Bitrox Technology
  • Home
  • Uncategorized
Select Page
  • Home
  • Uncategorized

SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients

by bitroxadmin | Apr 29, 2025 | Uncategorized

Cybersecurity company SentinelOne has revealed that a China-nexus threat cluster dubbed PurpleHaze conducted reconnaissance attempts against its infrastructure and some of its high-value customers. “We first became aware of this threat cluster during a 2024...

Google Reports 75 Zero-Days Exploited in 2024 — 44% Targeted Enterprise Security Products

by bitroxadmin | Apr 29, 2025 | Uncategorized

Google has revealed that it observed 75 zero-day vulnerabilities exploited in the wild in 2024, down from 98 in 2023.  Of the 75 zero-days, 44% of them targeted enterprise products. As many as 20 flaws were identified in security software and appliances....

Product Walkthrough: Securing Microsoft Copilot with Reco

by bitroxadmin | Apr 29, 2025 | Uncategorized

Find out how Reco keeps Microsoft 365 Copilot safe by spotting risky prompts, protecting data, managing user access, and identifying threats – all while keeping productivity high. Microsoft 365 Copilot promises to boost productivity by turning natural language...

Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool

by bitroxadmin | Apr 29, 2025 | Uncategorized

In a new campaign detected in March 2025, senior members of the World Uyghur Congress (WUC) living in exile have been targeted by a Windows-based malware that’s capable of conducting surveillance. The spear-phishing campaign involved the use of a trojanized...

CISA Adds Actively Exploited Broadcom and Commvault Flaws to KEV Database

by bitroxadmin | Apr 29, 2025 | Uncategorized

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two high-severity security flaws impacting Broadcom Brocade Fabric OS and Commvault Web Server to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation...
« Older Entries
Next Entries »

Recent Posts

  • Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host
  • Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program
  • Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks
  • Identity Security Has an Automation Problem—And It’s Bigger Than You Think
  • FBI and Europol Disrupt Lumma Stealer Malware Network Linked to 10 Million Infections

Recent Comments

No comments to show.

Archives

  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022

Categories

  • Uncategorized

Designed by Elegant Themes | Powered by WordPress