Introducing Blaze. Turn your site content into clean, compelling ads that run across millions of sites on WordPress.com and Tumblr.
WORTPRESSE
A New Way to Ignite Your Growth on WordPress.com – WordPress.com News

At WordPress.com we’re always looking for ways to make building and running your web site simpler and more impactful (and more fun!).
One of the biggest challenges for any site owner is finding your readers, fans, customers, or subscribers. Until now, promoting your WordPress.com web site required multiple tools, online accounts, professional design and marketing skills, and – yes – lots of money.
That’s why we’re excited to announce Blaze, a new tool allowing anyone with a WordPress blog to advertise on WordPress.com and Tumblr in just a few clicks. How? By turning your site content into clean, compelling ads that run across our millions-strong network of blogs.
How Blaze works
If your website is hosted on WordPress.com, then head to wordpress.com/advertising and select your website — you’ll see a list of recent posts and pages you can promote. If your WordPress site isn’t hosted on WordPress.com, you can take advantage of Blaze through the Jetpack plugin.
Alternatively, when viewing the post or page list in your WordPress.com dashboard, click the ellipses (three dots) next to any individual post/page to bring up a new menu, then click “Promote with Blaze.”
Now you’ll be in the Blaze Campaign Wizard.
Once your ad is running, you can check how it’s doing in the “Campaigns” tab of the advertising page.
Our campaigns are billed weekly based on how many times your ad is shown, so you’ll only ever pay for what you signed up for. As always, you can find even more details about this tool on our support page.
This feature is currently only available to users with “English” set as their primary language, but we’re working hard on bringing it to other languages as well.
Let us know what you think about Blaze!
We’re excited to launch this powerful new feature, and we’re eager to get feedback. If you have any questions about it, challenges while using it, or ideas to make it better, please share them with our team. We’ll make sure a real person reads through all of the feedback, and we’ll be working tirelessly to make sure that this tool is something valuable for you.

Join 96,844,605 other subscribers
WORTPRESSE
Researchers Spot a Different Kind of Magecart Card-Skimming Campaign

An attacker under the Magecart umbrella has infected an unknown number of e-commerce sites in the US, UK, and five other countries with malware for skimming credit card numbers and personally identifiable information (PII) belonging to people making purchases on these sites. But in a new wrinkle, the threat actor is also using the same sites as hosts for delivering the card-skimming malware to other target sites.
Researchers from Akamai who spotted the ongoing campaign note that this not only makes the campaign different from prior Magecart activity, but it’s also much more dangerous.
They assess that the cyberattacks have been going on for at least one month and have potentially affected tens of thousands of people already. Akamai said that in addition to the US and UK, it has spotted websites affected by the campaign in Brazil, Spain, Estonia, Australia, and Peru.
Payment Card Theft & More: A Double Compromise
Magecart is a loose collective of cybercriminal groups involved in online payment card-skimming attacks. Over the past several years, these groups have injected their namesake card skimmers into tens of thousands of sites worldwide — including sites such as TicketMaster Und British Airways —and stolen millions of credit cards from them, which they have then monetized in different ways.
Akamai counted Magecart attacks on 9,200 e-commerce sites last year, of which 2,468 remained infected as of the end of 2022.
The typical modus operandi for these groups has been to surreptitiously inject malicious code into legitimate e-commerce sites — or into third-party components such as trackers and shopping carts — that the sites use, by exploiting known vulnerabilities. When users enter credit card information and other sensitive data on the checkout page of compromised websites, the skimmers silently intercept the data and send it to a remote server. So far, attackers have primarily targeted sites running the open source Magento e-commerce platform in Magecart attacks.
The latest campaign is slightly different in that the attacker is not just injecting a Magecart card skimmer into target sites but is also hijacking many of them to distribute malicious code.
“One of the primary advantages of utilizing legitimate website domains is the inherent trust that these domains have built over time,” according to the Akamai analysis. “Security services and domain scoring systems typically assign higher trust levels to domains with a positive track record and a history of legitimate use. As a result, malicious activities conducted under these domains have an increased chance of going undetected or being treated as benign by automated security systems.”
In addition, the attacker behind the latest operation has also been attacking sites running not just Magento but other software, such as WooCommerce, Shopify, and WordPress.
A Different Approach, Same Outcome
“One of the most notable parts of the campaign is the way the attackers set up their infrastructure to conduct the web skimming campaign,” Akamai researcher Roman Lvovsky wrote in the blog post. “Before the campaign can start in earnest, the attackers will seek vulnerable websites to act as ‘hosts’ for the malicious code that is used later on to create the web skimming attack.”
Akamai’s analysis of the campaign showed the attacker using multiple tricks to obfuscate the malicious activity. For example, instead of injecting the skimmer directly into a target website, Akamai found the attacker injecting a small JavaScript code snippet into its webpages that then fetched the malicious skimmer from a host website.
The attacker designed the JavaScript loader to look like Google Tag Manager, Facebook Pixel tracking code, and other legitimate third-party services, so it becomes hard to spot. The operator of the ongoing Magecart-like campaign also has been using Base64 encoding to obfuscate the URLs of compromised websites hosting the skimmer.
“The process of exfiltrating the stolen data is executed through a straightforward HTTP request, which is initiated by creating an IMG tag within the skimmer code,” Lvovsky wrote. “The stolen data is then appended to the request as query parameters, encoded as a Base64 string.”
As a sophisticated detail, Akamai also found code in the skimmer malware that ensured it did not steal the same credit card and personal information twice.
WORTPRESSE
Einführung des Jetpack AI Assistant in WordPress.com – WordPress.com News

