Bitrox Technology
  • Home
  • Uncategorized
Select Page
  • Home
  • Uncategorized

U.S. Cybersecurity Agency CISA Adds Three New Vulnerabilities in KEV Catalog

by | Feb 22, 2023 | Uncategorized

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The list of shortcomings is as follows – CVE-2022-47986 (CVSS...

VMware Patches Critical Vulnerability in Carbon Black App Control Product

by | Feb 22, 2023 | Uncategorized

VMware on Tuesday released patches to address a critical security vulnerability affecting its Carbon Black App Control product. Tracked as CVE-2023-20858, the shortcoming carries a CVSS score of 9.1 out of a maximum of 10 and impacts App Control versions 8.7.x, 8.8.x,...

MyloBot Botnet Spreading Rapidly Worldwide: Infecting Over 50,000 Devices Daily

by | Feb 21, 2023 | Uncategorized

A sophisticated botnet known as MyloBot has compromised thousands of systems, with most of them located in India, the U.S., Indonesia, and Iran. That’s according to new findings from BitSight, which said it’s “currently seeing more than 50,000 unique...

The Future of Network Security: Predictive Analytics and ML-Driven Solutions

by | Feb 21, 2023 | Uncategorized

As the digital age evolves and continues to shape the business landscape, corporate networks have become increasingly complex and distributed. The amount of data a company collects to detect malicious behaviour constantly increases, making it challenging to detect...

Coinbase Employee Falls for SMS Scam in Cyber Attack, Limited Data Exposed

by | Feb 21, 2023 | Uncategorized

Popular cryptocurrency exchange platform Coinbase disclosed that it experienced a cybersecurity attack that targeted its employees. The company said its “cyber controls prevented the attacker from gaining direct system access and prevented any loss of funds or...
« Older Entries
Next Entries »

Recent Posts

  • New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora
  • U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation
  • New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data
  • From the “Department of No” to a “Culture of Yes”: A Healthcare CISO’s Journey to Enabling Modern Care
  • China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

Recent Comments

No comments to show.

Archives

  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022

Categories

  • Uncategorized

Designed by Elegant Themes | Powered by WordPress