[WordPress Security] National Cyber Security Awareness Month: You Could Be the Biggest Threat to Your WordPress Site

From: Wordfence <list_at_wordfence.com>
Date: Thu, 6 Oct 2022 12:59:08 -0700

October is National Cyber Security Awareness Month and the Wordfence team has tips to help keep your WordPress site secure.

Wordfence-Logo.png (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRrG3pdqSV1-WJV7CgJHyW6ZP3Nw3_vydBW2FRXRg7S8_mkW7gnK0F3Pb1h4Vq6QP_6s-RqGW3GQ95v4c-Yf5MCBV7Ml13QcW3Np0JL3M8W0bN5D7KyPgJl1SW6yjSDV25tJJgW4PB7TJ974cTtW95mBqq7vVYfQW7KZp7g600PhCW8f7Vv24CC1NgV40wBV7sN_mHW3YWpHh2KBDdXW2YKmks87Br9JW5dM1T55Hf1D1N8yxMCxv0DVxN6rry9vDGMTsW1zJ5tB7CDJym3kSG1 )

NCSAM Featured Image (1) (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRrm5mNXLV3Zsc37CgQWfW5W_xCk4-f0n7W4ZDngd79xp5rW4FW3Xp3lRlx6N7cTdj8x6xvrW8R_7dW3_cdMlW7kvb2C945sYBW77bfyD57PZ9gW5w_bSJ8gWqW9W3vKDC_3HyGxwW15bPdl1kjhZMW5zxJ4k90hC--W3L9x2h7Cf4K1N3twNC1LmWg3W9kF0kN81t8KwW5JW7Cw1tfP8pV1qjp77tt7PgW2wYtPw3sYx3CW6Wpxyh3vjFSDW2D96n98f_LNTW3ct1wz4flf1_MPMMnrwtBVqW8t87nz1z-pfFW6vh_4H7N4wxPMTqVmH-hSG_W4KhfZH8PxLybW6BB32p7DH5cwW2bYRrN2Kcfl9W180L4w46JsY1W7Pslzs91bDPhW86Rcrg2s50trW3ch5Rw8x0xtjW4fZHMy5Vmd-pW8bFD9y6fgthpW8pWjXY65FHZh3dYq1 )

October is National Cybersecurity Awareness Month in the U.S., and this year’s theme is “See Yourself in Cyber.” What is really being said by this theme is that we all have a role to play in cybersecurity, whether we work in the industry or not. With this in mind, the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) have identified four key areas where we can all take action to protect our presence online, and work to keep others safe. These same concepts can be used to help secure WordPress sites as well.

This email content has also been published on our blog and you're welcome to post a comment there if you'd like to join the conversation. (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRrm5mNXLV3Zsc37CgQWfW5W_xCk4-f0n7W4ZDngd79xp5rW4FW3Xp3lRlx6N7cTdj8x6xvrW8R_7dW3_cdMlW7kvb2C945sYBW77bfyD57PZ9gW5w_bSJ8gWqW9W3vKDC_3HyGxwW15bPdl1kjhZMW5zxJ4k90hC--W3L9x2h7Cf4K1N3twNC1LmWg3W9kF0kN81t8KwW5JW7Cw1tfP8pV1qjp77tt7PgW2wYtPw3sYx3CW6Wpxyh3vjFSDW2D96n98f_LNTW3ct1wz4flf1_MPMMnrwtBVqW8t87nz1z-pfFW6vh_4H7N4wxPMTqVmH-hSG_W4KhfZH8PxLybW6BB32p7DH5cwW2bYRrN2Kcfl9W180L4w46JsY1W7Pslzs91bDPhW86Rcrg2s50trW3ch5Rw8x0xtjW4fZHMy5Vmd-pW8bFD9y6fgthpW8pWjXY65FHZh3dYq1 ) Or you can read the full post in this email.

Think Before You Click

The idea behind this concept is that you should always be on the lookout for phishing attempts. This is true in general, but also applies specifically to anyone who is an administrator of a WordPress site. Anyone who is in this role is likely very familiar with receiving emails from their website that advise of available updates, or comments that need to be moderated, and plenty of plugins have their own reasons for sending emails to administrators as well. As most administrators don’t log into the admin panel daily, these emails are often a critical part of the site management workflow.

