability-in-kali-forms-plugin/</a></li><li><strong>Ninja Forms File Upload exploitation update:</strong> <a href="https://www.wordfence.com/blog/2026/04/50000-wordpress-sites-affected-by-arbitrary-file-upload-vulnerability-in-ninja-forms-file-upload-wordpress-plugin/">https://www.wordfence.com/blog/2026/04/50000-wordpress-sites-affected-by-arbitrary-file-upload-vulnerability-in-ninja-forms-file-upload-wordpress-plugin/</a></li><li><strong>April Patch Tuesday — SharePoint Zero-Day Exploited:</strong> <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/">https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/</a></li><li><strong>BlueHammer — Defender Zero-Day:</strong> <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/">https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/</a></li><li><strong>Adobe Reader Zero-Day — Exploited Since Late 2025:</strong> <a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html">https://helpx.adobe.com/security/products/acrobat/apsb26-43.html</a></li><li><strong>Rockstar Games Breach via Third-Party Analytics:</strong> <a href="https://www.bleepingcomputer.com/news/security/stolen-rockstar-games-analytics-data-leaked-by-extortion-gang/">https://www.bleepingcomputer.com/news/security/stolen-rockstar-games-analytics-data-leaked-by-extortion-gang/</a></li><li><strong>Marimo RCE — Exploited in Under 10 Hours:</strong> <a href="https://www.sysdig.com/blog/marimo-oss-python-notebook-rce-from-disclosure-to-exploitation-in-under-10-hours">https://www.sysdig.com/blog/marimo-oss-python-notebook-rce-from-disclosure-to-exploitation-in-under-10-hours</a></li></ul><p>Stay informed and secure: get the latest WordPress security news on the <a href="https://www.wordfence.com/blog/">Wordfence blog</a> or subscribe to the <a href="https://www.wordfence.com/subscribe-to-the-wordfence-email-list/">WordPress Security Newsletter</a>.</p>]]>
      </content:encoded>
      <pubDate>Fri, 17 Apr 2026 14:18:02 -0700</pubDate>
      <author>Wordfence</author>
      <enclosure url="https://media.transistor.fm/170d5314/559faa1b.mp3" length="7873428" type="audio/mpeg"/>
      <itunes:author>Wordfence</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/LQtcilkcSm2tBAJSVDhwQRFaLAtXbVC5RJDFVSlZWvI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yNGYy/YmQ2OGUzZjQxMGVi/YWM5ZGQxODE2YTcz/YWNlMC53ZWJw.jpg"/>
      <itunes:duration>489</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>This week in Wordfence Security News (Week of Apr 13, 2026):</strong></p><ul><li>Over 30 WordPress plugins purchased on the Flippa marketplace were turned into backdoors that sat dormant for eight months before activating to inject SEO spam into wp-config.php, visible only to Googlebot</li><li>Smart Slider 3 Pro's update infrastructure was compromised, pushing a weaponized build through the official update channel for approximately six hours before being caught</li><li>Microsoft's second-largest Patch Tuesday ever fixes roughly 165 vulnerabilities including a SharePoint spoofing zero-day already under active exploitation and a Defender privilege escalation zero-day linked to the BlueHammer public exploit</li><li>Adobe released an emergency patch for an Acrobat Reader zero-day exploited in the wild since late 2025, discovered via malicious Russian-language PDFs about gas supply disruptions</li><li>ShinyHunters extortion group listed Rockstar Games on its leak site after stealing authentication tokens from cloud analytics platform Anadot and accessing Rockstar's connected Snowflake data warehouse</li><li>A critical pre-authentication remote code execution flaw in Marimo, an open-source Python notebook platform, was exploited within 10 hours of its advisory being published with no public proof of concept</li></ul><p><strong>Timestamps:</strong></p><p>0:00 Introduction<br>0:26 Supply Chain Attack on 30+ Essential Plugin WordPress Plugins<br>2:08 Smart Slider 3 Pro Update Infrastructure Compromised<br>2:55 Kali Forms and Ninja Forms File Upload Exploitation Updates<br>3:21 Microsoft Patch Tuesday with SharePoint and Defender Zero-Days<br>5:31 Adobe Acrobat Reader Zero-Day Emergency Patch<br>6:26 ShinyHunters Breach of Rockstar Games via Anadot Tokens<br>7:16 Marimo RCE Exploited Within 10 Hours of Disclosure</p><p><strong>Story Links:</strong></p><ul><li><strong>30+ Plugins Backdoored After Flippa Acquisition:</strong> <a href="https://anchor.host/someone-bought-30-wordpress-plugins-and-planted-a-backdoor-in-all-of-them/">https://anchor.host/someone-bought-30-wordpress-plugins-and-planted-a-backdoor-in-all-of-them/</a></li><li><strong>Smart Slider 3 Pro — Supply Chain Compromise:</strong> <a href="https://smartslider.helpscoutdocs.com/article/2144-wordpress-security-advisory-smart-slider-3-pro-3-5-1-35-compromise">https://smartslider.helpscoutdocs.com/article/2144-wordpress-security-advisory-smart-slider-3-pro-3-5-1-35-compromise</a></li><li><strong>Kali Forms exploitation update:</strong> <a href="https://www.wordfence.com/blog/2026/04/attackers-actively-exploiting-critical-vulnerability-in-kali-forms-plugin/">https://www.wordfence.com/blog/2026/04/attackers-actively-exploiting-critical-vulnerability-in-kali-forms-plugin/</a></li><li><strong>Ninja Forms File Upload exploitation update:</strong> <a href="https://www.wordfence.com/blog/2026/04/50000-wordpress-sites-affected-by-arbitrary-file-upload-vulnerability-in-ninja-forms-file-upload-wordpress-plugin/">https://www.wordfence.com/blog/2026/04/50000-wordpress-sites-affected-by-arbitrary-file-upload-vulnerability-in-ninja-forms-file-upload-wordpress-plugin/</a></li><li><strong>April Patch Tuesday — SharePoint