RCE flaw in Cleo software has been Actively Exploited by Threat Actors

RCE flaw in Cleo software has been Actively Exploited by Threat Actors

A new zero-day vulnerability, identified as a remote code execution (RCE) flaw in Cleo software, has been actively exploited in recent data theft campaigns. This flaw, which has been under the radar for some time, is being used by attackers to gain unauthorized access to sensitive systems and steal valuable data. Zero-Day Flaw in Cleo … Read more

QR Codes Pose New Threat to Browser Isolation Security

QR Codes Pose New Threat to Browser Isolation Security

QR codes, a widely-used tool for seamless information sharing, have recently become a vector for bypassing browser isolation systems, raising significant cybersecurity concerns. Security researchers discovered that attackers leverage QR codes to bypass the protective barriers of browser isolation, enabling malicious command-and-control (C2) communication. This development poses risks to both individual users and corporate systems. … Read more

Deloitte Faces Cybersecurity Breach, Sensitive Data at Risk

Deloitte Faces Cybersecurity Breach, Sensitive Data at Risk

In a significant development, Deloitte, one of the world’s largest professional services firms, has fallen victim to a cyberattack, raising alarm bells in the corporate sector. The breach, confirmed by the company, has exposed vulnerabilities within its systems, placing sensitive client information at potential risk. This incident once again underscores the growing sophistication of cybercriminals … Read more