WordPress is currently used on over 40% of all websites, making it both well-known and a large target for threat actors. What this means is that threat actors are aware of the emails that website administrators are used to receiving, and can likely duplicate them with relative ease. Whenever you receive an email from your website, it is best to check that any links do not contain domain names from other websites before clicking, or better yet log into the admin panel directly and navigate to the page that needs your attention.

Even more important than checking links in the emails you are used to receiving is checking links in emails you aren’t expecting. We recently discussed (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRt73pdskV1-WJV7CgKVZW1mYWKB3NcY-_W36cRMD51VKQ8W1vsFbR3-_NSnW984Jjc36fhFJW1T2fNP5VtY0HW8gwTmd4V6l-NW60kC0f2j0-j2N2sHF0WZhwn8W1NvsTX1dK6zSW4_7tkh5CLqW-W6Wxt1-4FwZMfVMc3F-7KFb1lW3bh6CJ1F-_-MW14_pnC8YGdV1W7-qPff72GxyhVSHBy744v5WzW1_7h4g8l_XnnW3GVnhf48tWssW8ppMF33Qbrw6W7t0Fkj4PrFcpW71nYGV1N6JyMW20fNmY6Fp0NTW3kCfLr3y0bkZVBTJCN4Ry5lrW2wNt_n66tgHqW2Pq8R54454xvW8l1wJj8LrVSkW3jbs3h5c_2MKW19d72C7Fw3b2W7mNMTV15lNM13gx61 ) how links can be manipulated to enable a complete account takeover, among other malicious activities. By remaining vigilant and checking the actual URL being used, these types of attacks can be avoided.

Update Your Software

One of the best ways to keep a website secure is to ensure that any software being used is regularly updated with the latest security updates. In WordPress, this means keeping your core WordPress version up to date, as well as any themes or plugins that are installed. Automatic updating of the WordPress core was added in WordPress 3.7, and WordPress 5.5 added the ability to update themes and plugins automatically.

Despite the ability to update all of this software automatically, many site administrators allow their websites to run on outdated versions, many of which contain security vulnerabilities. Some may have reasons for using older versions, such as theme or plugin compatibility issues. However, these issues should be resolved as quickly as possible, finding replacement themes or plugins if necessary. If leaving outdated software active on the site is a matter of convenience, then automatic updates should be enabled to ensure vulnerabilities are patched as quickly as possible. Feel free to refresh your memory on when to choose auto-updates over manual review in this article (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRsS3pds1V1-WJV7CgNl8W5pM_qd72QBZDN1c85VxLRq7mW7ZXH3d7lq0MvN5wZXVcpGlzLN9lR7V-hrpG_N7htssf-mgxLW17hR5H797fN3W84Wbb_8D8QPjW5hlGHZ529NfZW2ps3Ss5KMM3bW2k2hVZ13lTkBW2XBKSN6M4mXTW3bfSFg6B9yx8W3pGRM43RcR9qW6vsRby4dK-JtW7Pfrcf4t04rfN1TmZ3Jp3LP8W4Mp7Pc2NGPxyW4L4_6P8w0Z-wW7nfGXY7CYg0QW5Mtqdd62SfT8W4F0Twy98kslSW1DB9ZR15pzLgVy4Mhc7fR-xTVPJGjk73l4-nVy3YQM6ybKVvW656V9x7TLD5zN1c9Bc86KYsS2Jl1 ) we published back in 2020 when auto-updates for plugins and themes came out.

The majority of the targeted attack attempts we see are attempting to make use of vulnerabilities in outdated plugins. As threat actors become aware of vulnerabilities, they also know they can find success in exploiting those vulnerabilities because of the number of administrators who allow outdated plugins to remain active on the website. The simple act of updating all of the site software is one of the simplest ways to prevent the success of an exploit attempt.

