.:: CHASLES CORP. ::.
  • Welcome!
  • Sign In
  • Register
  • Newsletter
  • Contact
  • EN
  • FR
  • EN
  • FR
  • sales@chaslescorp.com
  • +237 695 640 333 / 651 448 283
  • Chaslescorp
  • Rue Joffre, Akwa, Douala
.:: CHASLES CORP. ::.
  • About Us
    • History
    • Our Team
    • News
    • Join Us
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit and Compliance
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
BOOK A DEMO/POV NOW

Book a DEMO / POV

[super_form id=”4788″]

  • Fail2Ban: Ban hosts that cause multiple authentication errors
  • Cybercriminals Exploit Cloud Storage for SMS Phishing Scams
  • NSA Issues Guidance for Maturing Application, Workload Capabilities Under Zero Trust; Dave Luber Quoted
  • Beware of HTML Masquerading as PDF Viewer Login Pages
  • Courtroom Recording Software Compromised With Backdoor Installer
Academy
  • About Us
    • History
    • Our Team
    • News
    • Join Us
    • Portfolio
  • Cyber Defense
    • Nexusguard
    • On demand
  • Cyber X
    • Fortinet
    • Employee Awareness Traininig
    • Breach Automation Platform
    • Automated Pentesting
    • Cyber X Services
      • Audit and Compliance
      • Remediation Services
      • Executive Protection
      • Advisory and Consultancy
  • IT
    • Integrify
    • Oracle
    • IT Solutions and Services
    • Software Development
  • Telcos and ISP Solutions
    • Sandvine
    • Boostedge
      • OverSea
      • PetaCache
      • Atlas
  • Education
BOOK A DEMO/POV NOW

Book a DEMO / POV

[super_form id=”4788″]

  • Fail2Ban: Ban hosts that cause multiple authentication errors
  • Cybercriminals Exploit Cloud Storage for SMS Phishing Scams
  • NSA Issues Guidance for Maturing Application, Workload Capabilities Under Zero Trust; Dave Luber Quoted
  • Beware of HTML Masquerading as PDF Viewer Login Pages
  • Courtroom Recording Software Compromised With Backdoor Installer
Academy
Cyware Feed
ransomware-tactics-evolve,-become-scrappier
_ 13 February 2024_ _ 0 Comments

Ransomware Tactics Evolve, Become Scrappier

Ransomware attacks surged in 2023, with the United States accounting for almost half of all attacks according to Malwarebytes, and cybercriminals evolving their tactics to target a higher volume of victims simultaneously.

LEARN MORE ♥16
Cyware Feed
fcc-orders-telecom-carriers-to-report-pii-data-breaches-within-30-days
_ 13 February 2024_ _ 0 Comments

FCC Orders Telecom Carriers to Report PII Data Breaches Within 30 Days

Major U.S. telecom carriers such as Verizon, T-Mobile, and AT&T have experienced significant data breaches in recent years, highlighting the crucial need for aligning FCC’s data breach rules with federal and state laws applicable to other sectors.

LEARN MORE ♥12
Cyware Feed
protecting-against-ai-enhanced-email-threats
_ 13 February 2024_ _ 0 Comments

Protecting Against AI-Enhanced Email Threats

Combining traditional email security measures with AI-based solutions and empowering cybersecurity personnel with AI skills is crucial for organizations to defend against evolving cyber threats.

LEARN MORE ♥12
Cyware Feed
ongoing-azure-compromises-target-senior-executives,-microsoft-365-apps
_ 12 February 2024_ _ 0 Comments

Ongoing Azure Compromises Target Senior Executives, Microsoft 365 Apps

Threat actors are targeting Microsoft Azure corporate clouds with sophisticated and tailored phishing attacks, compromising a wide range of user accounts for activities such as data exfiltration and financial fraud.

LEARN MORE ♥10
Cyware Feed
decryptor-for-rhysida-ransomware-is-available
_ 12 February 2024_ _ 0 Comments

Decryptor for Rhysida Ransomware is Available

Files encrypted by Rhysida ransomware can be successfully decrypted, due to a implementation vulnerability discovered by Korean researchers and leveraged to create a decryptor.

LEARN MORE ♥13
Cyware Feed
cohesity,-veritas-combine-as-new-data-protection-company
_ 12 February 2024_ _ 0 Comments

Cohesity, Veritas Combine as New Data Protection Company

The deal will result in the formation of a separate company called DataCo to handle Veritas’ remaining assets, while Cohesity will follow a “no customer left behind” approach.

LEARN MORE ♥10
Cyware Feed
_ 12 February 2024_ _ 0 Comments

CISA Partners with OpenSSF to Release Principles for Package Repository Security Framework

This initiative aligns with CISA’s Open Source Software Security Roadmap’s objective of collaborating with relevant working groups to develop security principles for package managers.

LEARN MORE ♥11
Cyware Feed
ransomware-attack-forces-18-romanian-hospitals-to-go-offline
_ 12 February 2024_ _ 0 Comments

Ransomware Attack Forces 18 Romanian Hospitals to Go Offline

The Hipocrate Information System (HIS) used by hospitals to manage medical activity and patient data was targeted over the weekend and is now offline after its database was encrypted.

LEARN MORE ♥11
Cyware Feed
un-experts-investigating-58-suspected-north-korean-cyberattacks-valued-at-about-$3-billion
_ 12 February 2024_ _ 0 Comments

UN Experts Investigating 58 Suspected North Korean Cyberattacks Valued at About $3 Billion

The United Nations is investigating 58 suspected cyberattacks by North Korea, totaling around $3 billion, which are believed to be funding the country’s development of weapons of mass destruction.

LEARN MORE ♥10
Cyware Feed
national-cyber-director-urges-private-sector-collaboration-to-counter-nation-state-cyber-threat
_ 12 February 2024_ _ 0 Comments

National Cyber Director Urges Private Sector Collaboration to Counter Nation-State Cyber Threat

National Cyber Director Harry Coker emphasized the need for a collaborative effort between the government and industry to address cyber threats, harmonize regulations, and build a diverse cybersecurity workforce.

LEARN MORE ♥14
  • 1
  • 2
  • 3
  • …
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • …
  • 489
  • 490
  • 491
Recent Posts
  • Supporting Women in STEM With SWE: Voting, Advocacy, and More
  • SWE Diverse Podcast Ep 285: Thriving in Engineering While Living With Disabilities
  • 5 Things to Do Right After WE Annual Conference
Categories
  • Cyware Feed
  • Uncategorized
Chat with us