Bitrox Technology
  • Home
  • Uncategorized
Select Page
  • Home
  • Uncategorized

New Version of Prometei Botnet Infects Over 10,000 Systems Worldwide

by | Mar 10, 2023 | Uncategorized

An updated version of a botnet malware called Prometei has infected more than 10,000 systems worldwide since November 2022. The infections are both geographically indiscriminate and opportunistic, with a majority of the victims reported in Brazil, Indonesia, and...

When Partial Protection is Zero Protection: The MFA Blind Spots No One Talks About

by | Mar 10, 2023 | Uncategorized

Multi-factor Authentication (MFA) has long ago become a standard security practice. With a wide consensus on its ability to fend off more than 99% percent of account takeover attacks, it’s no wonder why security architects regard it as a must-have in their...

Xenomorph Android Banking Trojan Returns with a New and More Powerful Variant

by | Mar 10, 2023 | Uncategorized

A new variant of the Android banking trojan named Xenomorph has surfaced in the wild, the latest findings from ThreatFabric reveal. Named “Xenomorph 3rd generation” by the Hadoken Security Group, the threat actor behind the operation, the updated version...

North Korean UNC2970 Hackers Expands Operations with New Malware Families

by | Mar 10, 2023 | Uncategorized

A North Korean espionage group tracked as UNC2970 has been observed employing previously undocumented malware families as part of a spear-phishing campaign targeting U.S. and European media and technology organizations since June 2022. Google-owned Mandiant said the...

Hackers Exploiting Remote Desktop Software Flaws to Deploy PlugX Malware

by | Mar 9, 2023 | Uncategorized

Security vulnerabilities in remote desktop programs such as Sunlogin and AweSun are being exploited by threat actors to deploy the PlugX malware. AhnLab Security Emergency Response Center (ASEC), in a new analysis, said it marks the continued abuse of the flaws to...
« Older Entries
Next Entries »

Recent Posts

  • China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom
  • DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes
  • Echo Chamber Jailbreak Tricks LLMs Like OpenAI and Google into Generating Harmful Content
  • XDigo Malware Exploits Windows LNK Flaw in Eastern European Government Attacks
  • How AI-Enabled Workflow Automation Can Help SOCs Reduce Burnout

Recent Comments

No comments to show.

Archives

  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022

Categories

  • Uncategorized

Designed by Elegant Themes | Powered by WordPress