Use Strong Passwords – and a Password Manager

It can’t be stated enough that passwords need to be as strong as possible. Threat actors have been looking for ways to get into user accounts since the dawn of the modern era of computing, and they have a number of tools at their disposal to guess or “crack” passwords. The stronger the password, the lower their chance of success. Longer passwords are considered more secure, with current recommendations calling for a minimum of a 16-character password wherever possible. Each password should only be used to log into a single account. This means that individuals should have strong and unique passwords for each and every account they have from WordPress to Gmail and everything in between.

While the requirement to use a unique password for every account may sound like overkill to some, there is a very good reason for it. A type of attack known as credential stuffing (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRsy3pdrLV1-WJV7CgKXlW2yBVNn2z-81yW4tC0T36ZwKKPW40vT945chDV3W9crVyN42j0FGW4zdknR103xF7N97WkMx5FtthVX45Y78XjgllW63wKyH2ksS3lW98f2JV2c321PW8nn4_l5wN3MYW21Svqv2-hHYcW3Zsmxw795g06N31kRg3f6rrHW1rGpTV2mkzMXW2ScPtt6_4d85N7mBNHvCg2ssW5PNp_G8RXr06W97HQBj6FrVbzW4wXgh92dV6hdW1y21621c4qsVW4PXjXV4QT5p2W4gxLxt1-Ht2wW4qyvkD6MJ2lcW2v9pX43KTpt0W98qkWp5VMbRHW1r2Z2m1nz9RX33J51 ) is easily prevented simply by using unique passwords. Credential stuffing consists of using known usernames and passwords to try to log in to as many accounts as possible. If credentials from an account are leaked in a data breach, stolen through phishing, or otherwise obtained by a malicious actor, they are often able to gain access to multiple accounts simply by using those same credentials in other accounts, such as Gmail, banks, and of course WordPress.

Another common method of guessing a password is what is known as a dictionary attack. This type of attack utilizes techniques like trying lists of common passwords, or even seemingly random strings, in the password field to attempt to find one that provides access to the account. In the last 30 days, we have blocked 4,239,859,063 password attack attempts, which highlights the importance of using a strong password to keep malicious actors out of accounts.

Brute Force (1) (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRrm5mNXLV3Zsc37Cg-fWW7wCqyP8Xyr7hW4k5HWP3YgCWkVrvYrF210x60N2NMGy97LL-YW5dRtyX38Yn-pW3V47gp8sJpNlW8pBBgp2_HzyxW32N4gV6TTWXwN31WQHZwXDhgN7mxnPSfkG0YW5C0X5k1k5nLBN1B1_j18ldVpW5d90Rn2HjfrwW7FzGXn7YBYKQW1vJThb5D-5VPN24CTrfWCH_dN6cr4nD-fySMW4fyGsP7Z-CYqW5ZCpxs7pN-pYN4YPt_h8TMPBW5SJJyF2xrDVZW5pKNCy5XwVZWW3qhCL13qY1yDW61Pyzv4YKJzZN5Ppfb8YF2-gW5_nvN58rYW1xW61BKJQ6VHTdsW4vm34Q6T-84JW7MDxl93_CN6NW2MlNyc8fVmFbW5vzRy541jZCFW8wbXv16QpZVgW1rrj2n2vLnT9W6v5ztw7cnl233bvT1 )

Using long passwords that are unique for each account can seem intimidating, especially once you consider that the average person has around 100 different accounts that need passwords. This is where password managers come in. Most password managers can automatically generate secure passwords, and securely store those passwords to easily copy and paste into login forms. There are a number of password managers available, all with their own set of features and use-cases. Ultimately, which password manager you use is far less important than the fact that you are using one, so use the one that fits your needs the best.