Your rocketship to more powerful content creation.
Imagine being able to quickly generate all types of content—headlines, entire posts, even translations—with the click of a button. Imagine significantly reducing your effort and time spent staring at a blank screen.
Say hello to Jetpack AI Assistant.
Jetpack AI Assistant is seamlessly integrated as a block within the WordPress.com editor. (If your WordPress site is hosted elsewhere, the AI Assistant is also available through the Jetpack plugin.) This powerful new tool is still in the experimental phase, but here’s just a sampling of what it can already help you do.
5 ways you can make writing a breeze with Jetpack AI Assistant
Create customized content
Jetpack AI Assistant utilizes a conversational system so that you can “chat” with it in natural language. Enter a prompt, such as “Write a list of Tokyo’s must-visit destinations,” and watch as the Assistant crafts an engaging piece of content. Compelling blog posts, detailed pages, structured lists, and comprehensive tables can be created in seconds.
Perfect your spelling and grammar on the fly
Ensure your content always reflects professional standards with Jetpack AI Assistant’s spelling and grammar correction features.
Adjust your tone to match your audience
Whether you’re aiming for formal or conversational, Jetpack AI Assistant can adjust the tone of your content to your goals and audience makeup.
Find that perfect creative title
Struggling to find a good title that will really capture your audience’s attention? It can be the hardest part of writing a post! Jetpack AI Assistant has you covered by reading the text and then creating suitable and compelling headlines.
Translate your writing with a single click
The Jetpack AI Assistant can translate your text into numerous languages, allowing you to effortlessly reach across locales and cultures.
And that’s just the start of what Jetpack AI Assistant can do.
Can this really be free?
Yes, it can! For a limited time, Jetpack AI Assistant is free to use for all WordPress.com customers.
Activate the block with the Inserter or the “/” command shortcut. (If you didn’t know, here’s a fun tip: Hit the “/” button while in the post or page editor and type the name of the block you’re looking for. In this case, it would be “AI.”)
Your rocketship to seamless content creation
This is just the beginning! We’re working to expand Jetpack AI Assistant’s capabilities, so stay tuned for even more exciting features in the coming weeks.
Try the AI Assistant today and discover an even more streamlined creative process in WordPress.com.
WORTPRESSE
So akzeptieren Sie Venmo in WordPress

There are a couple of situations in which you may want to have your WordPress accept Venmo. The most obvious one is if you want to add it as a payment method in your WooCommerce shop. In addition to credit and debit cards, you should always consider offering other payment methods to accommodate the maximum possible number of users. Most commonly, WordPress merchants add a PayPal button since this is a widely popular payment method. Adding Stripe is another great way to increase your shop conversions. For freelancers, there are a number of PayPal alternatives to use in case you don’t want to use this particular method. By adding Venmo to this roster you’re allowing even more users to complete purchases through your shop and this can only be beneficial for your business bottom line.
Another situation in which you may want to add Venmo to WordPress is if you want to set up some form of donation system for your website. This can work for websites selling NFTs, for blogs with partially or completely gatewayed content, and so on. If you have a following and you want to give them a chance to support your work via occasional donations or payments, Venmo can be a great solution.
Generally speaking, adding Venmo is a smart call. However, it’s not for everyone, unfortunately. If you don’t have a considerable US-based visitor demographic, Venmo is probably not for you. Still, it being basically free, you don’t have anything to lose by having your WordPress accept Venmo.
Now, let’s see how you can set it all up. We’ll cover two plugin methods and you will decide which one works better for you.
Note: If your intention is to use Venmo as a way to collect donations, remember that Venmo is now a PayPal company and that if you’re already using PayPal for your donations, for instance using the GiveWP plugin, you can now simply enable Venmo payments as well.
-
SUCHMASCHINENVor 6 Tagen
Google aktualisiert das Richtliniencenter für Shopping-Anzeigen und das Richtliniencenter für kostenlose Einträge
-
SUCHMASCHINENVor 6 Tagen
Google Local Service Ads verschickt massenhaft Hinweise auf Richtlinienverstöße
-
SEOVor 6 Tagen
So nutzen Sie KI zur Verbesserung Ihres SEO-Content-Schreibens [Webinar]
-
SUCHMASCHINENVor 6 Tagen
Google-Suche mit detaillierteren Autovergleichstools
-
SEOVor 6 Tagen
Das Search Relations-Team von Google untersucht die SEO-Auswirkungen von Web3
-
PPCVor 6 Tagen
49 Instagram-Untertitel und vorgefertigte Bilder zum Vatertag
-
FACEBOOKVor 5 Tagen
Wie Facebook heimlich Ihre Daten sammelt, auch wenn Sie sich nicht angemeldet haben
-
AFFILIATE-MARKETINGVor 7 Tagen
Wie Tony Hill seine Website auf 8 Millionen monatliche Seitenaufrufe steigerte, nachdem er die Hälfte seines Traffics durch ein Google-Update verloren hatte