.:: CHASLES CORP. ::. .:: CHASLES CORP. ::.
  • About Us
    • History
    • Our Team
    • News
    • Join Us
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit and Compliance
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
.:: CHASLES CORP. ::.
  • About Us
    • History
    • Our Team
    • News
    • Join Us
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit and Compliance
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
Cyware Feed
leveraging-ancient-tactics-for-modern-malware
_ 23 August 2024_ _ 0 Comments

Leveraging Ancient Tactics for Modern Malware

The HYAS Threat Intelligence team has detected threat actors using Steam for malicious activities, like hosting C2 domain addresses and exploiting user accounts. One actor used a Substitution Cipher to hide C2 domains.

LEARN MORE ♥9
Cyware Feed
microsoft-patches-critical-copilot-studio-vulnerability-exposing-sensitive-data
_ 23 August 2024_ _ 0 Comments

Microsoft Patches Critical Copilot Studio Vulnerability Exposing Sensitive Data

The flaw, tracked as CVE-2024-38206, allows an authenticated attacker to bypass SSRF protection and leak information over a network. A researcher at Tenable discovered the vulnerability, which exploits Copilot’s ability to make external web requests.

LEARN MORE ♥8
Cyware Feed
poc-exploit-released-for-rce-0-day-cve-2024-41992-in-arcadyan-fmimg51ax000j-model
_ 23 August 2024_ _ 0 Comments

PoC Exploit Released for RCE 0-day CVE-2024-41992 in Arcadyan FMIMG51AX000J Model

A PoC exploit has been released for a critical vulnerability (CVE-2024-41992) found in the Arcadyan FMIMG51AX000J model, as well as other devices using the same firmware version.

LEARN MORE ♥11
Cyware Feed
fraudulent-slack-ad-shows-malvertiser’s-patience-and-skills
_ 23 August 2024_ _ 0 Comments

Fraudulent Slack Ad Shows Malvertiser’s Patience and Skills

The suspicious ad for Slack appeared legitimate but was likely malicious. Clicking on it would initially redirect to slack.com. However, after several days, it started redirecting to a click tracker, showing signs of a potentially malicious campaign.

LEARN MORE ♥10
Cyware Feed
new-opportunistic-campaign-exploit-log4j-vulnerability-for-cryptomining-and-system-compromise
_ 23 August 2024_ _ 0 Comments

New Opportunistic Campaign Exploit Log4j Vulnerability for Cryptomining and System Compromise

This latest Log4j exploitation-based attack uses obfuscated LDAP requests to evade detection and executes malicious scripts, establishing persistence and exfiltrating data through encrypted channels.

LEARN MORE ♥10
Cyware Feed
hardware-backdoor-in-millions-of-shanghai-fudan-microelectronics-rfid-cards-allows-cloning
_ 23 August 2024_ _ 0 Comments

Hardware Backdoor in Millions of Shanghai Fudan Microelectronics RFID Cards Allows Cloning

Researchers from Quarkslab found a hardware backdoor in the FM11RF08S RFID cards manufactured by Shanghai Fudan Microelectronics, enabling attackers to compromise user-defined keys within minutes.

LEARN MORE ♥9
Cyware Feed
cybercriminals-exploit-file-sharing-services-to-advance-phishing-attacks
_ 23 August 2024_ _ 0 Comments

Cybercriminals Exploit File Sharing Services to Advance Phishing Attacks

In these file-sharing phishing attacks, cybercriminals impersonate colleagues or trusted services to trick targets into clicking on malicious links that can lead to data theft or malware infection.

LEARN MORE ♥9
Cyware Feed
ingress-nginx-annotation-validation-bypass-flaw-(cve-2024-7646)-allows-command-injection
_ 22 August 2024_ _ 0 Comments

Ingress-NGINX Annotation Validation Bypass Flaw (CVE-2024-7646) Allows Command Injection

The vulnerability allows attackers to inject malicious content into annotations, leading to arbitrary command injection and potential access to controller credentials, enabling full access to cluster secrets.

LEARN MORE ♥11
Cyware Feed
google-fixes-ninth-chrome-zero-day-exploited-in-attacks-this-year
_ 22 August 2024_ _ 0 Comments

Google Fixes Ninth Chrome Zero-Day Exploited in Attacks This Year

Google released an emergency security update to fix the ninth zero-day vulnerability exploited in attacks this year. The vulnerability, known as CVE-2024-7971, involves a type confusion weakness in Chrome’s V8 JavaScript engine.

LEARN MORE ♥11
Cyware Feed
critical-flaw-in-litespeed-cache-plugin-actively-exploited:-over-30,000-attacks-blocked-in-24-hours
_ 22 August 2024_ _ 0 Comments

Critical Flaw in LiteSpeed Cache Plugin Actively Exploited: Over 30,000 Attacks Blocked in 24 Hours

The widely used LiteSpeed Cache plugin for WordPress is being actively exploited through a critical security vulnerability, CVE-2024-28000, with over 30,000 attack attempts blocked in just 24 hours.

LEARN MORE ♥10
  • 1
  • 2
  • 3
  • …
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • …
  • 486
  • 487
  • 488
Recent Posts
  • Supporting Women in STEM With SWE: Voting, Advocacy, and More
  • SWE Diverse Podcast Ep 285: Thriving in Engineering While Living With Disabilities
  • 5 Things to Do Right After WE Annual Conference
Categories
  • Cyware Feed
  • Uncategorized