A malicious credit card skimmer malware has been discovered tampering with WordPress databases to collect payment details. It uses JavaScript to manipulate offending data, injecting a hidden form into webstore checkout pages, enabling it to steal user information in real time, undetected. Cybersecurity firm Sucuri advised frequent updates, regular patches and increased safeguards such as two-factor authentication to counter such attacks.

Nearly 250,000 Records From Tax Credit Consulting Agency Exposed
Summarize this content to a maximum of 60 words: Research has uncovered an unencrypted, non-password-protected database containing 245,949 records.