.:: CHASLES CORP. ::.
  • Welcome!
  • Sign In
  • Register
  • Newsletter
  • Contact
  • EN
  • FR
  • EN
  • FR
  • sales@chaslescorp.com
  • +237 695 640 333 / 651 448 283
  • Chaslescorp
  • Rue Joffre, Akwa, Douala
.:: CHASLES CORP. ::.
  • About Us
    • History
    • Our Team
    • News
    • Join Us
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit and Compliance
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
BOOK A DEMO/POV NOW

Book a DEMO / POV

[super_form id=”4788″]

  • Grandoreiro Banking Trojan is Back With Major Updates
  • Addressing the Cybersecurity Vendor Ecosystem Disconnect
  • Kinsing Hacker Group Expands its Cryptoming Botnet Network with More Vulnerability Exploits
  • Kimsuky Hackers Deploy New Linux Backdoor in Attacks on South Korea
  • Tracking the Progression of Earth Hundun’s Cyberespionage Campaign in 2024
Academy
  • About Us
    • History
    • Our Team
    • News
    • Join Us
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit and Compliance
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
BOOK A DEMO/POV NOW

Book a DEMO / POV

[super_form id=”4788″]

  • Grandoreiro Banking Trojan is Back With Major Updates
  • Addressing the Cybersecurity Vendor Ecosystem Disconnect
  • Kinsing Hacker Group Expands its Cryptoming Botnet Network with More Vulnerability Exploits
  • Kimsuky Hackers Deploy New Linux Backdoor in Attacks on South Korea
  • Tracking the Progression of Earth Hundun’s Cyberespionage Campaign in 2024
Academy
Cyware Feed
microsoft-teams-phishing-attack-pushes-darkgate-malware-via-group-chats
_ 31 January 2024_ _ 0 Comments

Microsoft Teams Phishing Attack Pushes DarkGate Malware via Group Chats

The attackers exploit default settings in Teams to send over 1,000 malicious chat invites. Once the attachment is downloaded, the malware connects to a command-and-control server.

LEARN MORE ♥10
Cyware Feed
vulnerabilities-in-lamassu-bitcoin-atms
_ 31 January 2024_ _ 0 Comments

Vulnerabilities in Lamassu Bitcoin ATMs

The attack, IOActive explains, was possible due to a vulnerability in the ATM’s software update mechanism that could allow an attacker to supply their own malicious file and trigger legitimate processes for code execution.

LEARN MORE ♥13
Cyware Feed
rust-payloads-exploiting-ivanti-zero-days-linked-to-sliver-toolkit
_ 31 January 2024_ _ 0 Comments

Rust Payloads Exploiting Ivanti Zero-Days Linked to Sliver Toolkit

The KrustyLoader malware, identified in the analysis, is designed to download and execute a Sliver backdoor written in GoLang, indicating APT-level sophistication in these attacks.

LEARN MORE ♥11
Cyware Feed
great-security-or-great-ux?-both,-please
_ 31 January 2024_ _ 0 Comments

Great Security or Great UX? Both, Please

Security step-ups should only be used for higher-risk scenarios and should be implemented in a user-friendly manner to maintain a balance between security and user experience.

LEARN MORE ♥13
Cyware Feed
fulton-county-cyberattack-brings-down-phones,-court-site-and-tax-systems
_ 31 January 2024_ _ 0 Comments

Fulton County Cyberattack Brings Down Phones, Court Site and Tax Systems

An ongoing cyberattack against Georgia’s Fulton County, which includes parts of Atlanta, has brought some of the government’s systems to a standstill, halting access to court filings, tax processing, and other services.

LEARN MORE ♥13
Cyware Feed
online-ransomware-decryptor-helps-recover-partially-encrypted-files
_ 31 January 2024_ _ 0 Comments

Online Ransomware Decryptor Helps Recover Partially Encrypted Files

White Phoenix attempts to recover data through automated restoration methods and may help restore valuable files for ransomware victims, providing a potential option for those affected by certain ransomware strains.

LEARN MORE ♥9
Cyware Feed
alpha-ransomware-group-launches-data-leak-site-on-the-dark-web
_ 31 January 2024_ _ 0 Comments

Alpha Ransomware Group Launches Data Leak Site on the Dark Web

The ransomware appends a random 8-character alphanumeric extension to encrypted files and its DLS, titled “MYDATA,” is considered unstable and frequently offline, indicating the group is still in the process of setting up operations.

LEARN MORE ♥11
Cyware Feed
threat-actors-selling-1.8tb-database-of-750-million-indian-mobile-users
_ 30 January 2024_ _ 0 Comments

Threat Actors Selling 1.8TB Database of 750 Million Indian Mobile Users

The compromised database is being sold on hacker forums, with two cybercrime groups offering the data for sale, highlighting the growing threat posed by emerging threat groups like CYBO CREW and its affiliates.

LEARN MORE ♥10
Cyware Feed
hundreds-of-network-operators’-credentials-found-circulating-in-dark-web
_ 30 January 2024_ _ 0 Comments

Hundreds of Network Operators’ Credentials Found Circulating in Dark Web

A significant number of network administrators and IT personnel were found to have their credentials compromised, highlighting the vulnerability of staff involved in network engineering and IT management operations.

LEARN MORE ♥10
Cyware Feed
dynatrace-acquires-runecast-to-improve-cloud-native-security
_ 30 January 2024_ _ 0 Comments

Dynatrace Acquires Runecast to Improve Cloud-Native Security

Dynatrace’s acquisition of Runecast will enhance its platform with AI-powered security posture management for proactive risk mitigation and real-time vulnerability assessments in hybrid and multicloud environments.

LEARN MORE ♥10
  • 1
  • 2
  • 3
  • …
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • …
  • 489
  • 490
  • 491
Recent Posts
  • Supporting Women in STEM With SWE: Voting, Advocacy, and More
  • SWE Diverse Podcast Ep 285: Thriving in Engineering While Living With Disabilities
  • 5 Things to Do Right After WE Annual Conference
Categories
  • Cyware Feed
  • Uncategorized