Bitrox Technology
  • Home
  • Uncategorized
Select Page
  • Home
  • Uncategorized

Beyond Traditional Security: NDR’s Pivotal Role in Safeguarding OT Networks

by | Apr 20, 2023 | Uncategorized

Why is Visibility into OT Environments Crucial? The significance of Operational Technology (OT) for businesses is undeniable as the OT sector flourishes alongside the already thriving IT sector. OT includes industrial control systems, manufacturing equipment, and...

Daggerfly Cyberattack Campaign Hits African Telecom Services Providers

by | Apr 20, 2023 | Uncategorized

Telecommunication services providers in Africa are the target of a new campaign orchestrated by a China-linked threat actor at least since November 2022. The intrusions have been pinned on a hacking crew tracked by Symantec as Daggerfly, and which is also tracked by...

ChatGPT’s Data Protection Blind Spots and How Security Teams Can Solve Them

by | Apr 20, 2023 | Uncategorized

In the short time since their inception, ChatGPT and other generative AI platforms have rightfully gained the reputation of ultimate productivity boosters. However, the very same technology that enables rapid production of high-quality text on demand, can at the same...

Fortra Sheds Light on GoAnywhere MFT Zero-Day Exploit Used in Ransomware Attacks

by | Apr 20, 2023 | Uncategorized

Fortra, the company behind Cobalt Strike, shed light on a zero-day remote code execution (RCE) vulnerability in its GoAnywhere MFT tool that has come under active exploitation by ransomware actors to steal sensitive data. The high-severity flaw, tracked...

NSO Group Used 3 Zero-Click iPhone Exploits Against Human Rights Defenders

by | Apr 20, 2023 | Uncategorized

Israeli spyware maker NSO Group deployed at least three novel “zero-click” exploits against iPhones in 2022 to infiltrate defenses erected by Apple and deploy Pegasus, according to the latest findings from Citizen Lab. “NSO Group customers widely...
« Older Entries
Next Entries »

Recent Posts

  • Between Buzz and Reality: The CTEM Conversation We All Need
  • Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network
  • APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine
  • U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues
  • China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom

Recent Comments

No comments to show.

Archives

  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022

Categories

  • Uncategorized

Designed by Elegant Themes | Powered by WordPress