.:: CHASLES CORP. ::.
  • Welcome!
  • Sign In
  • Register
  • Newsletter
  • Contact
  • FR
  • EN
  • FR
  • EN
  • sales@chaslesCorp.com
  • +237 695 640 333
  • Charles.njea
  • Rue Joffre, Akwa, Douala
.:: CHASLES CORP. ::.
  • About Us
    • History
    • Our Team
    • News
    • Join Us
  • Cyber Defense
    • Darktrace
      • Enterprise Immune System
      • Industrial Immune System
      • Antigena Network
      • Antigena Email
      • Cyber AI Analyst
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit and Compliance
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
BOOK A DEMO/POV NOW

Book a DEMO / POV

The best date for you ?

Select a date
Please select a date
Please select a date

What time works?

Select a time
Please indcate the time
Please indcate the time
Your First Name
Field is required!
Field is required!
Your Last Name
Field is required!
Field is required!
Your E-mail Address
Field is required!
Field is required!
Your phone number
Please enter a phone number
Please enter a phone number
  • – select a option –
  • Demo
  • Presentation
  • Both
– select a option –
Please select an action
Please select an action
  • – select a product –
  • Darktrace (Ai Cyberdefense)
  • Nexusguard (Ddos)
  • Cymulate (Cybersecurity assessment)
  • Pcysys (Automated pe testing)
  • Consulting Services
  • Remediations services
  • IT Services
  • Telcos and ISP- Sandvine
  • Boostedge
– select a product –
Please select a product
Please select a product
SEND YOUR REQUEST

  • Out-of-bounds read vulnerability in Slic3r could lead to information disclosure
  • U.S. Senators: AWS Infrastructure Used In SolarWinds Attack
  • Attackers scan for vulnerable VMware servers after PoC exploit release
  • 84% of CNI Orgs Experienced Cyber-Attacks in the Last Year
  • Masslogger Malware Adopts New Initial Attack Technique
ACADEMY
BOOK A DEMO/POV NOW

Book a DEMO / POV

The best date for you ?

Select a date
Please select a date
Please select a date

What time works?

Select a time
Please indcate the time
Please indcate the time
Your First Name
Field is required!
Field is required!
Your Last Name
Field is required!
Field is required!
Your E-mail Address
Field is required!
Field is required!
Your phone number
Please enter a phone number
Please enter a phone number
  • – select a option –
  • Demo
  • Presentation
  • Both
– select a option –
Please select an action
Please select an action
  • – select a product –
  • Darktrace (Ai Cyberdefense)
  • Nexusguard (Ddos)
  • Cymulate (Cybersecurity assessment)
  • Pcysys (Automated pe testing)
  • Consulting Services
  • Remediations services
  • IT Services
  • Telcos and ISP- Sandvine
  • Boostedge
– select a product –
Please select a product
Please select a product
SEND YOUR REQUEST

  • Out-of-bounds read vulnerability in Slic3r could lead to information disclosure
  • U.S. Senators: AWS Infrastructure Used In SolarWinds Attack
  • Attackers scan for vulnerable VMware servers after PoC exploit release
  • 84% of CNI Orgs Experienced Cyber-Attacks in the Last Year
  • Masslogger Malware Adopts New Initial Attack Technique
Cyware Feed
_ 5 February 2021_ _ 0 Comments

Meet Babuk, a ransomware attacker blamed for the Serco breach

The ransomware gang, dubbed Babuk after its strain of code, is a case study in how quickly crooks can learn the basics of digital extortion and how that breeds ambition for big corporate scalps.

Read More ♥2
Cyware Feed
open-source-tool-for-hardening-commonly-used-hmi/scada-system
_ 5 February 2021_ _ 0 Comments

Open-source tool for hardening commonly used HMI/SCADA system

Otorio, a provider of OT security and digital risk management solutions, released an open-source tool designed for hardening the security of GE Digital’s CIMPLICITY, a commonly used HMI/SCADA system.