Zero-Day Exploited:</strong> <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/">https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/</a></li><li><strong>BlueHammer — Defender Zero-Day:</strong> <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/">https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/</a></li><li><strong>Adobe Reader Zero-Day — Exploited Since Late 2025:</strong> <a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html">https://helpx.adobe.com/security/products/acrobat/apsb26-43.html</a></li><li><strong>Rockstar Games Breach via Third-Party Analytics:</strong> <a href="https://www.bleepingcomputer.com/news/security/stolen-rockstar-games-analytics-data-leaked-by-extortion-gang/">https://www.bleepingcomputer.com/news/security/stolen-rockstar-games-analytics-data-leaked-by-extortion-gang/</a></li><li><strong>Marimo RCE — Exploited in Under 10 Hours:</strong> <a href="https://www.sysdig.com/blog/marimo-oss-python-notebook-rce-from-disclosure-to-exploitation-in-under-10-hours">https://www.sysdig.com/blog/marimo-oss-python-notebook-rce-from-disclosure-to-exploitation-in-under-10-hours</a></li></ul><p>Stay informed and secure: get the latest WordPress security news on the <a href="https://www.wordfence.com/blog/">Wordfence blog</a> or subscribe to the <a href="https://www.wordfence.com/subscribe-to-the-wordfence-email-list/">WordPress Security Newsletter</a>.</p>]]>
      </itunes:summary>
      <itunes:keywords>Wordfence, WordPress, WordPress Security, Cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/170d5314/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/170d5314/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/170d5314/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/170d5314/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/170d5314/transcription" type="text/html"/>
    </item>
    <item>
      <title>50,000 Site Ninja Forms File Upload Vulnerability | Anthropic Project Glasswing | Fortinet Zero Day | Wordfence Security News | April 6 2026</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>50,000 Site Ninja Forms File Upload Vulnerability | Anthropic Project Glasswing | Fortinet Zero Day | Wordfence Security News | April 6 2026</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">643fca4d-7d3c-463f-b8a2-b323d27469ff</guid>
      <link>https://share.transistor.fm/s/48f55f81</link>
      <description>
        <![CDATA[<p><strong>This week in Wordfence Security News (Week of Apr 6, 2026):</strong></p><ul><li>An arbitrary file upload vulnerability in Ninja Forms File Upload puts 50,000+ WordPress sites at risk</li><li>A Fortinet zero-day actively exploited in the wild</li><li>A CERT-EU report reveals a European Commission cloud breach tied to a Trivy supply chain attack — with Cisco source code stolen in the fallout</li><li>Anthropic announces Project Glasswing</li><li>Germany doxes "UNKN," the head of the REvil and GandCrab ransomware gangs</li></ul><p><strong>Story Links:</strong></p><ul><li><strong>Ninja Forms File Upload Vulnerability:</strong> <a href="https://www.wordfence.com/blog/2026/04/50000-wordpress-sites-affected-by-arbitrary-file-upload-vulnerability-in-ninja-forms-file-upload-wordpress-plugin/">https://www.wordfence.com/blog/2026/04/50000-wordpress-sites-affected-by-arbitrary-file-upload-vulnerability-in-ninja-forms-file-upload-wordpress-plugin/</a></li><li><strong>Fortinet Advisory:</strong> <a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-099">https://fortiguard.fortinet.com/psirt/FG-IR-26-099</a></li><li><strong>CERT-EU Report:</strong> <a href="https://cert.europa.eu/blog/european-commission-cloud-breach-trivy-supply-chain">https://cert.europa.eu/blog/european-commission-cloud-breach-trivy-supply-chain</a></li><li><strong>Cisco / Trivy Fallout:</strong> <a href="https://www.bleepingcomputer.com/news/security/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/">https://www.bleepingcomputer.com/news/security/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/</a></li><li><strong>Anthropic Glasswing Announcement:</strong> <a href="https://www.anthropic.com/">https://www.anthropic.com/</a></li><li><strong>Krebs on Security (REvil):</strong> <a href="https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/">https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/</a></li></ul><p>Stay informed and secure: get the latest WordPress security news on the <a href="https://www.wordfence.com/blog/">Wordfence blog</a> or subscribe to the <a href="https://www.wordfence.com/subscribe-to-the-wordfence-email-list/">WordPress Security Newsletter</a>.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>This week in Wordfence Security News (Week of Apr 6, 2026):</strong></p><ul><li>An arbitrary file upload vulnerability in Ninja Forms File Upload puts 50,000+ WordPress sites at risk</li><li>A Fortinet zero-day actively exploited in the wild</li><li>A CERT-EU report reveals a European Commission cloud breach tied to a Trivy supply chain attack — with Cisco source code stolen in the fallout</li><li>Anthropic announces Project Glasswing</li><li>Germany doxes "UNKN," the head of the REvil and GandCrab ransomware gangs</li></ul><p><strong>Story Links:</strong></p><ul><li><strong>Ninja Forms File Upload Vulnerability:</strong> <a href="https://www.wordfence.com/blog/2026/04/50000-wordpress-sites-affected-by-arbitrary-file-upload-vulnerability-in-ninja-forms-file-upload-wordpress-plugin/">https://www.wordfence.com/blog/2026/04/50000-wordpress-sites-affected-by-arbitrary-file-upload-vulnerability-in-ninja-forms-file-upload-wordpress-plugin/</a></li><li><strong>Fortinet