.:: CHASLES CORP. ::. .:: CHASLES CORP. ::.
  • A propos de nous
    • Notre histoire
    • Notre equipe
    • Infos
    • Rejoignez-nous
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit et conformité
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
.:: CHASLES CORP. ::.
  • A propos de nous
    • Notre histoire
    • Notre equipe
    • Infos
    • Rejoignez-nous
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit et conformité
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
Cyware Feed
threat-actors-announced-doubleface-ransomware,-claims-fully-undetectable
_ 8 août 2024_ _ 0 Comments

Threat Actors Announced Doubleface Ransomware, Claims Fully Undetectable

Threat actors have introduced Doubleface ransomware, claiming it to be fully undetectable by major antivirus software. The ransomware utilizes a unique algorithm with AES-128 and RSA-4096 encryption, making decryption difficult without the right key.

LIRE PLUS ♥10
Cyware Feed
cyber-training-organization-pledges-$15-million-in-education-programs
_ 8 août 2024_ _ 0 Comments

Cyber Training Organization Pledges $15 Million in Education Programs

EC-Council, a cyber certification organization, has pledged $15 million in scholarships to support over 50,000 students in cybersecurity programs. The goal is to help students earn industry credentials and enhance their cybersecurity skills.

LIRE PLUS ♥11
Cyware Feed
north-korean-hackers-leverage-malicious-npm-packages-for-initial-access
_ 8 août 2024_ _ 0 Comments

North Korean Hackers Leverage Malicious NPM Packages for Initial Access

North Korean hackers, identified as Moonstone Sleet, have been distributing malicious JavaScript packages on the npm registry to infect Windows systems. The two packages, harthat-api and harthat-hash, were uploaded on July 7, 2024.

LIRE PLUS ♥11
Cyware Feed
abnormal-security-raises-$250m-on-$5.1b-valuation-to-enhance-ai-driven-cyber-protection
_ 8 août 2024_ _ 0 Comments

Abnormal Security Raises $250M on $5.1B Valuation to Enhance AI-Driven Cyber Protection

Abnormal Security, an AI-driven cybersecurity company, has raised $250 million in funding, valuing the company at $5.1 billion. The funding will support their mission of using AI to protect against cybercrime by understanding human behavior.

LIRE PLUS ♥11
Cyware Feed
chameleon-malware-now-targeting-employees-masquerading-as-a-crm-app
_ 8 août 2024_ _ 0 Comments

Chameleon Malware Now Targeting Employees Masquerading as a CRM app

Researchers have revealed a new tactic used by threat actors behind the Chameleon Android banking trojan, targeting Canadian users with a disguised Customer Relationship Management (CRM) app.

LIRE PLUS ♥11
Cyware Feed
replacement-for-action-fraud,-uk’s-cybercrime-reporting-service,-delayed-again-until-2025
_ 8 août 2024_ _ 0 Comments

Replacement for Action Fraud, UK’s Cybercrime Reporting Service, Delayed Again Until 2025

The new service, known as the Fraud and Cyber Crime Reporting and Analysis System (FCCRAS), will enhance the reporting process by allowing users to upload additional information like metadata, screenshots, and images.

LIRE PLUS ♥11
Cyware Feed
attackers-use-multiple-techniques-to-bypass-reputation-based-security
_ 7 août 2024_ _ 0 Comments

Attackers Use Multiple Techniques to Bypass Reputation-Based Security

Attackers have developed multiple techniques to bypass reputation-based security controls like Windows Smart App Control, allowing them initial access to environments without triggering alerts.

LIRE PLUS ♥9
Cyware Feed
bloody-wolf-strikes-organizations-in-kazakhstan-with-strrat-commercial-malware
_ 7 août 2024_ _ 0 Comments

Bloody Wolf Strikes Organizations in Kazakhstan with STRRAT Commercial Malware

The STRRAT malware, sold for $80, allows attackers to take control of computers and steal data. Attackers use phishing emails pretending to be from government agencies to trick victims into downloading malicious files.

LIRE PLUS ♥11
Cyware Feed
sneaky-snakekeylogger-slithers-into-windows-email-inboxes
_ 7 août 2024_ _ 0 Comments

Sneaky SnakeKeylogger Slithers Into Windows Email Inboxes

SnakeKeylogger, also known as KrakenKeylogger, is a malicious software targeting Windows users. It logs keystrokes, steals credentials, and takes screenshots, allowing cybercriminals to capture sensitive information.

LIRE PLUS ♥12
Cyware Feed
north-korean-hackers-exploit-vpn-update-flaw-to-install-malware
_ 7 août 2024_ _ 0 Comments

North Korean Hackers Exploit VPN Update Flaw to Install Malware

North Korean hackers exploited a VPN software update flaw to install malware and breach networks, as warned by South Korea’s National Cyber Security Center. The threat groups involved in these activities are Kimsuky (APT43) and Andariel (APT45).

LIRE PLUS ♥13
  • 1
  • 2
  • 3
  • …
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • …
  • 486
  • 487
  • 488
Articles récents
  • Supporting Women in STEM With SWE: Voting, Advocacy, and More
  • SWE Diverse Podcast Ep 285: Thriving in Engineering While Living With Disabilities
  • 5 Things to Do Right After WE Annual Conference
Catégories
  • Cyware Feed
  • Uncategorized