Bitrox Technology
  • Home
  • Uncategorized
Select Page
  • Home
  • Uncategorized

Malicious Campaigns Exploit Weak Kubernetes Clusters for Crypto Mining

by | Aug 9, 2023 | Uncategorized

Exposed Kubernetes (K8s) clusters are being exploited by malicious actors to deploy cryptocurrency miners and other backdoors. Cloud security firm Aqua, in a report shared with The Hacker News, said a majority of the clusters belonged to small to medium-sized...

U.K. Electoral Commission Breach Exposes Voter Data of 40 Million Britons

by | Aug 9, 2023 | Uncategorized

The U.K. Electoral Commission on Tuesday disclosed a “complex” cyber attack on its systems that went undetected for over a year, allowing the threat actors to access years worth of voter data belonging to 40 million people. “The incident was...

New Android 14 Security Feature: IT Admins Can Now Disable 2G Networks

by | Aug 9, 2023 | Uncategorized

Google has introduced a new security feature in Android 14 that allows IT administrators to disable support for 2G cellular networks in their managed device fleet. The search giant said it’s introducing a second user setting to turn off support, at the model...

Microsoft Releases Patches for 74 New Vulnerabilities in August Update

by | Aug 9, 2023 | Uncategorized

Microsoft has patched a total of 74 flaws in its software as part of the company’s Patch Tuesday updates for August 2023, down from the voluminous 132 vulnerabilities the company fixed last month. This comprises six Critical and 67 Important security...

QakBot Malware Operators Expand C2 Network with 15 New Servers

by | Aug 8, 2023 | Uncategorized

The operators associated with the QakBot (aka QBot) malware have set up 15 new command-and-control (C2) servers as of late June 2023. The findings are a continuation of the malware’s infrastructure analysis from Team Cymru, and arrive a little over two months...
« Older Entries
Next Entries »

Recent Posts

  • Anubis Ransomware Encrypts and Wipes Files, Making Recovery Impossible Even After Payment
  • Playbook: Transforming Your Cybersecurity Practice Into An MRR Machine
  • ⚡ Weekly Recap: iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More
  • Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data
  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets

Recent Comments

No comments to show.

Archives

  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022

Categories

  • Uncategorized

Designed by Elegant Themes | Powered by WordPress