Advisory:</strong> <a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-099">https://fortiguard.fortinet.com/psirt/FG-IR-26-099</a></li><li><strong>CERT-EU Report:</strong> <a href="https://cert.europa.eu/blog/european-commission-cloud-breach-trivy-supply-chain">https://cert.europa.eu/blog/european-commission-cloud-breach-trivy-supply-chain</a></li><li><strong>Cisco / Trivy Fallout:</strong> <a href="https://www.bleepingcomputer.com/news/security/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/">https://www.bleepingcomputer.com/news/security/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/</a></li><li><strong>Anthropic Glasswing Announcement:</strong> <a href="https://www.anthropic.com/">https://www.anthropic.com/</a></li><li><strong>Krebs on Security (REvil):</strong> <a href="https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/">https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/</a></li></ul><p>Stay informed and secure: get the latest WordPress security news on the <a href="https://www.wordfence.com/blog/">Wordfence blog</a> or subscribe to the <a href="https://www.wordfence.com/subscribe-to-the-wordfence-email-list/">WordPress Security Newsletter</a>.</p>]]>
      </content:encoded>
      <pubDate>Fri, 10 Apr 2026 13:15:36 -0700</pubDate>
      <author>Wordfence</author>
      <enclosure url="https://media.transistor.fm/48f55f81/dbb20e4c.mp3" length="6688328" type="audio/mpeg"/>
      <itunes:author>Wordfence</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Ip0_QMQKCxHynR1LOuRBN0htY3dkJaNka7HDLXzrlzE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hMzI3/MzRiZGMwZDFkNjQ0/YWQ2NjY0MGQ0MDhh/ZTdlYi53ZWJw.jpg"/>
      <itunes:duration>415</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>This week in Wordfence Security News (Week of Apr 6, 2026):</strong></p><ul><li>An arbitrary file upload vulnerability in Ninja Forms File Upload puts 50,000+ WordPress sites at risk</li><li>A Fortinet zero-day actively exploited in the wild</li><li>A CERT-EU report reveals a European Commission cloud breach tied to a Trivy supply chain attack — with Cisco source code stolen in the fallout</li><li>Anthropic announces Project Glasswing</li><li>Germany doxes "UNKN," the head of the REvil and GandCrab ransomware gangs</li></ul><p><strong>Story Links:</strong></p><ul><li><strong>Ninja Forms File Upload Vulnerability:</strong> <a href="https://www.wordfence.com/blog/2026/04/50000-wordpress-sites-affected-by-arbitrary-file-upload-vulnerability-in-ninja-forms-file-upload-wordpress-plugin/">https://www.wordfence.com/blog/2026/04/50000-wordpress-sites-affected-by-arbitrary-file-upload-vulnerability-in-ninja-forms-file-upload-wordpress-plugin/</a></li><li><strong>Fortinet Advisory:</strong> <a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-099">https://fortiguard.fortinet.com/psirt/FG-IR-26-099</a></li><li><strong>CERT-EU Report:</strong> <a href="https://cert.europa.eu/blog/european-commission-cloud-breach-trivy-supply-chain">https://cert.europa.eu/blog/european-commission-cloud-breach-trivy-supply-chain</a></li><li><strong>Cisco / Trivy Fallout:</strong> <a href="https://www.bleepingcomputer.com/news/security/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/">https://www.bleepingcomputer.com/news/security/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/</a></li><li><strong>Anthropic Glasswing Announcement:</strong> <a href="https://www.anthropic.com/">https://www.anthropic.com/</a></li><li><strong>Krebs on Security (REvil):</strong> <a href="https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/">https://krebsonsecurity.com/2026/04/germany-doxes-unkn-head-of-ru-ransomware-gangs-revil-gandcrab/</a></li></ul><p>Stay informed and secure: get the latest WordPress security news on the <a href="https://www.wordfence.com/blog/">Wordfence blog</a> or subscribe to the <a href="https://www.wordfence.com/subscribe-to-the-wordfence-email-list/">WordPress Security Newsletter</a>.</p>]]>
      </itunes:summary>
      <itunes:keywords>Wordfence, WordPress, WordPress Security, Cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/48f55f81/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/48f55f81/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/48f55f81/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/48f55f81/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/48f55f81/transcription" type="text/html"/>
    </item>
    <item>
      <title>MW WP Form 200K Sites at Risk | Axios Hack | Cisco Breach | Wordfence Security News | March 30, 2026</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>MW WP Form 200K Sites at Risk | Axios Hack | Cisco Breach | Wordfence Security News | March 30, 2026</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4ae3b264-9506-47d0-94db-896a7a593cb7</guid>
      <link>https://share.transistor.fm/s/3e16c17d</link>
      <description>
