Gunra Ransomware (Conti Variant) Targets Windows Systems with Aggressive Encryption & Shadow Copy Deletion Credited by Pixabay VTA-004527 – Gunra Ransomware (Conti Variant) Targets Windows Systems with Aggressive Encryption & Shadow Copy Deletion The newly identified Gunra ransomware, a derivative … Read More
VTA
Hackers Exploit Critical SharePoint Vulnerability for Full Server Takeover
Hackers Exploit Critical SharePoint Vulnerability for Full Server Takeover Credited by Pixabay VTA-004526 – Hackers Exploit Critical SharePoint Vulnerability for Full Server Takeover A newly discovered cyberattack campaign is exploiting a critical vulnerability chain in Microsoft SharePoint servers, allowing attackers … Read More
HazyBeacon Malware Exploits AWS Lambda for Covert Data Theft
HazyBeacon Malware Exploits AWS Lambda for Covert Data Theft Credited by Freepik VTA-004523 – HazyBeacon Malware Exploits AWS Lambda for Covert Data Theft A newly discovered Windows backdoor, HazyBeacon, is targeting Southeast Asian government agencies to steal sensitive data, including … Read More
Meeten Campaign Leverages Social Platforms to Deliver Malware to Crypto Users
Meeten Campaign Leverages Social Platforms to Deliver Malware to Crypto Users Credited by Freepik VTA-004522 – Meeten Campaign Leverages Social Platforms to Deliver Malware to Crypto Users A social engineering campaign is targeting cryptocurrency users, deploying malware to steal digital … Read More
DEVMAN Ransomware Targets Windows Systems with Flawed DragonForce and Conti Hybrid
DEVMAN Ransomware Targets Windows Systems with Flawed DragonForce and Conti Hybrid Credited by Freepik VTA-004521 – DEVMAN Ransomware Targets Windows Systems with Flawed DragonForce and Conti Hybrid A new ransomware variant named DEVMAN has emerged, built on the DragonForce and … Read More
SERPENTINE#CLOUD Exploits Cloudflare Tunnels for Malware Delivery
SERPENTINE#CLOUD Exploits Cloudflare Tunnels for Malware Delivery Credited by Freepik VTA-004520 – SERPENTINE#CLOUD Exploits Cloudflare Tunnels for Malware Delivery A new phishing campaign, dubbed SERPENTINE#CLOUD, is exploiting Cloudflare Tunnel subdomains to deliver malware through obfuscated scripts and memory-injected payloads. Researchers … Read More
Safari Vulnerability Enables Attackers to Steal Credentials with Fullscreen BitM Attacks
Safari Vulnerability Enables Attackers to Steal Credentials with Fullscreen BitM Attacks Credited by Freepik VTA-004519 – Safari Vulnerability Enables Attackers to Steal Credentials with Fullscreen BitM Attacks In today’s digital landscape, multimedia content forms an essential part of the user … Read More
Malicious Scripts Delivered via Fake Gitcode and Docusign Pages
Malicious Scripts Delivered via Fake Gitcode and Docusign Pages Credited by Freepik VTA-004518 – Malicious Scripts Delivered via Fake Gitcode and Docusign Pages A new cyber campaign is using fake websites impersonating Gitcode and DocuSign to trick users into running … Read More
Katz Stealer Malware Bypasses Browser Security to Steal Credentials
Katz Stealer Malware Bypasses Browser Security to Steal Credentials Credited by Freepik VTA-004517 – Katz Stealer Malware Bypasses Browser Security to Steal Credentials A new malware called Katz Stealer is targeting popular web browsers, stealing sensitive data like passwords, cryptocurrency … Read More