Refresh your memory with 10 of the most common password mistakes we’ve seen (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRt73pdskV1-WJV7CgRlrW3gd4ZL1q0kPnW5mD0nX6LrqMXW25hKZq88mBX_W53kTvh16-MPHN3PZXTHZ3xqNW7LcTJs5r3DdrN2B9hFbq36VpW5bqxL57D2mNJW4lJFtb69x0l4W15sJkS1wzFwqW7pBMqb6gqwHsV151lw2SLd6sW3q4CZq2d2tS5W83_B1s38lFW1W1kH9nb13d4lDW3FT78c5R82vMW97cChC1BdDHcW4zNkZR3yWrjkW684d-K1269cZW2wc9Px7QKGynW7Szgnq5NGrdpW2mwy0B4hp6sZW87pQlL1wptc7W3NgWvD4lwxTNW6yVPMr8llp3pW2XyJk_5CTFPDW28LcsP8p6-TkW5-VdJd4VTh-wW8_PvF95CR988W7szPmz8Zv-pz3mHV1 ) and employ techniques to mitigate the risks of each one.

Enable Multi-Factor Authentication

While strong passwords are important, enabling multi-factor authentication (MFA) is one of the most effective methods of preventing unauthorized account access. According to details provided in a White House press briefing (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRsS5mNZcV3Zsc37CgHlHW3Byyg616_djyW5TSBy54VDJ_nW1MV67g5T6CShW50B4nL1z2l54V28dZD6msTwMVPcjw68L6SHtW6XflH56T0wzrW157-gY6jRLn9W8x2wcl6sgC9TW38rDkk3wcqKKW1Z4f-137QXn_W5MGnh76p8NbZW4wB2MB4F3TrNW79ffBW2ClcpMW48DtlL54dZP6W6zM_QR1W-hw9W8P2dTk1lp9fxW3Pr2yf2Q-Jk9W2yKr9h6ypXw1W88gLWB7nm1SVW5tD--C1fFQ60W3T0jHc42GSh-W86Gz812Vzf-PW6Pdjz_36bQTbW7p4tg-6NZZMmW48Gcd8186WY1W7r1fcq2kvktJW3ZLS3W44Bh_LW133mHD3KJXPMW4Tm-TL2Hn4XyW2sHFlZ6pJN42W986rx_6flFv4W8kGVLQ3_Q13YW1D84V04tl4VmW5lChJ-9kq-ZhW28TPrg4fky5NW4G6C-93BtfXGW4wnnxW4n0-b0N9f1l_qts_9rVl0dmj4hlgTRW7JMsLW1HqYpXW1w83_990jP25W6k-3fT28TdCPW1cBwNQ3b7Dqf3jQw1 ) , 80-90% of all cyber attacks can be prevented with the implementation of multi-factor authentication (MFA). There are various forms that MFA can take, but the basic idea behind it is that you are using something you know (password), along with something you are like biometrics or something you have such as a smartphone or usb device, to provide access.

What makes MFA so effective is the fact that it requires at least one additional form of authentication that a malicious actor is not likely to possess with the first factor. This means that even if a threat actor obtains a username and password through a phishing scam, they still won’t have access to the smart card, MFA token, or other additional form of authentication required. Most MFA methods are also relatively simple for the authorized user to utilize, and combining this with strong unique passwords that are stored in a password manager can even be more convenient for the user than trying to remember password variants that work with the various password requirements of their accounts. As a reminder, Wordfence makes it incredibly easy for site owners to set-up MFA (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRsf3pdrrV1-WJV7CgVh_W3TSMtt8RjqC8W6hHlWK4gjc9_N1hDGTkcWB91W1NVtVK8BqRlDW2dmlC43gfHYjVCccFZ92KWR5W57nppy33pd-BVMfzPx27J8fnW9cnGz75mp191W81_43g80trMfN3X3BgjHb_L2W6xpz451MQjGdW2Tz-lr4gSfc_VMCR1L8sLCw-W8_Xmjl5YgwhnW2jcRxr7gqG90W6X-gmV5GSxPhW3WVD332rQ2YqW1J4zT680bd7sW685wDn5lq5kJW3RzpFk6Jl7NSW6mHvMW8ypYP3W82tgkb8mPt4xVTzYV83Fl0DV3jKs1 ) for all Wordfence users.

