.:: CHASLES CORP. ::.
  • Bienvenue!
  • Se connecter
  • S'enregistrer
  • Newsletter
  • Contact
  • EN
  • FR
  • EN
  • FR
  • sales@chaslescorp.com
  • +237 695 640 333 / 651 448 283
  • Chaslescorp
  • Rue Joffre, Akwa, Douala
.:: CHASLES CORP. ::.
  • A propos de nous
    • Notre histoire
    • Notre equipe
    • Infos
    • Rejoignez-nous
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit et conformité
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
RÉSERVEZ UNE DÉMO/POV MAINTENANT

Réservez une DEMO / POV

[super_form id=”4788″]

  • Vulnerabilities in Microsoft’s PlayReady DRM Could Enable Illegal Movie Downloads From Streaming Services
  • ArcaneDoor Hackers Exploit Cisco Zero-Days to Breach Government Networks
  • Report: Security Leaders Braced for Daily AI-Driven Attacks by Year-End
  • Feds Accuse Founders of Cryptocurrency Mixer of ‘Large-Scale Money Laundering’
  • Maximum Severity Flowmon Bug has a Public Exploit, Patch Now
Academy
  • A propos de nous
    • Notre histoire
    • Notre equipe
    • Infos
    • Rejoignez-nous
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit et conformité
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
RÉSERVEZ UNE DÉMO/POV MAINTENANT

Réservez une DEMO / POV

[super_form id=”4788″]

  • Vulnerabilities in Microsoft’s PlayReady DRM Could Enable Illegal Movie Downloads From Streaming Services
  • ArcaneDoor Hackers Exploit Cisco Zero-Days to Breach Government Networks
  • Report: Security Leaders Braced for Daily AI-Driven Attacks by Year-End
  • Feds Accuse Founders of Cryptocurrency Mixer of ‘Large-Scale Money Laundering’
  • Maximum Severity Flowmon Bug has a Public Exploit, Patch Now
Academy
Cyware Feed
pikabot-distributed-via-malicious-search-ads
_ 16 décembre 2023_ _ 0 Comments

PikaBot Distributed via Malicious Search Ads

Threat actors are bypassing Google’s security measures and using fingerprinting techniques to ensure successful execution of malicious downloads, pointing to a potential “malvertising as a service” model.

LIRE PLUS ♥7
Cyware Feed
new-nkabuse-malware-exploits-nkn-blockchain-tech-for-ddos-attacks
_ 16 décembre 2023_ _ 0 Comments

New NKAbuse Malware Exploits NKN Blockchain Tech for DDoS Attacks

Researchers have discovered a new multi-platform threat called NKAbuse that uses a decentralized network connectivity protocol called NKN to communicate. NKAbuse leverages blockchain technology to conduct DDoS attacks and function as an implant.

LIRE PLUS ♥11
Cyware Feed
researchers-detect-undocumented-8220-gang-activities
_ 16 décembre 2023_ _ 0 Comments

Researchers Detect Undocumented 8220 Gang Activities

The 8220 gang, a Chinese-origin threat actor, continues to target Windows and Linux web servers with cryptojacking malware using evolving tactics and known vulnerabilities.

LIRE PLUS ♥11
Cyware Feed
ledger-dapp-supply-chain-attack-steals-$600k-from-crypto-wallets
_ 16 décembre 2023_ _ 0 Comments

Ledger dApp Supply Chain Attack Steals $600K From Crypto Wallets

Ledger users are advised to avoid using web3 dApps following a supply chain attack on the Ledger dApp Connect Kit library, which resulted in the theft of $600,000 worth of crypto and NFTs.

LIRE PLUS ♥10
Cyware Feed
alphv-ransomware-gang-returns,-sorta
_ 16 décembre 2023_ _ 0 Comments

ALPHV Ransomware Gang Returns, Sorta

The ALPHV ransomware gang is facing technical difficulties, with their leak site showing only one victim and negotiation links not working, potentially leaving them without payment.

LIRE PLUS ♥10
Cyware Feed
ten-new-android-banking-trojans-targeted-985-bank-apps-in-2023
_ 16 décembre 2023_ _ 0 Comments

Ten New Android Banking Trojans Targeted 985 Bank Apps in 2023

The emergence of ten new Android banking malware families in 2023 highlights the increasing sophistication and capabilities of these trojans, including automated transfer systems, social engineering tactics, and live screen-sharing capabilities.

LIRE PLUS ♥11
Cyware Feed
data-of-over-a-million-users-of-the-crypto-exchange-gokumarket-exposed
_ 16 décembre 2023_ _ 0 Comments

Data of Over a Million Users of the Crypto Exchange GokuMarket Exposed

The centralized crypto exchange GokuMarket, owned by ByteX, left an open instance, exposing sensitive user data, including IP addresses, email addresses, encrypted passwords, and crypto wallet addresses.

LIRE PLUS ♥12
Cyware Feed
new-york-hospitals’-patient-data-impacted-by-cyberattack
_ 15 décembre 2023_ _ 0 Comments

New York Hospitals’ Patient Data Impacted by Cyberattack

The IT network of New York-based health providers, including HealthAlliance Hospital, Margaretville Hospital, and Mountainside Residential Care Center, was breached for nearly two months, resulting in the compromise of patient data.

LIRE PLUS ♥10
Cyware Feed
fcc-updates-data-breach-rules,-with-consumers-in-mind
_ 15 décembre 2023_ _ 0 Comments

FCC Updates Data Breach Rules, With Consumers in Mind

The Federal Communications Commission (FCC) has updated its data breach rules for the first time in 16 years. The new rules expand the definition of a breach and specify who should be notified.

LIRE PLUS ♥8
Cyware Feed
_ 15 décembre 2023_ _ 0 Comments

FBI, CISA, Treasury, and FinCEN Released Joint Advisory on Karakurt Data Extortion Group

Karakurt uses various tactics to steal data and extort victims for ransom. They contact victims’ employees, business partners, and clients to pressure them into paying the ransom.

LIRE PLUS ♥10
  • 1
  • 2
  • 3
  • …
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • …
  • 489
  • 490
  • 491
Articles récents
  • Supporting Women in STEM With SWE: Voting, Advocacy, and More
  • SWE Diverse Podcast Ep 285: Thriving in Engineering While Living With Disabilities
  • 5 Things to Do Right After WE Annual Conference
Catégories
  • Cyware Feed
  • Uncategorized