.:: CHASLES CORP. ::.
  • Welcome!
  • Sign In
  • Register
  • Newsletter
  • Contact
  • EN
  • FR
  • EN
  • FR
  • sales@chaslescorp.com
  • +237 695 640 333 / 651 448 283
  • Chaslescorp
  • Rue Joffre, Akwa, Douala
.:: CHASLES CORP. ::.
  • About Us
    • History
    • Our Team
    • News
    • Join Us
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit and Compliance
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
BOOK A DEMO/POV NOW

Book a DEMO / POV

[super_form id=”4788″]

  • Report: Microsoft Most Impersonated Brand in Phishing Scams
  • Blackjack Group Used ICS Malware Fuxnet Against Russian Targets
  • Law Firm to Pay $8M to Settle Health Data Hack Lawsuit
  • New SteganoAmor Attacks Use Steganography to Target 320 Organizations Globally
  • Update: Palo Alto Networks Fixes Zero-Day Exploited to Backdoor Firewalls
Academy
  • About Us
    • History
    • Our Team
    • News
    • Join Us
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit and Compliance
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
BOOK A DEMO/POV NOW

Book a DEMO / POV

[super_form id=”4788″]

  • Report: Microsoft Most Impersonated Brand in Phishing Scams
  • Blackjack Group Used ICS Malware Fuxnet Against Russian Targets
  • Law Firm to Pay $8M to Settle Health Data Hack Lawsuit
  • New SteganoAmor Attacks Use Steganography to Target 320 Organizations Globally
  • Update: Palo Alto Networks Fixes Zero-Day Exploited to Backdoor Firewalls
Academy
Cyware Feed
associated-press,-espn,-cbs-among-top-sites-serving-fake-virus-alerts
_ 1 December 2023_ _ 0 Comments

Associated Press, ESPN, CBS among top sites serving fake virus alerts

Threat actors dabbles in obfuscation and evasion techniques. However, as previously detailed by Confiant, they are using much more advanced tricks. Their JavaScript uses obfuscation with changing variable names, making identification harder.

LEARN MORE ♥12
Cyware Feed
68%-of-us-websites-exposed-to-bot-attacks
_ 1 December 2023_ _ 0 Comments

68% of US Websites Exposed to Bot Attacks

As per DataDome’s report shared with Hackread.com ahead of publication on Tuesday, 72.3% of e-commerce websites and 65.2% of classified ad websites failed the bot tests, whereas 85% of DataDome’s fake Chrome bots remained undetected.

LEARN MORE ♥11
Cyware Feed
hackers-using-weaponized-invoice-to-deliver-lumma-malware
_ 1 December 2023_ _ 0 Comments

Hackers Using Weaponized Invoice To Deliver LUMMA Malware

Cybersecurity analysts identified that the attacker, posing as a financial services company in this campaign, tricks the target with a fake invoice email. The attacker dodges detection using a fake page and a real link.

LEARN MORE ♥11
Cyware Feed
queensland-passes-mandatory-data-breach-notice-laws
_ 30 November 2023_ _ 0 Comments

Queensland Passes Mandatory Data Breach Notice Laws

The bill also aligns state privacy law more closely with national privacy principles and reforms the Right to Information framework to reduce barriers to citizens accessing government-held information.

LEARN MORE ♥14
Cyware Feed
british-afrobeat-singer-pleads-guilty-to-stealing-$6-million-in-hacks-on-financial-accounts
_ 30 November 2023_ _ 0 Comments

British Afrobeat singer pleads guilty to stealing $6 million in hacks on financial accounts

According to the Department of Justice, from 2011 until 2018 Mustapha and his unnamed co-conspirators siphoned funds from financial accounts whose login information they illegally accessed through phishing attacks.

LEARN MORE ♥14
Cyware Feed
bluevoyant-acquires-conquest-cyber-to-help-clients-mitigate-risks
_ 30 November 2023_ _ 0 Comments

BlueVoyant Acquires Conquest Cyber to Help Clients Mitigate Risks

BlueVoyant will integrate Conquest Cyber’s technology into its existing products and services to create the first solution to deliver comprehensive internal and external cyber defense mapped to risk maturity.

LEARN MORE ♥13
Cyware Feed
pocs-for-critical-arcserve-udp-vulnerabilities-released
_ 30 November 2023_ _ 0 Comments

PoCs for Critical Arcserve UDP Vulnerabilities Released

Arcserve UDP is a popular enterprise data protection, backup and disaster recovery solution. The flaws were unearthed by Tenable researchers and privately disclosed to Arcserve in late August 2023.

LEARN MORE ♥13
Cyware Feed
egyptian-e-payment-vendor-recovering-from-lockbit-ransomware-attack
_ 30 November 2023_ _ 0 Comments

Egyptian E-Payment Vendor Recovering From LockBit Ransomware Attack

Fawry remains confident that this data will not impact financial transactions on its platform, but the company believes it may have included the personal details of some customers whose information had been on the testing platform.

LEARN MORE ♥13
Cyware Feed
us-seizes-sinbad-crypto-mixer-used-by-north-korean-lazarus-group
_ 30 November 2023_ _ 0 Comments

US seizes Sinbad Crypto Mixer Used by North Korean Lazarus Group

Sinbad has processed millions of dollars’ worth of virtual currency from Lazarus Group heists, including the Horizon Bridge and Axie Infinity heists,” reads a Department of Treasury press statement.

LEARN MORE ♥13
Cyware Feed
qilin-ransomware-claims-attack-on-automotive-giant-yanfeng
_ 30 November 2023_ _ 0 Comments

Qilin Ransomware Claims Attack on Automotive Giant Yanfeng

The threat actors published multiple samples to prove their alleged access to Yanfeng systems and files, including financial documents, non-disclosure agreements, quotation files, technical data sheets, and internal reports.

LEARN MORE ♥13
  • 1
  • 2
  • 3
  • …
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • …
  • 489
  • 490
  • 491
Recent Posts
  • Supporting Women in STEM With SWE: Voting, Advocacy, and More
  • SWE Diverse Podcast Ep 285: Thriving in Engineering While Living With Disabilities
  • 5 Things to Do Right After WE Annual Conference
Categories
  • Cyware Feed
  • Uncategorized