Conclusion

National Cyber Security Awareness Month is a great time to review our personal and professional security hygiene. Each year a different theme is chosen, based on the areas that have been observed to need the most improvement. The specific behaviors and techniques highlighted should be reviewed and applied everywhere possible. Following this year’s theme of “See Yourself in Cyber” we gain the understanding that cyber security is everyone’s responsibility, and that we can apply new behaviors to avoid phishing and vulnerabilities, as well as better secure access to our accounts.

In addition to the suggestions provided by CISA and NCA, it is important for WordPress site administrators to implement a security solution like Wordfence to block attack attempts that take advantage of known and unknown vulnerabilities, as well as detect malware that may find its way into a website. Wordfence Free (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRsf3pdrrV1-WJV7CgzLdW995bhg52mYBmW2DjFrX7NQHg7W77dKM-1SqyLkW8R67242_J181W37Fx5x6WdnSNN3-6gLJ6PFzSW2dT3GS1qcCNPW2N4f2B78qmk0W1HkYhb5YT5N9W1rJBy03N_wG7W6sr3157yryxzW3CCHbq3_vLYNN65fHXS_hZbpW96R9wn323GpFV_rByM5qbKb5W7DMLFn6cz1vvVzmxn-97DH95W1DGhN62tck5-W21GxMN9clXtlW8cVbJ42dXPPcW6Z16Lw5ZFvCzW1lGcwD3YB41bN6bys5QZpKsVN4t0ZDRg-6dk39nq1 ) , Premium (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRsf3pdrrV1-WJV7CgHNZN42L_Lsz1yyxW6zFcZS6tmZ-YVM03qX2ws2F5W3_5jrd7ZMld2W5rcPkX4v8xWKW4clsNn7KZmphW8kCfnv94RX2_N445SgSYbTm0W8BLqTY4vL9HPN6SjhqVFJK8-W3qRQM82gPCNkVyHBY16mjs5ZW4Y8nbL2S0DPBN7Kx4F2cr1RkW3P21fT2bV6sgW2XxZbw14pJ6FW4mqLGS1fRnckW5Mhz7Q2BJsgrW3Fnz9z6W22c6W7xPp5r6NQFFsW2b7ThQ5VQWtQW37NWzL3Z5stxW92dpcX8XGwxFW7F-rtR5NckMg3lVZ1 ) , Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRsf3pdrrV1-WJV7CgXM3MHWv3hQNlRTW2kvlLS4b7VmGW1J6Bgk4sW6mpW6vBJ244jKzhFW930mXG6xLHjyW7Mq7jM4kpXq-W1VVX1Q1C7b5QW2Pfnt06Xdw4QN8Rs5FVgx2KRW8GjGpM7GB0SwW8Zh2C12s85VMW2V3CS_8GpcTRW84Hjn353g58zVLC4H129wjKNN2Gv8WGzBm5pN7mqCnJWWK6FW7T6SZr8Yjn27W1FR0Gp40sZ3zW9hsNSq1Qt505W8v2xXf3wzZzWN3Y6tG69qDKZW3MYbqq10DqLBW25lfD31hY4sfW4F2tjL33xdyD3gJ11 ) , and Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRsf3pdrrV1-WJV7CgHHxW1M591K3XLj4WW1PlskJ7qXbnjW2WsyVk2yG2v-W2-MJPf3z9QDMW2bsQyY2rdhrjVnb4tx8j7WrQW2D_yP97sqYSNW92qJC32GPDgcW5fkwcd23R0Y6W5rKVJ38b7DdtW7pl5XR2Nb5z_W3ksrNt3qjtYYW98VwsP1B3yw0W3pb6HR8XDLzVW8GMVDb5G1Z0tVx9bc93y15S8V_VwF76HYj3HW9fx57n92ccdsW6VJY4t4ZKWW4W44Ldkf1-5cdnW5wFYWL4z-3GMW2DTCfg8q820GW8VDhYL7Vc2L1N2PR086WgVcH37ZG1 ) provide the additional security that good cyber security hygiene can’t always cover.

