Get Help Now
CONTACT US

From the Cybersecurity News Desk

Concerning Browser Vulnerability Lives Despite Recent Fixes

Google just released Chrome 105 which contains fixes for 24 existing vulnerabilities in the web browser.  However, one significant flaw has yet to be addressed.  When browsing a malicious website with Chrome, threat actors have the ability to over-write your system’s clipboard without your permission or even knowledge, thus poisoning the contents.

It is common practice for computer users to employ the methods of cutting & pasting and copying & pasting as a part of day-to-day digital activities.  Pasting a website into a browser address bar, for example, is fine if the contents of what you are pasting is what you’ve intentionally copied from another source.  However, if your clipboard has been overwritten without your knowledge, you could inadvertently paste malicious content.

Although no known malicious attacks have used this particular Chrome vulnerability, threat actors are constantly looking for new ways to harm our digital lives.  It’s just a matter of time.  Forewarned is forearmed, as they say.

If you would like to test your Chrome browser, visit this Malewarebytes Labs article which provides a safe demonstration of this security flaw as well as additional details.

To ensure safe cutting & pasting or copying & pasting of content, consider using a clipboard manager which gives you visibility over what is on your clipboard.

See How We Can Help!

Fill out this form and we’ll be in touch shortly

    Number of Employees - select one:
    Industry - select one:

    Through our comprehensive approach to cybersecurity, we’ll help ensure your organization is protected against evolving threats like browser vulnerabilities.

    CYBER OPERATIONS

    Be Proactive with Penetration Testing

    We can reveal if there are weaknesses in your systems.

    Vulnerability Assessment

    Identify exploitable vulnerabilities as well as those that can be taken advantage of regardless of network perimeter.

    Cybersecurity Incidents Happen

    Plan, prevent, and mitigate with our incident response team.

    View expert analysis on the latest threats 

    Finding qualified security professionals can be difficult and costly.

    Ours are the best. Put them to work for you.

    Contact Us
    Privacy Settings
    We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
    Youtube
    Consent to display content from - Youtube
    Vimeo
    Consent to display content from - Vimeo
    Google Maps
    Consent to display content from - Google
    Spotify
    Consent to display content from - Spotify
    Sound Cloud
    Consent to display content from - Sound
    Contact Us