Read More ♥3
Cyware Feed
geeni-smart-doorbells,-cameras-riddled-with-flaws,-research-finds
_ 5 February 2021_ _ 0 Comments

Geeni smart doorbells, cameras riddled with flaws, research finds

The vulnerabilities, found in Geeni- and Merkury-branded security cameras and smart doorbells, would allow attackers to take full control of devices and remotely disable cameras in some cases.

Read More ♥2
Cyware Feed
threat-actors-actively-abuse-plex-media-servers-to-amplify-thousands-of-ddos-attacks
_ 5 February 2021_ _ 0 Comments

Threat Actors Actively Abuse Plex Media Servers to Amplify Thousands of DDoS Attacks

Plex Media Server systems are actively being abused by DDoS-for-hire services as a UDP reflection/amplification vector in thousands of Distributed Denial of Service (DDoS) attacks.

Read More ♥1
Cyware Feed
allen-bradley-flex-i/o-vulnerable-to-denial-of-service
_ 4 February 2021_ _ 0 Comments

Allen-Bradley Flex I/O vulnerable to denial of service

A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.

Read More ♥2
Cyware Feed
us-darpa-bug-bounty-helps-strengthen-military-research-agency’s-security-defenses
_ 4 February 2021_ _ 0 Comments

US DARPA bug bounty helps strengthen military research agency’s security defenses

The US Defense Advanced Research Projects Agency (DARPA) has reported back on its first ever security bug bounty program, saying the scheme has highlighted strengths as well as weaknesses.

Read More ♥2
Cyware Feed
consider-the-human-angle-in-your-threat-modeling
_ 4 February 2021_ _ 0 Comments

Consider the Human Angle in your Threat Modeling

As security practitioners, we need to consider a wider variety of possibilities for misuse of data and systems in our care, not just those that affect the majority of people.

Read More ♥1
Cyware Feed
why-pseudonymisation-is-important-to-protect-personal-data?
_ 4 February 2021_ _ 0 Comments

Why pseudonymisation is important to protect personal data?

The ENISA released its report on pseudonymisation for personal data protection, providing a technical analysis of cybersecurity measures in personal data protection and privacy.

Read More ♥1
Cyware Feed
multiple-vulnerabilities-spotted-in-softmaker-office-planmaker
_ 4 February 2021_ _ 0 Comments

Multiple vulnerabilities spotted in SoftMaker Office PlanMaker

An exploitable integer overflow and heap-based buffer overflow vulnerabilities exists in the PlanMaker document-parsing functionality of SoftMaker Office 2021’s PlanMaker application.

Read More ♥1
Cyware Feed
soc-teams-spend-nearly-a-quarter-of-their-day-handling-suspicious-emails
_ 4 February 2021_ _ 0 Comments

SOC teams spend nearly a quarter of their day handling suspicious emails

According to a study by email security firm Avanan, email threats reported by users or other mechanisms take two to three hours of a SOC teams time per day, or 22.9% of a SOC team’s daily routine.

Read More ♥1
  • 1
  • 2
  • 3
  • …
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • …
  • 93
  • 94
  • 95
Recent Posts
  • Teen responsible for major Twitter hack to serve three years in prison
  • 25% of UK Workers Let Their Children Use Their Work Device
  • New UK Cyber Security Council to be official governing body on training and standards
Categories
  • Cyware Feed
  • Uncategorized

Chasles Corporation is an independent company with technology partners. With our partners we deliver innovative IT Services & Solutions with exceptional customer service through proven technology, processes and people.

Rue Joffre, Akwa, Douala Cameroon

Our Address

sales@chaslesCorp.com

Our Mailbox

+237 651 448 283 / 653 962 459

Our Phone
  • Home
  • About Us
  • Contact
  • Education

Copyright © 2020 CHASLES CORP All Rights Reserved.

Twitter Facebook-f Linkedin-in Instagram