Here’s an article from WPMU DEV Blog written by Jon Penland which I thought you might find of interest.

Imagine with me for a moment that you’re a hacker looking for ways to hijack reputable websites and use them to funnel unsuspecting traffic to a nefarious phishing scam. How would you target websites for maximum impact? One option would be to locate and target a single vulnerability that affects hundreds or thousands of sites. […]

To read more head to

Till next time,