Would be attackers are able to exploit SHAREit permissions to execute malicious code through vulnerabilities that remain unpatched three months after application owners were notified of the vulnerabilities. To make it worse its an Android app that has been downloaded over 1 billion times and is rife for exploitation that can let hackers hijack features […]
Author Archives: Graham
Yay, Finally Removing Disruptive Participants is here. Under the Security icon, hosts and co-hosts can now temporarily pause their meetings and remove disruptive participants according to a Monday Zoom blog post. “By clicking ‘Suspend Participant Activities, all video, audio, in-meeting chat, annotation, screen-sharing and recording during that time will stop, and Breakout Rooms will end,” the […]
I read this simple but very effective article this afternoon. https://www.ncsc.gov.uk/guidance/smart-security-cameras-using-them-safely-in-your-home
Vulnerabilities in several WordPress plugins have been exposed. Updates are available to address flaws in the following plugins – Duplicator, Flexible Checkout Fields for WooCommerce, Profile Builder, ThemeGrill Demo Importer, Async JavaScript, 10Web Map Builder for Google Maps, and Modern Events Calendar Lite plugins. Attackers have also been exploiting a vulnerability in ThemeREX Addons; there […]
04th March 2020 – A vulnerability in the Tomcat AJP protocol can be exploited to read file contents and access source code and configuration files. If the servers allow file uploads, the flaw can also be exploited to remotely execute code. Dubbed GhostCat because is has existed in Tomcat for more than a decade, the […]
We are excited to announce that Forrester Research has named KnowBe4 as a Leader in The Forrester Wave™: Security Awareness and Training Solutions, Q1 2020 based on our scores in the strategy, market presence, and current offering categories. We received the highest scores possible in 17 out of 23 evaluation criteria, including learner content and go-to-market approach. […]
“Shark Tank” star ( an American business reality television series ) Barbara Corcoran is missing nearly 400,000 Wednesday morning after her office was victimized by email scammers who used a tiny typo to gain the upper hand. The scam started last week when an email chain was forwarded to Barbara’s bookkeeper, a woman named Christine. […]
A good example and one we see regularly is CEO fraud where the victim receives an email from what looks like is their boss with the attacker asking for an urgent funds transfers. The scary part is they seem to know when your boss is out of the office! Our partner has a free test […]
Keyloggers refer to malware installed on your computer and used to capture keystrokes from the keyboard. The information is sent to the hacker’s server who will extract passwords and other credentials.
In session hijacking, the phisher exploits the web session control mechanism to steal information from the user. In a simple session hacking procedure known as session sniffing, the phisher can use a sniffer to intercept relevant information so that he or she can access the Web server illegally. By scanning your website we can detect pages […]
- 1
- 2