.:: CHASLES CORP. ::. .:: CHASLES CORP. ::.
  • A propos de nous
    • Notre histoire
    • Notre equipe
    • Infos
    • Rejoignez-nous
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit et conformité
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
.:: CHASLES CORP. ::.
  • A propos de nous
    • Notre histoire
    • Notre equipe
    • Infos
    • Rejoignez-nous
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit et conformité
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
Cyware Feed
threat-actors-using-macropack-to-deploy-brute-ratel,-havoc,-and-phantomcore-payloads
_ 5 septembre 2024_ _ 0 Comments

Threat Actors Using MacroPack to Deploy Brute Ratel, Havoc, and PhantomCore Payloads

Malicious actors potentially utilized the MacroPack red-teaming framework to distribute harmful payloads like Brute Ratel and Havoc tools, as well as a new version of the PhantomCore remote access trojan.

LIRE PLUS ♥7
Cyware Feed
earth-lusca-uses-ktlvdoor-backdoor-for-multiplatform-intrusion
_ 4 septembre 2024_ _ 0 Comments

Earth Lusca Uses KTLVdoor Backdoor for Multiplatform Intrusion

The highly obfuscated KTLVdoor malware has versions for both Microsoft Windows and Linux, allowing attackers to perform tasks like file manipulation, command execution, and remote port scanning.

LIRE PLUS ♥6
Cyware Feed
dutch-privacy-watchdog-fines-clearview-ai-$34-million-for-‘illegal’-database-of-faces
_ 4 septembre 2024_ _ 0 Comments

Dutch Privacy Watchdog Fines Clearview AI $34 Million for ‘Illegal’ Database of Faces

The Dutch Data Protection Authority (Dutch DPA) fined Clearview AI $34 million for the illegal creation of a facial image database. If Clearview AI does not comply, an additional fine of up to $5.5 million will be imposed.

LIRE PLUS ♥6
Cyware Feed
emansrepo-stealer:-multi-vector-attack-chains
_ 4 septembre 2024_ _ 0 Comments

Emansrepo Stealer: Multi-Vector Attack Chains

The Python-based infostealer collects user information, text files, PDF files, browser data, crypto wallets, game platforms, browser extensions, and cookies. The stolen data is sent via email to the attacker.

LIRE PLUS ♥7
Cyware Feed
ransomware-gangs-pummel-southeast-asia
_ 4 septembre 2024_ _ 0 Comments

Ransomware Gangs Pummel Southeast Asia

According to telemetry data from Trend Micro, Ransomware attacks in Southeast Asia are on the rise in 2024, with major incidents in countries like Thailand, Japan, South Korea, Singapore, Taiwan, and Indonesia.

LIRE PLUS ♥7
Cyware Feed
vmware-fixed-a-code-execution-flaw-in-fusion-hypervisor
_ 4 septembre 2024_ _ 0 Comments

VMware Fixed a Code Execution Flaw in Fusion Hypervisor

VMware has patched a high-severity code execution flaw in its Fusion hypervisor. The vulnerability, tracked as CVE-2024-38811, is caused by an insecure environment variable.

LIRE PLUS ♥6
Cyware Feed
complying-with-pci-dss-requirements-by-2025
_ 4 septembre 2024_ _ 0 Comments

Complying with PCI DSS Requirements by 2025

The latest version 4.0.1 of the Payment Card Industry Data Security Standard (PCI DSS) has introduced key changes to address the evolving digital landscape. While some requirements are already in effect, others will come into play by April 2025.

LIRE PLUS ♥7
Cyware Feed
how-ransomware-groups-weaponize-stolen-data
_ 4 septembre 2024_ _ 0 Comments

How Ransomware Groups Weaponize Stolen Data

Ransomware groups are increasingly weaponizing stolen data to pressure victims into paying. They analyze data to maximize damage and create opportunities for extortion, targeting business leaders and employees for blame.

LIRE PLUS ♥6
Cyware Feed
hhs-drops-appeal-of-hospital-web-tracking-decision
_ 4 septembre 2024_ _ 0 Comments

HHS Drops Appeal of Hospital Web Tracking Decision

The Biden administration has dropped its appeal of a court decision that rejected new regulations restricting hospitals’ use of web-tracking tools. A Texas judge ruled the administration’s efforts illegal in June.

LIRE PLUS ♥6
Cyware Feed
damn-vulnerable-uefi:-simulate-real-world-firmware-attacks
_ 4 septembre 2024_ _ 0 Comments

Damn Vulnerable UEFI: Simulate Real-world Firmware Attacks

DVUEFI was created to assist ethical hackers, security researchers, and firmware enthusiasts in beginning their journey into UEFI firmware security by providing examples to explore potential vulnerabilities.

LIRE PLUS ♥4
  • 1
  • 2
  • 3
  • …
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • …
  • 486
  • 487
  • 488
Articles récents
  • Supporting Women in STEM With SWE: Voting, Advocacy, and More
  • SWE Diverse Podcast Ep 285: Thriving in Engineering While Living With Disabilities
  • 5 Things to Do Right After WE Annual Conference
Catégories
  • Cyware Feed
  • Uncategorized