If you believe your site has been compromised, we offer Incident Response services via Wordfence Care (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRsf3pdrrV1-WJV7CgXM3MHWv3hQNlRTW2kvlLS4b7VmGW1J6Bgk4sW6mpW6vBJ244jKzhFW930mXG6xLHjyW7Mq7jM4kpXq-W1VVX1Q1C7b5QW2Pfnt06Xdw4QN8Rs5FVgx2KRW8GjGpM7GB0SwW8Zh2C12s85VMW2V3CS_8GpcTRW84Hjn353g58zVLC4H129wjKNN2Gv8WGzBm5pN7mqCnJWWK6FW7T6SZr8Yjn27W1FR0Gp40sZ3zW9hsNSq1Qt505W8v2xXf3wzZzWN3Y6tG69qDKZW3MYbqq10DqLBW25lfD31hY4sfW4F2tjL33xdyD3gJ11 ) . If you need your site cleaned immediately, Wordfence Response (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRsf3pdrrV1-WJV7CgHHxW1M591K3XLj4WW1PlskJ7qXbnjW2WsyVk2yG2v-W2-MJPf3z9QDMW2bsQyY2rdhrjVnb4tx8j7WrQW2D_yP97sqYSNW92qJC32GPDgcW5fkwcd23R0Y6W5rKVJ38b7DdtW7pl5XR2Nb5z_W3ksrNt3qjtYYW98VwsP1B3yw0W3pb6HR8XDLzVW8GMVDb5G1Z0tVx9bc93y15S8V_VwF76HYj3HW9fx57n92ccdsW6VJY4t4ZKWW4W44Ldkf1-5cdnW5wFYWL4z-3GMW2DTCfg8q820GW8VDhYL7Vc2L1N2PR086WgVcH37ZG1 ) offers the same service with 24/7/365 availability and a 1-hour response time. Both these products include hands-on support in case you need further assistance.

The Full Product Lineup:

wf-stacked-free-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRrZ3pdr7V1-WJV7CgCd6W9c9vKw573dkZW87n6vS1mHsVbW28KbXg78Dg30N3gBtRphrfHfW3hSzl97f8r2lW1scZX8253ZLnW4fD_9Z3jvY95W54K3Zs41-wrCW7SFglG3V5J9wW4bQSMM1bYW8tW5jV5td6z5DStM6gntHtvlJNW6PfqS47t7TLZW7Xt7j720x6S2N4BzPWyhFBl9V6SrDW3J7-9TW6t4V6L48srM6W85Gz6r2Tj420W2dKGL-53V0XFW8LXl0M1_wjBpW2vp1dV67pTnDW3TTW5F4sPCgY3cdN1 )

wf-stacked-premium-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRsf3pdrrV1-WJV7CgVHtW21sC-62YpLk3W2CcT733qMPryW5rzlBC2xVqX-W4GH2f-6zGbnhW37f8-b8zsmYJW5J-zn_347yd5VsB6Jd4QW1c8W4spbzh3-7CjjVr46P442G0CBV8Ckbw74nQFGW4QX7FG75CgT_W6rMdvm32Y1r5W4F3qg14rK6LNW973DBg1SQ8FpW7zyT0D7FBC6JW4tj3Gz3T3jq8W4ycqcS5hlv_3W1MQNyf5fL2sSW3XF5T04XzP21W2Ht-s-5zVW8vW13NJ1b1C2Dc7VrP4P990WjCYW3kX0cy2_yDd8N80X9RR7djlv3f0X1 )

wf-stacked-care-3 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRrZ3pdr7V1-WJV7CgWcyW4WPwm_2cgMrnW7gLKQr3d7G3xW3Rq0G33fp4rHW5RwXgx53Wsf8W8Jx0P53YfyNsW1FJlNy2Kd_yPW21DQSr22zZtMW36g7kW7Z4x_5VZYnSM5CW6BKN7HlvWKStkPZN7-8d5K6y4kgW3B4DfH3tq9n9W8s7CK_7_MFnlW13VjPj5-Z2-7W1vb5Xk6Ky5JkW12lyM427sY6pVtB9_35R6G_HN3FgdSsLLvYjW5HvsnZ4SQMH-W2bSVpy8dVfcvVw0p0c29BtCWN91yYngS7ZNZ3gGb1 )

