.:: CHASLES CORP. ::. .:: CHASLES CORP. ::.
  • About Us
    • History
    • Our Team
    • News
    • Join Us
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit and Compliance
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
.:: CHASLES CORP. ::.
  • About Us
    • History
    • Our Team
    • News
    • Join Us
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit and Compliance
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
Cyware Feed
china-backed-hackers-hijack-software-updates-to-implant-nspx30-spyware
_ 25 January 2024_ _ 0 Comments

China-backed Hackers Hijack Software Updates to Implant NSPX30 Spyware

A new China-aligned threat actor named Blackwood has been identified, deploying a sophisticated implant named NSPX30 via the update mechanisms of legitimate software to target Chinese and Japanese companies and individuals.

LEARN MORE ♥13
Cyware Feed
how-the-sys:all-loophole-allowed-us-to-penetrate-gke-clusters-in-production
_ 24 January 2024_ _ 0 Comments

How the Sys:All Loophole Allowed Us To Penetrate GKE Clusters in Production

An external threat actor in possession of a Google account could misuse this misconfiguration by using their own Google OAuth 2.0 bearer token to seize control of the cluster for follow-on exploitation.

LEARN MORE ♥15
Cyware Feed
water-services-giant-veolia-north-america-hit-by-ransomware-attack
_ 24 January 2024_ _ 0 Comments

Water Services Giant Veolia North America Hit by Ransomware Attack

The company has discovered a limited number of individuals whose personal information may have been impacted during the breach and is working with a third-party forensics firm to assess the extent of the attack’s impact on its operations and systems.

LEARN MORE ♥13
Cyware Feed
windows-11-kb5034204-update-fixes-bluetooth-audio-issues,-24-bugs
_ 24 January 2024_ _ 0 Comments

Windows 11 KB5034204 Update Fixes Bluetooth Audio Issues, 24 bugs

KB5034204 also fixes an issue caused by a deadlock that prevents search from working on the Start menu for some users and addresses a bug affecting the OpenType font driver, affecting how text renders for third-party applications.

LEARN MORE ♥12
Cyware Feed
gitgot:-github-leveraged-by-cybercriminals-to-store-stolen-data
_ 24 January 2024_ _ 0 Comments

GitGot: GitHub Leveraged by Cybercriminals to Store Stolen Data

It appears that the package author was in the process of building out the malware and adding layers of deception. Fortunately, the package was detected and removed from npm before that could happen.

LEARN MORE ♥15
Cyware Feed
vextrio:-the-uber-of-cybercrime-–-brokering-malware-for-60+-affiliates
_ 24 January 2024_ _ 0 Comments

VexTrio: The Uber of Cybercrime – Brokering Malware for 60+ Affiliates

VexTrio has been attributed to malicious campaigns that use domains generated by a dictionary domain generation algorithm (DDGA) to propagate scams, riskware, spyware, adware, potentially unwanted programs (PUPs), and pornographic content.

LEARN MORE ♥14
Cyware Feed
organizations-invest-more-in-data-protection-but-recover-less
_ 24 January 2024_ _ 0 Comments

Organizations Invest More in Data Protection But Recover Less

While most organizations consider cyber resiliency a foundational aspect of their broader business continuity or disaster recovery (BC/DR) strategy, BC/DR preparedness is not yet “passing” most service-level agreement (SLA) expectations.

LEARN MORE ♥13
Cyware Feed
splunk-fixed-high-severity-flaw-impacting-windows-versions
_ 24 January 2024_ _ 0 Comments

Splunk fixed high-severity flaw impacting Windows versions

Deserialization of untrusted data can allow malicious code to be executed on the system. This is because the serialized data can contain instructions that the application will execute when it deserializes the data.

LEARN MORE ♥15
Cyware Feed
jason’s-deli-says-customer-data-exposed-in-credential-stuffing-attack
_ 24 January 2024_ _ 0 Comments

Jason’s Deli Says Customer Data Exposed in Credential Stuffing Attack

“We do not know the number of accounts that the unauthorized party was able to access, but out of an abundance of caution, we are sending this notice to all potentially affected account holders,” reads the data breach notification from Jason’s Deli.

LEARN MORE ♥13
Cyware Feed
kasseika-ransomware-operators-launch-byovd-attacks
_ 24 January 2024_ _ 0 Comments

Kasseika Ransomware Operators Launch BYOVD Attacks

The ransomware uses targeted phishing techniques for initial access, as well as to gather credentials from one of the employees of its target company. It then uses RATs to gain privileged access and move laterally within its target network.

LEARN MORE ♥14
  • 1
  • 2
  • 3
  • …
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • …
  • 486
  • 487
  • 488
Recent Posts
  • Supporting Women in STEM With SWE: Voting, Advocacy, and More
  • SWE Diverse Podcast Ep 285: Thriving in Engineering While Living With Disabilities
  • 5 Things to Do Right After WE Annual Conference
Categories
  • Cyware Feed
  • Uncategorized