.:: CHASLES CORP. ::.
  • Welcome!
  • Sign In
  • Register
  • Newsletter
  • Contact
  • EN
  • FR
  • EN
  • FR
  • sales@chaslescorp.com
  • +237 695 640 333 / 651 448 283
  • Chaslescorp
  • Rue Joffre, Akwa, Douala
.:: CHASLES CORP. ::.
  • About Us
    • History
    • Our Team
    • News
    • Join Us
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit and Compliance
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
BOOK A DEMO/POV NOW

Book a DEMO / POV

[super_form id=”4788″]

  • Cybercriminal Adoption of Browser Fingerprinting
  • Automating Pikabot’s String Deobfuscation
  • ScrubCrypt Deploys VenomRAT with an Arsenal of Plugins
  • Malware-Initiated Vulnerability Scanning is on the Rise
  • Escalation of Fake E-Shop Campaign Threatens Banking Security in Multiple Regions
Academy
  • About Us
    • History
    • Our Team
    • News
    • Join Us
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit and Compliance
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
BOOK A DEMO/POV NOW

Book a DEMO / POV

[super_form id=”4788″]

  • Cybercriminal Adoption of Browser Fingerprinting
  • Automating Pikabot’s String Deobfuscation
  • ScrubCrypt Deploys VenomRAT with an Arsenal of Plugins
  • Malware-Initiated Vulnerability Scanning is on the Rise
  • Escalation of Fake E-Shop Campaign Threatens Banking Security in Multiple Regions
Academy
Cyware Feed
ransomware-recovery-could-take-months-at-british-library
_ 18 November 2023_ _ 0 Comments

Ransomware Recovery Could Take Months at British Library

The British Library has confirmed that it was targeted in a ransomware attack on October 28. The attack caused a major technology outage, impacting phone lines, on-site services, access to digital collections, and its website.

LEARN MORE ♥16
Cyware Feed
‘sex-life-data’-stolen-from-uk-government-among-record-number-of-ransomware-attacks
_ 18 November 2023_ _ 0 Comments

‘Sex Life Data’ Stolen From UK Government Among Record Number of Ransomware Attacks

Up to 10,000 people’s data on their sex lives was stolen in a ransomware attack on a British government department. It is unclear why the government was holding this data.

LEARN MORE ♥14
Cyware Feed
bangladesh’s-ntmc-exposed-database-containing-personal-information-to-open-web
_ 18 November 2023_ _ 0 Comments

Bangladesh’s NTMC Exposed Database Containing Personal Information to Open Web

The National Telecommunication Monitoring Centre in Bangladesh exposed a database containing extensive personal information, including names, phone numbers, and passport details.

LEARN MORE ♥10
Cyware Feed
ftc-targets-telecom-provider-for-inmates-after-massive-data-breach
_ 18 November 2023_ _ 0 Comments

FTC Targets Telecom Provider for Inmates After Massive Data Breach

The proposed order by the FTC requires Global Tel*Link to implement a comprehensive data security program, notify customers of future breaches, and minimize the data it collects and retains, among other measures, to prevent further incidents.

LEARN MORE ♥13
Cyware Feed
zero-day-flaw-in-zimbra-email-software-exploited-by-four-hacker-groups
_ 17 November 2023_ _ 0 Comments

Zero-Day Flaw in Zimbra Email Software Exploited by Four Hacker Groups

The vulnerability (CVE-2023-37580) allowed for the execution of malicious scripts by tricking users into clicking on specially crafted URLs, reflecting the attack back to the user.

LEARN MORE ♥11
Cyware Feed
fortinet-warns-of-critical-command-injection-bug-in-fortisiem
_ 17 November 2023_ _ 0 Comments

Fortinet Warns of Critical Command Injection Bug in FortiSIEM

The command injection vulnerability, identified as CVE-2023-36553, is a variant of a previously fixed security issue and can lead to unauthorized data access, modification, or deletion.

LEARN MORE ♥13
Cyware Feed
hundreds-of-websites-cloned-to-run-ads-for-chinese-gambling
_ 17 November 2023_ _ 0 Comments

Hundreds of Websites Cloned to Run Ads for Chinese Gambling

The motive behind these cloned sites is likely to generate traffic for gambling operators, as they can serve third-party ads that publishers may be reluctant to carry on their own sites.

LEARN MORE ♥16
Cyware Feed
citrix-hypervisor-gets-hotfix-for-new-reptar-intel-cpu-flaw
_ 17 November 2023_ _ 0 Comments

Citrix Hypervisor Gets Hotfix for New Reptar Intel CPU Flaw

One of the vulnerabilities, known as “Reptar,” affects Intel CPUs and could lead to system instability or privilege escalation. The other vulnerability, CVE-2023-46835, could allow malicious code in a guest VM to compromise an AMD-based host.

LEARN MORE ♥16
Cyware Feed
21-vulnerabilities-discovered-in-crucial-it-ot-connective-routers
_ 17 November 2023_ _ 0 Comments

21 Vulnerabilities Discovered in Crucial IT-OT Connective Routers

These vulnerabilities, including critical and high-severity bugs, can enable attackers to compromise networks, deploy malware, and disrupt services, highlighting the need for improved security measures in OT and IoT devices.

LEARN MORE ♥14
Cyware Feed
fraudsters-make-$50,000-a-day-by-spoofing-crypto-researchers
_ 17 November 2023_ _ 0 Comments

Fraudsters Make $50,000 a Day by Spoofing Crypto Researchers

Scammers are exploiting the trust placed in reputable accounts by creating fake accounts with similar names and spreading fabricated security breach claims to deceive users into clicking on malicious links and revealing their wallet information.

LEARN MORE ♥13
  • 1
  • 2
  • 3
  • …
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • …
  • 489
  • 490
  • 491
Recent Posts
  • Supporting Women in STEM With SWE: Voting, Advocacy, and More
  • SWE Diverse Podcast Ep 285: Thriving in Engineering While Living With Disabilities
  • 5 Things to Do Right After WE Annual Conference
Categories
  • Cyware Feed
  • Uncategorized