wf-stacked-response-2 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRsf3pdrrV1-WJV7CgWVsVTvPT92FFPwqW3yB2l53Q0Q7fW56kVVG33rZxlW7vM00b8m6XKRW63307z4Wd28ZW2Bzqc149JVRQN2R_80C2kN_RW8sFBMw6NgRQ4W3cPsKr2jhGQLW5_Wt_-6ZMsQHN3_dKLjp36CrW7b1XNf12nTfLMj5D8K-Rj3HW2hGsM-209914W5dzY4P84d2zpW6dVYDS4Tzx7bW7Ckl0N8SQbbgW7Skb4K4CTl3FW6nbknR7clTGMW76hyWx30kRgqW3cPmRT20g_rFVYpMRS6C-r2rW701_nS3tvYJRW6pKpNm2m3Mfc385T1 )

wf-stacked-intelligence (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRsf3pdrrV1-WJV7CgZ9JW8gCptb4nv_kfW7Xdxvd6fRKZlV_SW1h6lqKm5N3lykxxzCVHYW3L7B1R5y0ckYW2DqbG12PjpJCV_1KJP9hRd3nW4HRhk8365W2STKX2Z5dLd3wW7X9vt13yjwC_W5T1Y235KvDZvW1tftVv47_7SCW1FwyZX5hZvlsW4MH2gg5M5kqDW7x0JDD5zjzz1W4Jv9xc8m6qy9W5cxyb51bTWTTW8981M04xgVgvW1m7kwS77fw_BW6w3pVr3B6xzrW5B7y0s7NZW9NW8v_G-R4frWQJW7BmWrK7W_HXMW3-lk428c2nRV31Vb1 )

logo-defiant (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VWcPQb6jRjvHW6FqMQt56wp2PW2QY3Nh4QRkM7N1vWRrG3pdqSV1-WJV7CgP-PW6L0M7Z8W0sBNW4ptyBL2ZWkWFW6hCfp62QXPP5W35fCc079H1SFW50pcqg5LJ_8GW7YMbD38_sRC4MmwnckdjjRcW4LMwSj2vkvkpN3xBW05D_VZbW8pfWTF3m9lp6W1s8LTn5B8_67N2zrNcvC1yckW5FR5X76MxKZDW83dZ5w5g1NcsW5q4pY-4Qr2H3W7LyZPg7cXTbnW93S6yb5NMVRWW6RnQv98nkNJHW1bFF7q8dScgTW7KPqZF3qkdgn39-P1 )

Defiant, Inc., 1700 Westlake Ave N STE 200, Seattle, WA 98109, United States

Unsubscribe (https://email.wordfence.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcNQW60ZY_48S5Q2LV25w1L7R0lWfW5-MS7P6c5KkCN6QmF0t1yf0NW31KmKc6Cv5q8W8SrMNQ1pYvPhdZ9cg4v3&v=3&_hsenc=p2ANqtz-9BG1kNNn_9QcmZ1106BdeEVde87C1jatoRtuUMsQ4f1IDrgFbyCAu-WQo6IxgQnwBWeRAfiJ2YQStiuGuXQOOYSsqXwg&_hsmi=228705944 )

Manage preferences (https://email.wordfence.com/hs/manage-preferences/unsubscribe?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcNQW60ZY_48S5Q2LV25w1L7R0lWfW5-MS7P6c5KkCN6QmF0t1yf0NW31KmKc6Cv5q8W8SrMNQ1pYvPhdZ9cg4v3&v=3&_hsenc=p2ANqtz-9BG1kNNn_9QcmZ1106BdeEVde87C1jatoRtuUMsQ4f1IDrgFbyCAu-WQo6IxgQnwBWeRAfiJ2YQStiuGuXQOOYSsqXwg&_hsmi=228705944 )

You're receiving this email because you signed up to the Wordfence WordPress security mailing list.
Received on Thu Oct 06 2022 - 21:59:11 CEST

This archive was generated by hypermail 2.3.0 : Thu Oct 06 2022 - 22:02:23 CEST