        <![CDATA[<p><strong>This week in Wordfence Security News (Week of Mar 30, 2026): </strong></p><ul><li>Over 200,000 WordPress sites at risk from an unauthenticated arbitrary file move vulnerability in the MW WP Form plugin, allowing full site takeover</li><li>Massive spike in exploitation attempts targeting the Kali Forms RCE vulnerability, with activity increasing over 60x week-over-week</li><li>A major supply chain attack compromises the widely used Axios JavaScript library, distributing backdoored versions to developers worldwide Active exploitation of a critical Citrix NetScaler vulnerability enabling session hijacking and potential full appliance compromise</li><li>European Commission confirms a cloud breach with data theft claims by ShinyHunters</li><li>Cisco internal development environment breached via poisoned Trivy supply chain attack, exposing source code and credentials</li></ul><p><strong>Timestamps:<br></strong><br>0:00 Introduction<br>0:30 MW WP Form Vulnerability<br>1:15 Kali Forms Exploitation Surge<br>1:55 Axios Supply Chain Attack<br>3:20 Citrix NetScaler Active Exploitation<br>4:57 European Commission Breach<br>5:50 Cisco Dev Environment Breach<br>6:47 Wrap up discussion</p><p><strong>Story Links:</strong></p><ul><li><a href="https://www.wordfence.com/blog/2026/04/200000-wordpress-sites-affected-by-arbitrary-file-move-vulnerability-in-mw-wp-form-wordpress-plugin/">MW WP Form Vulnerability</a></li><li><a href="https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/kali-forms/kali-forms-249-unauthenticated-remote-code-execution-via-form-process">Kali Forms Exploitation Update</a></li><li><a href="https://www.axios.com/2026/03/31/north-korean-hackers-implicated-in-major-supply-chain-attack">Axios Supply Chain Attack (Wiz)</a></li><li><a href="https://support.citrix.com/external/article/CTX696300/netscaler-adc-and-netscaler-gateway-secu.html">Citrix NetScaler Advisory</a></li><li><a href="https://ec.europa.eu/commission/presscorner/api/files/document/print/en/ip_26_748/IP_26_748_EN.pdf">European Commission Breach (Bloomberg)</a></li><li><a href="https://www.bleepingcomputer.com/news/security/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/">Cisco / Trivy Supply Chain Attack</a></li></ul><p>Stay informed and secure: get the latest WordPress security news on the <a href="https://www.wordfence.com/blog/">Wordfence blog</a> or subscribe to the <a href="https://www.wordfence.com/subscribe-to-the-wordfence-email-list/">WordPress Security Newsletter</a>.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>This week in Wordfence Security News (Week of Mar 30, 2026): </strong></p><ul><li>Over 200,000 WordPress sites at risk from an unauthenticated arbitrary file move vulnerability in the MW WP Form plugin, allowing full site takeover</li><li>Massive spike in exploitation attempts targeting the Kali Forms RCE vulnerability, with activity increasing over 60x week-over-week</li><li>A major supply chain attack compromises the widely used Axios JavaScript library, distributing backdoored versions to developers worldwide Active exploitation of a critical Citrix NetScaler vulnerability enabling session hijacking and potential full appliance compromise</li><li>European Commission confirms a cloud breach with data theft claims by ShinyHunters</li><li>Cisco internal development environment breached via poisoned Trivy supply chain attack, exposing source code and credentials</li></ul><p><strong>Timestamps:<br></strong><br>0:00 Introduction<br>0:30 MW WP Form Vulnerability<br>1:15 Kali Forms Exploitation Surge<br>1:55 Axios Supply Chain Attack<br>3:20 Citrix NetScaler Active Exploitation<br>4:57 European Commission Breach<br>5:50 Cisco Dev Environment Breach<br>6:47 Wrap up discussion</p><p><strong>Story Links:</strong></p><ul><li><a href="https://www.wordfence.com/blog/2026/04/200000-wordpress-sites-affected-by-arbitrary-file-move-vulnerability-in-mw-wp-form-wordpress-plugin/">MW WP Form Vulnerability</a></li><li><a href="https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/kali-forms/kali-forms-249-unauthenticated-remote-code-execution-via-form-process">Kali Forms Exploitation Update</a></li><li><a href="https://www.axios.com/2026/03/31/north-korean-hackers-implicated-in-major-supply-chain-attack">Axios Supply Chain Attack (Wiz)</a></li><li><a href="https://support.citrix.com/external/article/CTX696300/netscaler-adc-and-netscaler-gateway-secu.html">Citrix NetScaler Advisory</a></li><li><a href="https://ec.europa.eu/commission/presscorner/api/files/document/print/en/ip_26_748/IP_26_748_EN.pdf">European Commission Breach (Bloomberg)</a></li><li><a href="https://www.bleepingcomputer.com/news/security/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/">Cisco / Trivy Supply Chain Attack</a></li></ul><p>Stay informed and secure: get the latest WordPress security news on the <a href="https://www.wordfence.com/blog/">Wordfence blog</a> or subscribe to the <a href="https://www.wordfence.com/subscribe-to-the-wordfence-email-list/">WordPress Security Newsletter</a>.  </p>]]>
      </content:encoded>
      <pubDate>Fri, 03 Apr 2026 12:15:22 -0700</pubDate>
      <author>Wordfence</author>
      <enclosure url="https://media.transistor.fm/3e16c17d/1b14a3b4.mp3" length="7118160" type="audio/mpeg"/>
      <itunes:author>Wordfence</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/JF1HiIbDHNBvOPZZAE5s76YU8eLwKIjnAz0bY-y8m7I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mMDgw/M2U1YzAwZTdkOGZh/OGQxZjk4NWQxZTk5/NWNiNy53ZWJw.jpg"/>
      <itunes:duration>442</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>This week in Wordfence Security News (Week of Mar 30, 2026): </strong></p><ul><li>Over 200,000 WordPress sites at risk from an unauthenticated arbitrary file move vulnerability in the MW WP Form plugin, allowing full site takeover</li><li>Massive spike in exploitation attempts targeting the Kali Forms RCE vulnerability, with activity increasing over 60x week-over-week</li><li>A major supply chain attack compromises the widely used Axios JavaScript library, distributing backdoored versions to developers worldwide Active exploitation of a critical Citrix NetScaler vulnerability enabling session hijacking and potential full appliance compromise</li><li>European Commission confirms a cloud breach with data theft claims by ShinyHunters</li><li>Cisco internal development environment breached via