Bitrox Technology
  • Home
  • Uncategorized
Select Page
  • Home
  • Uncategorized

Indian Government Publishes Draft of Digital Personal Data Protection Bill 2022

by | Nov 19, 2022 | Uncategorized

The Indian government on Friday released a draft version of the much-awaited data protection regulation, making it the fourth such effort since it was first proposed in July 2018. The Digital Personal Data Protection Bill, 2022, as it’s called, aims to secure...

Microsoft Warns of Hackers Using Google Ads to Distribute Royal Ransomware

by | Nov 19, 2022 | Uncategorized

A developing threat activity cluster has been found using Google Ads in one of its campaigns to distribute various post-compromise payloads, including the recently discovered Royal ransomware. Microsoft, which spotted the updated malware delivery method in late...

Chinese ‘Mustang Panda’ Hackers Actively Targeting Governments Worldwide

by | Nov 19, 2022 | Uncategorized

A notorious advanced persistent threat actor known as Mustang Panda has been linked to a spate of spear-phishing attacks targeting government, education, and research sectors across the world. The primary targets of the intrusions from May to October 2022 included...

Atlassian Releases Patches for Critical Flaws Affecting Crowd and Bitbucket Products

by | Nov 19, 2022 | Uncategorized

Australian software company Atlassian has rolled out security updates to address two critical flaws affecting Bitbucket Server, Data Center, and Crowd products. The issues, tracked as CVE-2022-43781 and CVE-2022-43782, are both rated 9 out of 10 on the CVSS...

LodaRAT Malware Resurfaces with New Variants Employing Updated Functionalities

by | Nov 18, 2022 | Uncategorized

The LodaRAT malware has resurfaced with new variants that are being deployed in conjunction with other sophisticated malware, such as RedLine Stealer and Neshta. “The ease of access to its source code makes LodaRAT an attractive tool for any threat actor who is...
« Older Entries
Next Entries »

Recent Posts

  • New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public
  • Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers
  • Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue
  • Between Buzz and Reality: The CTEM Conversation We All Need
  • Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network

Recent Comments

No comments to show.

Archives

  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022

Categories

  • Uncategorized

Designed by Elegant Themes | Powered by WordPress