Author Archives: Graham

Unpatched Android App with 1 Billion Downloads Threatens Spying, Malware

Would be attackers are able to exploit SHAREit permissions to execute malicious code through vulnerabilities that remain unpatched three months after application owners were notified of the vulnerabilities. To make it worse its an Android app that has been downloaded over 1 billion times and is rife for exploitation that can let hackers hijack features […]

Zoom increases its security controls

Yay, Finally Removing Disruptive Participants is here. Under the Security icon, hosts and co-hosts can now temporarily pause their meetings and remove disruptive participants according to a Monday Zoom blog post. “By clicking ‘Suspend Participant Activities, all video, audio, in-meeting chat, annotation, screen-sharing and recording during that time will stop, and Breakout Rooms will end,” the […]

WordPress Plugin Flaws Are Exploitable

Vulnerabilities in several WordPress plugins have been exposed. Updates are available to address flaws in the following plugins – Duplicator, Flexible Checkout Fields for WooCommerce, Profile Builder, ThemeGrill Demo Importer, Async JavaScript, 10Web Map Builder for Google Maps, and Modern Events Calendar Lite plugins. Attackers have also been exploiting a vulnerability in ThemeREX Addons; there […]

KnowBe4 Named a Leader in The Forrester Wave™ for Security Awareness and Training Solutions

We are excited to announce that Forrester Research has named KnowBe4 as a Leader in The Forrester Wave™: Security Awareness and Training Solutions, Q1 2020 based on our scores in the strategy, market presence, and current offering categories. We received the highest scores possible in 17 out of 23 evaluation criteria, including learner content and go-to-market approach. […]

Barbara Corcoran is missing nearly $400,000 Wednesday morning after her office was victimized by email scammers

“Shark Tank” star ( an American business reality television series ) Barbara Corcoran is missing nearly 400,000 Wednesday morning after her office was victimized by email scammers who used a tiny typo to gain the upper hand. The scam started last week when an email chain was forwarded to Barbara’s bookkeeper, a woman named Christine. […]

Attack Anatomy – Session Hijacking

In session hijacking, the phisher exploits the web session control mechanism to steal information from the user. In a simple session hacking procedure known as session sniffing, the phisher can use a sniffer to intercept relevant information so that he or she can access the Web server illegally. By scanning your website we can detect pages […]