poisoned Trivy supply chain attack, exposing source code and credentials</li></ul><p><strong>Timestamps:<br></strong><br>0:00 Introduction<br>0:30 MW WP Form Vulnerability<br>1:15 Kali Forms Exploitation Surge<br>1:55 Axios Supply Chain Attack<br>3:20 Citrix NetScaler Active Exploitation<br>4:57 European Commission Breach<br>5:50 Cisco Dev Environment Breach<br>6:47 Wrap up discussion</p><p><strong>Story Links:</strong></p><ul><li><a href="https://www.wordfence.com/blog/2026/04/200000-wordpress-sites-affected-by-arbitrary-file-move-vulnerability-in-mw-wp-form-wordpress-plugin/">MW WP Form Vulnerability</a></li><li><a href="https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/kali-forms/kali-forms-249-unauthenticated-remote-code-execution-via-form-process">Kali Forms Exploitation Update</a></li><li><a href="https://www.axios.com/2026/03/31/north-korean-hackers-implicated-in-major-supply-chain-attack">Axios Supply Chain Attack (Wiz)</a></li><li><a href="https://support.citrix.com/external/article/CTX696300/netscaler-adc-and-netscaler-gateway-secu.html">Citrix NetScaler Advisory</a></li><li><a href="https://ec.europa.eu/commission/presscorner/api/files/document/print/en/ip_26_748/IP_26_748_EN.pdf">European Commission Breach (Bloomberg)</a></li><li><a href="https://www.bleepingcomputer.com/news/security/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/">Cisco / Trivy Supply Chain Attack</a></li></ul><p>Stay informed and secure: get the latest WordPress security news on the <a href="https://www.wordfence.com/blog/">Wordfence blog</a> or subscribe to the <a href="https://www.wordfence.com/subscribe-to-the-wordfence-email-list/">WordPress Security Newsletter</a>.  </p>]]>
      </itunes:summary>
      <itunes:keywords>Wordfence, WordPress, WordPress Security, Cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3e16c17d/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/3e16c17d/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/3e16c17d/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/3e16c17d/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/3e16c17d/transcription" type="text/html"/>
    </item>
    <item>
      <title>Iran-Linked Hackers Breach FBI Director's Email | Wordfence Security News| Week of March 23, 2026</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Iran-Linked Hackers Breach FBI Director's Email | Wordfence Security News| Week of March 23, 2026</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">58833c10-09ed-49d3-aaab-152e0e62aa9e</guid>
      <link>https://share.transistor.fm/s/d9a87871</link>
      <description>
        <![CDATA[<p><strong>This week in Wordfence Security News (Week of Mar 23, 2026): </strong></p><ul><li>Same-day exploitation of a critical RCE vulnerability in the Kali Forms plugin, attackers can achieve full admin takeover with a single request</li><li>Ongoing mass exploitation of the s2Member plugin targeting password reset functionality</li><li>Breaking News: Iran-linked hackers claim breach of FBI Director Kash Patel’s personal email</li><li>A critical Cisco firewall management vulnerability exploited as a zero-day by ransomware actors</li><li>FBI and CISA warn of phishing campaigns targeting messaging app accounts</li></ul><p><strong>Timestamps:</strong></p><p>0:00 Introduction<br>0:25 Kali Forms RCE Vulnerability<br>1:34 s2Member Mass Exploitation<br>2:20 Breaking News – FBI Email Breach<br>2:45 Cisco Firewall RCE Exploitation<br>5:03 Messaging App Phishing Campaigns</p><p><strong>Story Links:</strong></p><ul><li><strong>Kali Forms RCE Vulnerability:</strong> <a href="https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/kali-forms/kali-forms-249-unauthenticated-remote-code-execution-via-form-process">https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/kali-forms/kali-forms-249-unauthenticated-remote-code-execution-via-form-process</a></li><li><strong>s2Member Exploitation Campaign:</strong> <a href="https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/s2member/s2member-260127-unauthenticated-privilege-escalation-via-account-takeover">https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/s2member/s2member-260127-unauthenticated-privilege-escalation-via-account-takeover</a></li><li><strong>Cisco Firewall Advisory:</strong> <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh">https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh</a></li><li><strong>Interlock Ransomware Coverage:</strong> <a href="https://www.ic3.gov/PSA/2026/PSA260320">https://www.ic3.gov/PSA/2026/PSA260320</a></li><li><strong>Reuters – FBI Email Breach:</strong> <a href="https://www.reuters.com/world/us/iran-linked-hackers-claim-breach-of-fbi-directors-personal-email-doj-official-2026-03-27/">https://www.reuters.com/world/us/iran-linked-hackers-claim-breach-of-fbi-directors-personal-email-doj-official-2026-03-27/</a></li></ul><p>Stay informed and secure: get the latest WordPress security news on the <a href="https://www.wordfence.com/blog/">Wordfence blog</a> or subscribe to the <a href="https://www.wordfence.com/subscribe-to-the-wordfence-email-list/">WordPress Security Newsletter</a>.