Bitrox Technology
  • Home
  • Uncategorized
Select Page
  • Home
  • Uncategorized

When Good Extensions Go Bad: Takeaways from the Campaign Targeting Browser Extensions

by | Dec 30, 2024 | Uncategorized

News has been making headlines over the weekend of the extensive attack campaign targeting browser extensions and injecting them with malicious code to steal user credentials. Currently, over 25 extensions, with an install base of over two million users, have been...

16 Chrome Extensions Hacked, Exposing Over 600,000 Users to Data Theft

by | Dec 29, 2024 | Uncategorized

A new attack campaign has targeted known Chrome browser extensions, leading to at least 16 extensions being compromised and exposing over 600,000 users to data exposure and credential theft. The attack targeted publishers of browser extensions on the Chrome Web Store...

15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials

by | Dec 28, 2024 | Uncategorized

A high-severity flaw impacting select Four-Faith routers has come under active exploitation in the wild, according to new findings from VulnCheck. The vulnerability, tracked as CVE-2024-12856 (CVSS score: 7.2), has been described as an operating system (OS) command...

North Korean Hackers Deploy OtterCookie Malware in Contagious Interview Campaign

by | Dec 27, 2024 | Uncategorized

North Korean threat actors behind the ongoing Contagious Interview campaign have been observed dropping a new JavaScript malware called OtterCookie. Contagious Interview (aka DeceptiveDevelopment) refers to a persistent attack campaign that employs social engineering...

Cloud Atlas Deploys VBCloud Malware: Over 80% of Targets Found in Russia

by | Dec 27, 2024 | Uncategorized

The threat actor known as Cloud Atlas has been observed using a previously undocumented malware called VBCloud as part of its cyber attack campaigns targeting “several dozen users” in 2024. “Victims get infected via phishing emails containing a...
« Older Entries
Next Entries »

Recent Posts

  • New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora
  • U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation
  • New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data
  • From the “Department of No” to a “Culture of Yes”: A Healthcare CISO’s Journey to Enabling Modern Care
  • China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

Recent Comments

No comments to show.

Archives

  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022

Categories

  • Uncategorized

Designed by Elegant Themes | Powered by WordPress