.:: CHASLES CORP. ::. .:: CHASLES CORP. ::.
  • About Us
    • History
    • Our Team
    • News
    • Join Us
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit and Compliance
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
.:: CHASLES CORP. ::.
  • About Us
    • History
    • Our Team
    • News
    • Join Us
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit and Compliance
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
Cyware Feed
greencharlie-infrastructure-targeting-us-political-entities-with-advanced-phishing-and-malware
_ 2 September 2024_ _ 0 Comments

GreenCharlie Infrastructure Targeting US Political Entities with Advanced Phishing and Malware

GreenCharlie attackers use dynamic DNS providers to register domains for phishing attacks, with deceptive themes like cloud services and document visualization to trick victims into revealing sensitive information or downloading malware payloads.

LEARN MORE ♥9
Cyware Feed
sinon:-open-source-automatic-generative-burn-in-for-windows-deception-hosts
_ 2 September 2024_ _ 0 Comments

Sinon: Open-Source Automatic Generative Burn-in for Windows Deception Hosts

Sinon is an open-source tool designed to automate the burn-in process of Windows-based deception hosts. It simplifies the orchestration of deception hosts at scale by incorporating generative capabilities to introduce diversity and randomness.

LEARN MORE ♥9
Cyware Feed
fake-palo-alto-globalprotect-tool-used-as-lure-to-backdoor-enterprises
_ 2 September 2024_ _ 0 Comments

Fake Palo Alto GlobalProtect Tool Used as Lure to Backdoor Enterprises

A fake Palo Alto GlobalProtect VPN access tool is being used as bait by threat actors targeting Middle Eastern organizations. The malware, disguised as a legitimate tool, can steal data and execute remote commands to infiltrate networks further.

LEARN MORE ♥7
Cyware Feed
nist-releases-new-draft-of-digital-identity-proofing-guidelines
_ 2 September 2024_ _ 0 Comments

NIST Releases New Draft of Digital Identity Proofing Guidelines

The new draft of NIST’s digital identity proofing guidelines includes updates to accommodate passkeys and mobile driver’s licenses, as well as options for identification without using biometrics like facial recognition.

LEARN MORE ♥9
Cyware Feed
cisa-launches-cyber-incident-reporting-portal-to-streamline-breach-disclosure
_ 2 September 2024_ _ 0 Comments

CISA Launches Cyber Incident Reporting Portal To Streamline Breach Disclosure

The CISA has launched a cyber incident reporting portal to make breach disclosure easier. It allows organizations to report cyberattacks, vulnerabilities, and data breaches voluntarily.

LEARN MORE ♥7
Cyware Feed
north-korean-cyberattacks-persist:-developers-targeted-via-npm-packages
_ 2 September 2024_ _ 0 Comments

North Korean Cyberattacks Persist: Developers Targeted via npm Packages

The campaign, known as “Contagious Interview,” tricks developers into downloading fake npm packages or installers. The attackers deploy a Python payload named InvisibleFerret to steal data from cryptocurrency wallets.

LEARN MORE ♥8
Cyware Feed
cyber-threats-that-shaped-the-first-half-of-2024
_ 2 September 2024_ _ 0 Comments

Cyber Threats That Shaped the First Half of 2024

According to a report by Critical Start Cyber Research Unit, the manufacturing industry was the top target for cyber threats in H1 2024, professional services saw a 15% increase in attacks, and healthcare experienced a 180% surge in incidents.

LEARN MORE ♥8
Cyware Feed
rocinante:-the-trojan-horse-that-wanted-to-fly
_ 31 August 2024_ _ 0 Comments

Rocinante: The Trojan Horse That Wanted to Fly

Once installed, the Rocinante malware prompts the victim to grant Accessibility Services and displays phishing screens tailored to different banks to steal personal information.

LEARN MORE ♥10
Cyware Feed
new-snake-keylogger-variant-slithers-into-phishing-campaigns
_ 31 August 2024_ _ 0 Comments

New Snake Keylogger Variant Slithers Into Phishing Campaigns

The attack starts with a phishing email disguised as a fund transfer notification, with an attached Excel file named “swift copy.xls” that triggers the deployment of Snake Keylogger on the victim’s computer upon opening.

LEARN MORE ♥9
Cyware Feed
fbi:-ransomhub-ransomware-breached-210-victims-since-february-2024
_ 31 August 2024_ _ 0 Comments

FBI: RansomHub Ransomware Breached 210 Victims Since February 2024

The ransomware operation focuses on data theft extortion rather than encrypting files, with victims facing the threat of stolen data being leaked or sold if negotiations fail.

LEARN MORE ♥9
  • 1
  • 2
  • 3
  • …
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • …
  • 486
  • 487
  • 488
Recent Posts
  • Supporting Women in STEM With SWE: Voting, Advocacy, and More
  • SWE Diverse Podcast Ep 285: Thriving in Engineering While Living With Disabilities
  • 5 Things to Do Right After WE Annual Conference
Categories
  • Cyware Feed
  • Uncategorized