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>This week in Wordfence Security News (Week of Mar 23, 2026): </strong></p><ul><li>Same-day exploitation of a critical RCE vulnerability in the Kali Forms plugin, attackers can achieve full admin takeover with a single request</li><li>Ongoing mass exploitation of the s2Member plugin targeting password reset functionality</li><li>Breaking News: Iran-linked hackers claim breach of FBI Director Kash Patel’s personal email</li><li>A critical Cisco firewall management vulnerability exploited as a zero-day by ransomware actors</li><li>FBI and CISA warn of phishing campaigns targeting messaging app accounts</li></ul><p><strong>Timestamps:</strong></p><p>0:00 Introduction<br>0:25 Kali Forms RCE Vulnerability<br>1:34 s2Member Mass Exploitation<br>2:20 Breaking News – FBI Email Breach<br>2:45 Cisco Firewall RCE Exploitation<br>5:03 Messaging App Phishing Campaigns</p><p><strong>Story Links:</strong></p><ul><li><strong>Kali Forms RCE Vulnerability:</strong> <a href="https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/kali-forms/kali-forms-249-unauthenticated-remote-code-execution-via-form-process">https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/kali-forms/kali-forms-249-unauthenticated-remote-code-execution-via-form-process</a></li><li><strong>s2Member Exploitation Campaign:</strong> <a href="https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/s2member/s2member-260127-unauthenticated-privilege-escalation-via-account-takeover">https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/s2member/s2member-260127-unauthenticated-privilege-escalation-via-account-takeover</a></li><li><strong>Cisco Firewall Advisory:</strong> <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh">https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh</a></li><li><strong>Interlock Ransomware Coverage:</strong> <a href="https://www.ic3.gov/PSA/2026/PSA260320">https://www.ic3.gov/PSA/2026/PSA260320</a></li><li><strong>Reuters – FBI Email Breach:</strong> <a href="https://www.reuters.com/world/us/iran-linked-hackers-claim-breach-of-fbi-directors-personal-email-doj-official-2026-03-27/">https://www.reuters.com/world/us/iran-linked-hackers-claim-breach-of-fbi-directors-personal-email-doj-official-2026-03-27/</a></li></ul><p>Stay informed and secure: get the latest WordPress security news on the <a href="https://www.wordfence.com/blog/">Wordfence blog</a> or subscribe to the <a href="https://www.wordfence.com/subscribe-to-the-wordfence-email-list/">WordPress Security Newsletter</a>.  </p>]]>
      </content:encoded>
      <pubDate>Fri, 27 Mar 2026 14:04:00 -0700</pubDate>
      <author>Wordfence</author>
      <enclosure url="https://media.transistor.fm/d9a87871/3a162eae.mp3" length="6361259" type="audio/mpeg"/>
      <itunes:author>Wordfence</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/qoBjk1tfxmjKbg8VEBRV47nSJMfFo-vXI05QSmqgwXs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83Y2Ni/MTkwMjM4Nzc1ZDA2/ZjliMjIxMmFkMGYz/Mjc4Mi53ZWJw.jpg"/>
      <itunes:duration>395</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>This week in Wordfence Security News (Week of Mar 23, 2026): </strong></p><ul><li>Same-day exploitation of a critical RCE vulnerability in the Kali Forms plugin, attackers can achieve full admin takeover with a single request</li><li>Ongoing mass exploitation of the s2Member plugin targeting password reset functionality</li><li>Breaking News: Iran-linked hackers claim breach of FBI Director Kash Patel’s personal email</li><li>A critical Cisco firewall management vulnerability exploited as a zero-day by ransomware actors</li><li>FBI and CISA warn of phishing campaigns targeting messaging app accounts</li></ul><p><strong>Timestamps:</strong></p><p>0:00 Introduction<br>0:25 Kali Forms RCE Vulnerability<br>1:34 s2Member Mass Exploitation<br>2:20 Breaking News – FBI Email Breach<br>2:45 Cisco Firewall RCE Exploitation<br>5:03 Messaging App Phishing Campaigns</p><p><strong>Story Links:</strong></p><ul><li><strong>Kali Forms RCE Vulnerability:</strong> <a href="https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/kali-forms/kali-forms-249-unauthenticated-remote-code-execution-via-form-process">https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/kali-forms/kali-forms-249-unauthenticated-remote-code-execution-via-form-process</a></li><li><strong>s2Member Exploitation Campaign:</strong> <a href="https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/s2member/s2member-260127-unauthenticated-privilege-escalation-via-account-takeover">https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/s2member/s2member-260127-unauthenticated-privilege-escalation-via-account-takeover</a></li><li><strong>Cisco Firewall Advisory:</strong> <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh">https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh</a></li><li><strong>Interlock Ransomware Coverage:</strong> <a href="https://www.ic3.gov/PSA/2026/PSA260320">https://www.ic3.gov/PSA/2026/PSA260320</a></li><li><strong>Reuters – FBI Email Breach:</strong> <a href="https://www.reuters.com/world/us/iran-linked-hackers-claim-breach-of-fbi-directors-personal-email-doj-official-2026-03-27/">https://www.reuters.com/world/us/iran-linked-hackers-claim-breach-of-fbi-directors-personal-email-doj-official-2026-03-27/</a></li></ul><p>Stay informed and secure: get the latest WordPress security news on the <a href="https://www.wordfence.com/blog/">Wordfence blog</a> or subscribe to the <a href="https://www.wordfence.com/subscribe-to-the-wordfence-email-list/">WordPress Security Newsletter</a>.  </p>]]>
      </itunes:summary>
      <itunes:keywords>Wordfence, WordPress, WordPress Security, Cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d9a87871/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d9a87871/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d9a87871/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d9a87871/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/d9a87871/transcription" type="text/html"/>
    </item>
    <item>
