.:: CHASLES CORP. ::. .:: CHASLES CORP. ::.
  • A propos de nous
    • Notre histoire
    • Notre equipe
    • Infos
    • Rejoignez-nous
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit et conformité
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
.:: CHASLES CORP. ::.
  • A propos de nous
    • Notre histoire
    • Notre equipe
    • Infos
    • Rejoignez-nous
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit et conformité
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
Cyware Feed
greencharlie-infrastructure-targeting-us-political-entities-with-advanced-phishing-and-malware
_ 2 septembre 2024_ _ 0 Comments

GreenCharlie Infrastructure Targeting US Political Entities with Advanced Phishing and Malware

GreenCharlie attackers use dynamic DNS providers to register domains for phishing attacks, with deceptive themes like cloud services and document visualization to trick victims into revealing sensitive information or downloading malware payloads.

LIRE PLUS ♥9
Cyware Feed
sinon:-open-source-automatic-generative-burn-in-for-windows-deception-hosts
_ 2 septembre 2024_ _ 0 Comments

Sinon: Open-Source Automatic Generative Burn-in for Windows Deception Hosts

Sinon is an open-source tool designed to automate the burn-in process of Windows-based deception hosts. It simplifies the orchestration of deception hosts at scale by incorporating generative capabilities to introduce diversity and randomness.

LIRE PLUS ♥9
Cyware Feed
fake-palo-alto-globalprotect-tool-used-as-lure-to-backdoor-enterprises
_ 2 septembre 2024_ _ 0 Comments

Fake Palo Alto GlobalProtect Tool Used as Lure to Backdoor Enterprises

A fake Palo Alto GlobalProtect VPN access tool is being used as bait by threat actors targeting Middle Eastern organizations. The malware, disguised as a legitimate tool, can steal data and execute remote commands to infiltrate networks further.

LIRE PLUS ♥7
Cyware Feed
nist-releases-new-draft-of-digital-identity-proofing-guidelines
_ 2 septembre 2024_ _ 0 Comments

NIST Releases New Draft of Digital Identity Proofing Guidelines

The new draft of NIST’s digital identity proofing guidelines includes updates to accommodate passkeys and mobile driver’s licenses, as well as options for identification without using biometrics like facial recognition.

LIRE PLUS ♥9
Cyware Feed
cisa-launches-cyber-incident-reporting-portal-to-streamline-breach-disclosure
_ 2 septembre 2024_ _ 0 Comments

CISA Launches Cyber Incident Reporting Portal To Streamline Breach Disclosure

The CISA has launched a cyber incident reporting portal to make breach disclosure easier. It allows organizations to report cyberattacks, vulnerabilities, and data breaches voluntarily.

LIRE PLUS ♥7
Cyware Feed
north-korean-cyberattacks-persist:-developers-targeted-via-npm-packages
_ 2 septembre 2024_ _ 0 Comments

North Korean Cyberattacks Persist: Developers Targeted via npm Packages

The campaign, known as “Contagious Interview,” tricks developers into downloading fake npm packages or installers. The attackers deploy a Python payload named InvisibleFerret to steal data from cryptocurrency wallets.

LIRE PLUS ♥8
Cyware Feed
cyber-threats-that-shaped-the-first-half-of-2024
_ 2 septembre 2024_ _ 0 Comments

Cyber Threats That Shaped the First Half of 2024

According to a report by Critical Start Cyber Research Unit, the manufacturing industry was the top target for cyber threats in H1 2024, professional services saw a 15% increase in attacks, and healthcare experienced a 180% surge in incidents.

LIRE PLUS ♥8
Cyware Feed
rocinante:-the-trojan-horse-that-wanted-to-fly
_ 31 août 2024_ _ 0 Comments

Rocinante: The Trojan Horse That Wanted to Fly

Once installed, the Rocinante malware prompts the victim to grant Accessibility Services and displays phishing screens tailored to different banks to steal personal information.

LIRE PLUS ♥10
Cyware Feed
new-snake-keylogger-variant-slithers-into-phishing-campaigns
_ 31 août 2024_ _ 0 Comments

New Snake Keylogger Variant Slithers Into Phishing Campaigns

The attack starts with a phishing email disguised as a fund transfer notification, with an attached Excel file named “swift copy.xls” that triggers the deployment of Snake Keylogger on the victim’s computer upon opening.

LIRE PLUS ♥9
Cyware Feed
fbi:-ransomhub-ransomware-breached-210-victims-since-february-2024
_ 31 août 2024_ _ 0 Comments

FBI: RansomHub Ransomware Breached 210 Victims Since February 2024

The ransomware operation focuses on data theft extortion rather than encrypting files, with victims facing the threat of stolen data being leaked or sold if negotiations fail.

LIRE PLUS ♥9
  • 1
  • 2
  • 3
  • …
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • …
  • 486
  • 487
  • 488
Articles récents
  • Supporting Women in STEM With SWE: Voting, Advocacy, and More
  • SWE Diverse Podcast Ep 285: Thriving in Engineering While Living With Disabilities
  • 5 Things to Do Right After WE Annual Conference
Catégories
  • Cyware Feed
  • Uncategorized