.:: CHASLES CORP. ::.
  • Bienvenue!
  • Se connecter
  • S'enregistrer
  • Newsletter
  • Contact
  • EN
  • FR
  • EN
  • FR
  • sales@chaslescorp.com
  • +237 695 640 333 / 651 448 283
  • Chaslescorp
  • Rue Joffre, Akwa, Douala
.:: CHASLES CORP. ::.
  • A propos de nous
    • Notre histoire
    • Notre equipe
    • Infos
    • Rejoignez-nous
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit et conformité
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
RÉSERVEZ UNE DÉMO/POV MAINTENANT

Réservez une DEMO / POV

[super_form id=”4788″]

  • Cyber Insurers Pledge to Help Reduce Ransom Payments
  • Why Tokens are Like Gold for Opportunistic Threat Actors
  • Google Chrome Emergency Update Fixes Sixth Zero-Day Exploited in 2024
  • US and China to Hold Discussions on AI Risks and Security
  • Cyberthreat Landscape Permanently Altered by Chinese Operations, US Officials Say
Academy
  • A propos de nous
    • Notre histoire
    • Notre equipe
    • Infos
    • Rejoignez-nous
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit et conformité
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
RÉSERVEZ UNE DÉMO/POV MAINTENANT

Réservez une DEMO / POV

[super_form id=”4788″]

  • Cyber Insurers Pledge to Help Reduce Ransom Payments
  • Why Tokens are Like Gold for Opportunistic Threat Actors
  • Google Chrome Emergency Update Fixes Sixth Zero-Day Exploited in 2024
  • US and China to Hold Discussions on AI Risks and Security
  • Cyberthreat Landscape Permanently Altered by Chinese Operations, US Officials Say
Academy
Cyware Feed
update:-loandepot-outage-drags-into-second-week-after-ransomware-attack
_ 19 janvier 2024_ _ 0 Comments

Update: LoanDepot Outage Drags Into Second Week After Ransomware Attack

The mortgage and loan company LoanDepot experienced a suspected ransomware attack, leading to difficulties for customers in making mortgage payments and accessing their online accounts.

LIRE PLUS ♥15
Cyware Feed
polycrypt-runtime-crypter-being-sold-on-cybercrime-forums
_ 19 janvier 2024_ _ 0 Comments

PolyCrypt Runtime Crypter Being Sold on Cybercrime Forums

The underground market for crypters, exemplified by PolyCrypt, facilitates the sale and use of these tools for malicious purposes, highlighting the ongoing challenge of cybercrime.

LIRE PLUS ♥14
Cyware Feed
update:-vans,-supreme-owner-vf-corp-says-hackers-stole-35-million-customers’-personal-data
_ 19 janvier 2024_ _ 0 Comments

Update: Vans, Supreme Owner VF Corp Says Hackers Stole 35 Million Customers’ Personal Data

The clothing company has not specified the type of data stolen but assured that Social Security numbers, bank account information, and payment card details were not retained.

LIRE PLUS ♥17
Cyware Feed
report:-illicit-cryptocurrency-flows-drop-39%-in-2023
_ 19 janvier 2024_ _ 0 Comments

Report: Illicit Cryptocurrency Flows Drop 39% in 2023

In 2023, the flow of cryptocurrency into illicit addresses decreased by nearly 39% compared to the previous year, with sanctioned entities accounting for the majority of activity, according to Chainalysis.

LIRE PLUS ♥14
Cyware Feed
experts-warn-of-macos-backdoor-hidden-in-pirated-versions-of-popular-software
_ 19 janvier 2024_ _ 0 Comments

Experts Warn of macOS Backdoor Hidden in Pirated Versions of Popular Software

These applications are found on Chinese pirating websites and contain modified disk image files that download and execute multiple payloads to compromise the victim’s machine.

LIRE PLUS ♥15
Cyware Feed
adversaries-exploit-trends,-target-popular-genai-apps
_ 19 janvier 2024_ _ 0 Comments

Adversaries Exploit Trends, Target Popular GenAI Apps

Enterprise employees are increasingly accessing generative AI applications, posing a risk of exposing sensitive data, making it crucial for organizations to implement advanced data security measures.

LIRE PLUS ♥15
Cyware Feed
cybercriminals-leverage-teamviewer-to-breach-networks-in-new-ransomware-attacks
_ 19 janvier 2024_ _ 0 Comments

Cybercriminals Leverage TeamViewer to Breach Networks in New Ransomware Attacks

Ransomware actors are exploiting TeamViewer to gain access to organization endpoints and attempt to deploy ransomware, highlighting the importance of maintaining strong security practices and using the latest software versions.

LIRE PLUS ♥16
Cyware Feed
aha-warns-of-rise-in-scams-targeting-it-help-desks-for-payment-fraud
_ 19 janvier 2024_ _ 0 Comments

AHA Warns of Rise in Scams Targeting IT Help Desks for Payment Fraud

The AHA recommends strict IT help desk security protocols and immediate notification to financial institutions and the FBI to mitigate the risk of falling victim to these schemes.

LIRE PLUS ♥15
Cyware Feed
npm-trojan-bypasses-uac,-installs-anydesk-with-“oscompatible”-package
_ 19 janvier 2024_ _ 0 Comments

NPM Trojan Bypasses UAC, Installs AnyDesk with “Oscompatible” Package

In a recent incident, a malicious package called “oscompatible” was uploaded to the npm registry. The package was found to contain a sophisticated remote access trojan for Windows machines.

LIRE PLUS ♥15
Cyware Feed
ta866-returns-with-a-large-email-campaign
_ 18 janvier 2024_ _ 0 Comments

TA866 Returns with a Large Email Campaign

The new campaign by TA866 involved a large volume of emails with attached PDFs containing OneDrive URLs that initiated a multi-step infection chain leading to malware payload.

LIRE PLUS ♥22
  • 1
  • 2
  • 3
  • …
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • …
  • 489
  • 490
  • 491
Articles récents
  • Supporting Women in STEM With SWE: Voting, Advocacy, and More
  • SWE Diverse Podcast Ep 285: Thriving in Engineering While Living With Disabilities
  • 5 Things to Do Right After WE Annual Conference
Catégories
  • Cyware Feed
  • Uncategorized