Tuesday, 30 August 2016

[Russia News Now] Please moderate: "Deeply Corrupt: Ukraine's President Continues to Enrich Himself - Graham Stack & Ben Aris"

A new comment on the post "Deeply Corrupt: Ukraine's President Continues to Enrich Himself - Graham Stack & Ben Aris" is waiting for your approval

Author: Anna (IP:, pol4.netassist.ua)
Email: anetka11992@gmail.com
People, don't mix policy & business. They were, are and always will be separate. Let's remember when President Poroshenko in his interview to Tim Sebastian (DW Journalist) clearly said the following: " When I was running to the post of President I never promised to sell the 5th Channel. Never. This channel is very reputable, critical and people trust it. It was created as first free Ukrainian media. I'm the guarantee of the freedom of press". So why we're blaming Mr. President for breaking the promise he didn't gave? He is a man of honour. He works for the wealth & prosperous feature of ukrainian people. So the fact that Mr. Poroshenko owns channel isn't a reasonable obstacle for being a good President for Ukraine.
While speaking about president's promise to sell chocolate business, it is impossible when country is in a state of war and there are no buyers. Moreover, President tried to sell his factories in Rusia, but there his business was confiscated. That's why it's unreal to sell arrested business.

Approve it: http://www.therussophile.org/wp-admin/comment.php?action=approve&c=59445#wpbody-content
Delete it: http://www.therussophile.org/wp-admin/comment.php?action=delete&c=59445#wpbody-content
Spam it: http://www.therussophile.org/wp-admin/comment.php?action=spam&c=59445#wpbody-content
Currently 2 comments are waiting for approval. Please visit the moderation panel:

Thursday, 18 August 2016

Thanks for Downloading Sucuri's Security Plugin for WordPress

Real People. Real Security.
Greetings from Sucuri!

Thank you for downloading the Sucuri Security Plugin for WordPress. We are happy to know you confide in us to help improve your WordPress security posture. If you have any questions, please be sure to check our Knowledge Base or engage us via the WordPress.org forum. 

Additionally, you've been added to our subscription list which will be used sparingly to provide information on the following:

  • Security Advisories / Vulnerability Disclosures
  • Education articles, posts, and webinars
  • Sucuri news / product updates

We take great pride in being mindful of not abusing the trust you've entrusted us with, and as such want to welcome you, but also notify you of the addition to this email list. Offering you the opportunity to unsubscribe if you so deem it necessary. 

We would prefer you didn't, the security landscape is constantly evolving and if needed we'd love the opportunity to notify you of such changes so that you can take appropriate actions. 

Below you will find two examples to help you make a better decision on whether you want to stay on this list:


  • Security Advisory
  • Webinar: Impacts of a Website Compromise

Security Advisory Example:




If you're interested in website security but are not sure where to start, our webinar hosted by Sucuri CEO, Tony Perez, is a great place to jump in.

Webinar: Impacts of a Website Compromise



If you love to stay on top of the latest information, check out our blog.

If you would not like to receive these type of security updates and educational emails, feel free to unsubscribe below.

Thanks again and we look forward to speaking with you soon!

- Your Sucuri Security Team
Like, Connect, Follow!

Vulnerability Alert: SQL Injection Vulnerability in Ninja Forms


Hi ,

We're reaching out to you today to ensure that you are up to date regarding the latest security issues that may be affecting your website. Keeping our community safe and educated is of great importance to us. 

As part of our regular research audits for our Sucuri Firewall, we discovered an SQL Injection vulnerability affecting the Ninja Forms plugin for WordPress, currently installed on 600,000+ websites.

The attack vector used to exploit this vulnerability requires the attacker to have an account on the victim's site. It doesn't matter what the account privileges are – for example, a subscriber could exploit this issue. The issue occurs because the plugin doesn't escape parameters provided by its shortcodes before concatenating it to an SQL query.

A malicious individual using this bug could (among other things) leak the site's usernames and hashed passwords. In certain configurations, it can also leak WordPress secret keys.

Read More About This Vulnerability

Security Risk: Dangerous

Exploitation Level: Easy/Remote

DREAD Score: 6/10

Vulnerability: SQL Injection

Patched Version:

Websites behind the Sucuri Firewall have been protected against this threat
via our Virtual Hardening / Patching technology. 

If you don't have our Website Application Firewall enabled, sign up now below!

This email does not mean you are affected!

Being proactive in the protection of your site is one of the most important aspects of having a solid security posture. Therefore, we feel it's important to research and report on all potential threats as quickly as possible.
- Your Sucuri Security Team