Cybercriminals exploit Salesforce Application in High-Profile Data Breach Credited by Freepik VTA-004536 – Cybercriminals exploit Salesforce Application in High-Profile Data Breach Cybercriminal group ShinyHunters, previously known for their ties to the BreachForums website and their attacks on AWS infrastructure, resurfaced … Read More
VTA
WhatsApp Desktop for Windows Allows Arbitrary Code Execution Via Malicious PYZ Files
WhatsApp Desktop for Windows Allows Arbitrary Code Execution Via Malicious PYZ Files Credited by Freepik VTA-004535 – WhatsApp Desktop for Windows Allows Arbitrary Code Execution Via Malicious PYZ Files Attackers are exploiting WhatsApp Desktop’s file transfer feature on Windows systems … Read More
Palo Alto GlobalProtect Certificate Validation Flaw Enables Privilege Escalation
Palo Alto GlobalProtect Certificate Validation Flaw Enables Privilege Escalation Credited by Freepik VTA-004534 – Palo Alto GlobalProtect Certificate Validation Flaw Enables Privilege Escalation CVE-2025-2183 exposes a critical certificate validation flaw in Palo Alto GlobalProtect VPN clients (Windows/Linux) that allows adjacent … Read More
Microsoft Warns of Critical IIS Web Deploy Flaw Enabling Remote Code Execution
Microsoft Warns of Critical IIS Web Deploy Flaw Enabling Remote Code Execution Credited by Freepik VTA-004533 – Microsoft Warns of Critical IIS Web Deploy Flaw Enabling Remote Code Execution On August 12, 2025, Microsoft disclosed CVE-2025-53772, a critical vulnerability in … Read More
Critical Windows Flaw Turns Domain Controllers into Unwitting DDoS Weapons
Critical Windows Flaw Turns Domain Controllers into Unwitting DDoS Weapons Credited by Freepik VTA-004532 – Critical Windows Flaw Turns Domain Controllers into Unwitting DDoS Weapons The Win-DDoS vulnerability, revealed by SafeBreach researchers Or Yair and Shahak Morag at DEF CON … Read More
SocGholish Malware Exploits TDS Networks to Target Victims
SocGholish Malware Exploits TDS Networks to Target Victims Credited by Freepik VTA-004531 – SocGholish Malware Exploits TDS Networks to Target Victims Cybercriminals behind SocGholish malware are using Traffic Distribution Systems (TDS) like Parrot TDS and Keitaro TDS to filter and … Read More
ECScape Vulnerability Exploits Amazon ECS Protocol to Steal Cross-Task AWS Credentials
ECScape Vulnerability Exploits Amazon ECS Protocol to Steal Cross-Task AWS Credentials Credited by Freepik VTA-004530 – ECScape Vulnerability Exploits Amazon ECS Protocol to Steal Cross-Task AWS Credentials The ECScape vulnerability exposes a critical design flaw in Amazon ECS where malicious … Read More
State-sponsored Threat Actors hold Espionage campaign in Southeast Asian Telecommunications Networks
State-sponsored Threat Actors hold Espionage campaign in Southeast Asian Telecommunications Networks Credited by Freepik VTA-004529 – State-sponsored Threat Actors hold Espionage campaign in Southeast Asian Telecommunications Networks An espionage campaign targeting Telecommunications organizations in Southeast Asia dubbed CL-STA-0969 was discovered. … Read More
Global Industries Under Siege by New Ransomware Actor ‘Dire Wolf’
Global Industries Under Siege by New Ransomware Actor ‘Dire Wolf’ Credited by Freepik VTA-004528 – Global Industries Under Siege by New Ransomware Actor ‘Dire Wolf’ Dire Wolf is a newly discovered ransomware group that was first identified in May 2025. … Read More