      <title>30,000 Sites at Risk, Cisco Zero-Day &amp; Stryker Attack | Wordfence Security News | Week of Mar 9, 2026</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>30,000 Sites at Risk, Cisco Zero-Day &amp; Stryker Attack | Wordfence Security News | Week of Mar 9, 2026</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">08e87077-14c9-4622-b894-f31d76add52e</guid>
      <link>https://share.transistor.fm/s/60882fd7</link>
      <description>
        <![CDATA[<p><strong>This week in Wordfence Security News (Week of Mar 9, 2026): </strong></p><ul><li>A critical auth bypass in Tutor LMS Pro exposes 30,000+ WordPress sites — attackers can hijack admin accounts via a Google sign-in flaw</li><li>An unauthenticated SQL injection in Ally (400K+ sites)</li><li>Microsoft Patch Tuesday with ~80 fixes including AI-related exploits</li><li>A max-severity Cisco SD-WAN zero-day exploited since 2023</li><li>Iran-linked group Handala's claimed attack on medical device maker Stryker.</li></ul><p><strong>Timestamps:<br></strong><br>0:00 Introduction<br>0:22 Tutor LMS Pro Authentication Bypass<br>1:31 Ally WordPress Plugin SQL Injection<br>1:50 Microsoft Patch Tuesday<br>2:46 Cisco SD-WAN Zero-Day<br>4:26 Handala Attack on Stryker<br>5:03 Iranian Drone Strikes on AWS Data Centers</p><p><strong>Story Links:</strong></p><ul><li><strong>Tutor LMS Pro Auth Bypass: </strong><a href="https://www.wordfence.com/blog/2026/03/30000-wordpress-sites-affected-by-authentication-bypass-vulnerability-in-tutor-lms-pro-wordpress-plugin/">https://www.wordfence.com/blog/2026/03/30000-wordpress-sites-affected-by-authentication-bypass-vulnerability-in-tutor-lms-pro-wordpress-plugin/</a></li><li><strong>Ally Plugin SQL Injection:</strong> <a href="https://www.wordfence.com/blog/2026/03/400000-wordpress-sites-affected-by-unauthenticated-sql-injection-vulnerability-in-ally-wordpress-plugin/">https://www.wordfence.com/blog/2026/03/400000-wordpress-sites-affected-by-unauthenticated-sql-injection-vulnerability-in-ally-wordpress-plugin/</a></li><li><strong>Microsoft Patch Tuesday:</strong> <a href="https://msrc.microsoft.com/update-guide/">https://msrc.microsoft.com/update-guide/</a></li><li><strong>Cisco SD-WAN Advisory:</strong> <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v">https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v</a></li><li><strong>Iran Cyber Retaliation:</strong> <a href="https://industrialcyber.co/reports/cyber-retaliation-surges-after-us-israel-strikes-on-iran-as-hacktivists-hit-governments-defense-critical-sectors/">https://industrialcyber.co/reports/cyber-retaliation-surges-after-us-israel-strikes-on-iran-as-hacktivists-hit-governments-defense-critical-sectors/</a></li><li><strong>Stryker Cyberattack (WSJ):</strong> <a href="https://www.wsj.com/articles/stryker-hit-with-suspected-iran-linked-cyberattack-52f6615c">https://www.wsj.com/articles/stryker-hit-with-suspected-iran-linked-cyberattack-52f6615c</a></li><li><strong>AWS Data Centers Struck (BBC):</strong> <a href="https://www.bbc.com/news/articles/cgk28nj0lrjo">https://www.bbc.com/news/articles/cgk28nj0lrjo</a></li><li><strong>Weekly Vulnerability Report:</strong> <a href="https://www.wordfence.com/blog/2026/03/wordfence-intelligence-weekly-wordpress-vulnerability-report-march-2-2026-to-march-8-2026/">https://www.wordfence.com/blog/2026/03/wordfence-intelligence-weekly-wordpress-vulnerability-report-march-2-2026-to-march-8-2026/</a></li></ul><p>Stay informed and secure: get the latest WordPress security news on the <a href="https://www.wordfence.com/blog/">Wordfence blog</a> or subscribe to the <a href="https://www.wordfence.com/subscribe-to-the-wordfence-email-list/">WordPress Security Newsletter</a>.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>This week in Wordfence Security News (Week of Mar 9, 2026): </strong></p><ul><li>A critical auth bypass in Tutor LMS Pro exposes 30,000+ WordPress sites — attackers can hijack admin accounts via a Google sign-in flaw</li><li>An unauthenticated SQL injection in Ally (400K+ sites)</li><li>Microsoft Patch Tuesday with ~80 fixes including AI-related exploits</li><li>A max-severity Cisco SD-WAN zero-day exploited since 2023</li><li>Iran-linked group Handala's claimed attack on medical device maker Stryker.</li></ul><p><strong>Timestamps:<br></strong><br>0:00 Introduction<br>0:22 Tutor LMS Pro Authentication Bypass<br>1:31 Ally WordPress Plugin SQL Injection<br>1:50 Microsoft Patch Tuesday<br>2:46 Cisco SD-WAN Zero-Day<br>4:26 Handala Attack on Stryker<br>5:03 Iranian Drone Strikes on AWS Data Centers</p><p><strong>Story Links:</strong></p><ul><li><strong>Tutor LMS Pro Auth Bypass: </strong><a href="https://www.wordfence.com/blog/2026/03/30000-wordpress-sites-affected-by-authentication-bypass-vulnerability-in-tutor-lms-pro-wordpress-plugin/">https://www.wordfence.com/blog/2026/03/30000-wordpress-sites-affected-by-authentication-bypass-vulnerability-in-tutor-lms-pro-wordpress-plugin/</a></li><li><strong>Ally Plugin SQL Injection:</strong> <a href="https://www.wordfence.com/blog/2026/03/400000-wordpress-sites-affected-by-unauthenticated-sql-injection-vulnerability-in-ally-wordpress-plugin/">https://www.wordfence.com/blog/2026/03/400000-wordpress-sites-affected-by-unauthenticated-sql-injection-vulnerability-in-ally-wordpress-plugin/</a></li><li><strong>Microsoft Patch Tuesday:</strong> <a href="https://msrc.microsoft.com/update-guide/">https://msrc.microsoft.com/update-guide/</a></li><li><strong>Cisco SD-WAN Advisory:</strong> <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v">https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v</a></li><li><strong>Iran Cyber Retaliation:</strong> <a