We're cutting over to a new website. Things may briefly be a little janky. Bear with us...

Content Paint

Cleo

1

Cleo file transfer software being exploited at scale as patch fails

Attackers are not just exfiltrating files but establishing persistence on endpoints and have been “observed enumerating potential Active Directory assets with domain reconnaissance tools"

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.