.:: CHASLES CORP. ::.
  • Welcome!
  • Sign In
  • Register
  • Newsletter
  • Contact
  • EN
  • FR
  • EN
  • FR
  • sales@chaslescorp.com
  • +237 695 640 333 / 651 448 283
  • Chaslescorp
  • Rue Joffre, Akwa, Douala
.:: CHASLES CORP. ::.
  • About Us
    • History
    • Our Team
    • News
    • Join Us
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit and Compliance
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
BOOK A DEMO/POV NOW

Book a DEMO / POV

[super_form id=”4788″]

  • FCC Might Require Telecoms to Report on Securing Internet’s BGP Technology
  • Remote-Access Tools the Intrusion Point to Blame for Most Ransomware Attacks
  • Critical Git Vulnerability Allows RCE When Cloning Repositories With Submodules
  • Brothers Arrested for $25 Million Theft in Ethereum Blockchain Attack
  • UK: NCSC to Defend ‘High-Risk’ Political Candidates from Cyberattacks
Academy
  • About Us
    • History
    • Our Team
    • News
    • Join Us
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit and Compliance
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
BOOK A DEMO/POV NOW

Book a DEMO / POV

[super_form id=”4788″]

  • FCC Might Require Telecoms to Report on Securing Internet’s BGP Technology
  • Remote-Access Tools the Intrusion Point to Blame for Most Ransomware Attacks
  • Critical Git Vulnerability Allows RCE When Cloning Repositories With Submodules
  • Brothers Arrested for $25 Million Theft in Ethereum Blockchain Attack
  • UK: NCSC to Defend ‘High-Risk’ Political Candidates from Cyberattacks
Academy
Cyware Feed
update:-akira-ransomware-gang-says-it-stole-passport-scans-from-lush
_ 27 January 2024_ _ 0 Comments

Update: Akira Ransomware Gang Says It Stole Passport Scans From Lush

The Akira ransomware gang has claimed responsibility for a cybersecurity incident at a British bath bomb merchant. They have stolen 110 GB of data, including personal documents such as passport scans, from the global cosmetics giant.

LEARN MORE ♥11
Cyware Feed
mexican-banks-and-cryptocurrency-platforms-targeted-with-allakore-rat
_ 27 January 2024_ _ 0 Comments

Mexican Banks and Cryptocurrency Platforms Targeted With AllaKore RAT

A financially motivated threat actor based in Latin America is targeting large Mexican companies with custom packaged installers delivering a modified version of AllaKore RAT for financial fraud.

LEARN MORE ♥8
Cyware Feed
iphone-apps-abuse-ios-push-notifications-to-collect-user-data
_ 27 January 2024_ _ 0 Comments

iPhone Apps Abuse iOS Push Notifications to Collect User Data

Many apps abuse the background processing feature to transmit device data to their servers, potentially enabling fingerprinting and persistent tracking, which is strictly prohibited in iOS.

LEARN MORE ♥14
Cyware Feed
microsoft-warns-of-widening-apt29-espionage-attacks-targeting-global-firms
_ 27 January 2024_ _ 0 Comments

Microsoft Warns of Widening APT29 Espionage Attacks Targeting Global Firms

The threat actor, known as APT29 or BlueBravo, uses diverse methods including compromised accounts, OAuth applications, and password spraying to gain and maintain access, making traditional indicators of compromise-based detection ineffective.

LEARN MORE ♥12
Cyware Feed
abu-dhabi-investment-firm-warns-about-scam-efforts
_ 26 January 2024_ _ 0 Comments

Abu Dhabi Investment Firm Warns About Scam Efforts

The National Investor in Abu Dhabi has issued a warning about fraudulent investment schemes misusing its name, logo, and employees’ identities to solicit personal and financial information.

LEARN MORE ♥13
Cyware Feed
update:-hackers-stole-raw-genotype-data,-health-reports-in-23andme-data-breach
_ 26 January 2024_ _ 0 Comments

Update: Hackers Stole Raw Genotype Data, Health Reports in 23andMe Data Breach

The stolen data includes raw genotype data, health reports, and information from DNA Relatives and Family Tree profiles, potentially exposing personal and ancestral information of affected customers.

LEARN MORE ♥10
Cyware Feed
feds-warn-healthcare-sector-of-connectwise-screenconnect-threats
_ 26 January 2024_ _ 0 Comments

Feds Warn Healthcare Sector of ConnectWise ScreenConnect Threats

Federal authorities warn that a self-hosted version of ConnectWise’s ScreenConnect remote access tool was compromised at a large pharmacy services firm, posing a significant risk to other healthcare organizations.

LEARN MORE ♥13
Cyware Feed
hackers-target-wordpress-database-plugin-active-on-one-million-sites
_ 26 January 2024_ _ 0 Comments

Hackers Target WordPress Database Plugin Active on One Million Sites

The vulnerability, tracked as CVE-2023-6933, allows unauthenticated attackers to inject a PHP object, potentially leading to code execution, data access, file manipulation, or denial of service.

LEARN MORE ♥15
Cyware Feed
malicious-ads-for-restricted-messaging-applications-target-chinese-users
_ 26 January 2024_ _ 0 Comments

Malicious Ads for Restricted Messaging Applications Target Chinese Users

A campaign of malicious ads is targeting Chinese-speaking users with lures for popular messaging applications like Telegram and LINE, despite the fact that these apps are heavily restricted or banned in China.

LEARN MORE ♥10
Cyware Feed
critical-cisco-flaw-lets-hackers-remotely-take-over-unified-comms-systems
_ 26 January 2024_ _ 0 Comments

Critical Cisco Flaw Lets Hackers Remotely Take Over Unified Comms Systems

Admins are advised to implement access control lists (ACLs) as a mitigation strategy and evaluate their impact before deployment, while Cisco is not aware of any public announcements or malicious use of the vulnerability.

LEARN MORE ♥13
  • 1
  • 2
  • 3
  • …
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • …
  • 489
  • 490
  • 491
Recent Posts
  • Supporting Women in STEM With SWE: Voting, Advocacy, and More
  • SWE Diverse Podcast Ep 285: Thriving in Engineering While Living With Disabilities
  • 5 Things to Do Right After WE Annual Conference
Categories
  • Cyware Feed
  • Uncategorized