href="https://industrialcyber.co/reports/cyber-retaliation-surges-after-us-israel-strikes-on-iran-as-hacktivists-hit-governments-defense-critical-sectors/">https://industrialcyber.co/reports/cyber-retaliation-surges-after-us-israel-strikes-on-iran-as-hacktivists-hit-governments-defense-critical-sectors/</a></li><li><strong>Stryker Cyberattack (WSJ):</strong> <a href="https://www.wsj.com/articles/stryker-hit-with-suspected-iran-linked-cyberattack-52f6615c">https://www.wsj.com/articles/stryker-hit-with-suspected-iran-linked-cyberattack-52f6615c</a></li><li><strong>AWS Data Centers Struck (BBC):</strong> <a href="https://www.bbc.com/news/articles/cgk28nj0lrjo">https://www.bbc.com/news/articles/cgk28nj0lrjo</a></li><li><strong>Weekly Vulnerability Report:</strong> <a href="https://www.wordfence.com/blog/2026/03/wordfence-intelligence-weekly-wordpress-vulnerability-report-march-2-2026-to-march-8-2026/">https://www.wordfence.com/blog/2026/03/wordfence-intelligence-weekly-wordpress-vulnerability-report-march-2-2026-to-march-8-2026/</a></li></ul><p>Stay informed and secure: get the latest WordPress security news on the <a href="https://www.wordfence.com/blog/">Wordfence blog</a> or subscribe to the <a href="https://www.wordfence.com/subscribe-to-the-wordfence-email-list/">WordPress Security Newsletter</a>.  </p>]]>
      </content:encoded>
      <pubDate>Fri, 13 Mar 2026 14:00:00 -0700</pubDate>
      <author>Wordfence</author>
      <enclosure url="https://media.transistor.fm/60882fd7/327d379d.mp3" length="5525345" type="audio/mpeg"/>
      <itunes:author>Wordfence</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/2qAiJI6oMaDilR9ZKIvjtF5_zDViH_fPv3L6USsuIYs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mNmEz/ZTM4NDgyMjIyZDBh/MGQ1NGVjNzk4ZTVh/OTAyYy53ZWJw.jpg"/>
      <itunes:duration>343</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>This week in Wordfence Security News (Week of Mar 9, 2026): </strong></p><ul><li>A critical auth bypass in Tutor LMS Pro exposes 30,000+ WordPress sites — attackers can hijack admin accounts via a Google sign-in flaw</li><li>An unauthenticated SQL injection in Ally (400K+ sites)</li><li>Microsoft Patch Tuesday with ~80 fixes including AI-related exploits</li><li>A max-severity Cisco SD-WAN zero-day exploited since 2023</li><li>Iran-linked group Handala's claimed attack on medical device maker Stryker.</li></ul><p><strong>Timestamps:<br></strong><br>0:00 Introduction<br>0:22 Tutor LMS Pro Authentication Bypass<br>1:31 Ally WordPress Plugin SQL Injection<br>1:50 Microsoft Patch Tuesday<br>2:46 Cisco SD-WAN Zero-Day<br>4:26 Handala Attack on Stryker<br>5:03 Iranian Drone Strikes on AWS Data Centers</p><p><strong>Story Links:</strong></p><ul><li><strong>Tutor LMS Pro Auth Bypass: </strong><a href="https://www.wordfence.com/blog/2026/03/30000-wordpress-sites-affected-by-authentication-bypass-vulnerability-in-tutor-lms-pro-wordpress-plugin/">https://www.wordfence.com/blog/2026/03/30000-wordpress-sites-affected-by-authentication-bypass-vulnerability-in-tutor-lms-pro-wordpress-plugin/</a></li><li><strong>Ally Plugin SQL Injection:</strong> <a href="https://www.wordfence.com/blog/2026/03/400000-wordpress-sites-affected-by-unauthenticated-sql-injection-vulnerability-in-ally-wordpress-plugin/">https://www.wordfence.com/blog/2026/03/400000-wordpress-sites-affected-by-unauthenticated-sql-injection-vulnerability-in-ally-wordpress-plugin/</a></li><li><strong>Microsoft Patch Tuesday:</strong> <a href="https://msrc.microsoft.com/update-guide/">https://msrc.microsoft.com/update-guide/</a></li><li><strong>Cisco SD-WAN Advisory:</strong> <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v">https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v</a></li><li><strong>Iran Cyber Retaliation:</strong> <a href="https://industrialcyber.co/reports/cyber-retaliation-surges-after-us-israel-strikes-on-iran-as-hacktivists-hit-governments-defense-critical-sectors/">https://industrialcyber.co/reports/cyber-retaliation-surges-after-us-israel-strikes-on-iran-as-hacktivists-hit-governments-defense-critical-sectors/</a></li><li><strong>Stryker Cyberattack (WSJ):</strong> <a href="https://www.wsj.com/articles/stryker-hit-with-suspected-iran-linked-cyberattack-52f6615c">https://www.wsj.com/articles/stryker-hit-with-suspected-iran-linked-cyberattack-52f6615c</a></li><li><strong>AWS Data Centers Struck (BBC):</strong> <a href="https://www.bbc.com/news/articles/cgk28nj0lrjo">https://www.bbc.com/news/articles/cgk28nj0lrjo</a></li><li><strong>Weekly Vulnerability Report:</strong> <a href="https://www.wordfence.com/blog/2026/03/wordfence-intelligence-weekly-wordpress-vulnerability-report-march-2-2026-to-march-8-2026/">https://www.wordfence.com/blog/2026/03/wordfence-intelligence-weekly-wordpress-vulnerability-report-march-2-2026-to-march-8-2026/</a></li></ul><p>Stay informed and secure: get the latest WordPress security news on the <a href="https://www.wordfence.com/blog/">Wordfence blog</a> or subscribe to the <a href="https://www.wordfence.com/subscribe-to-the-wordfence-email-list/">WordPress Security Newsletter</a>.  </p>]]>
      </itunes:summary>
      <itunes:keywords>Wordfence, WordPress News, WordPress Security News, WordPress, WordPress Security, Cybersecurity, Cybersecurity News</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/60882fd7/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/60882fd7/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/60882fd7/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/60882fd7/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/60882fd7/transcription" type="text/html"/>
    </item>
  </channel>
</rss>
