VTA

Newly Discovered OpenSSH Vulnerability Known As ‘regreSSHion’ Allows Remote Code Execution with Root Privileges

Newly Discovered OpenSSH Vulnerability Known As ‘regreSSHion’ Allows Remote Code Execution with Root Privileges Image Credit by Pixabay VTA-004491 – Newly Discovered OpenSSH Vulnerability Known As ‘regreSSHion’ Allows Remote Code Execution with Root Privileges CVE-2024–6387, dubbed “regreSSHion,” has been discovered … Read More

Windows Users Face Widespread Outages Due to Bug in Latest CrowdStrike Update

Windows Users Face Widespread Outages Due to Bug in Latest Crowdstrike Update Image Credit by Freepik VTA-004490 – Windows Users Face Widespread Outages Due to Bug in Latest Crowdstrike Update Windows users worldwide are experiencing significant disruptions due to a … Read More

HardBit Ransomware 4.0 with Passphrase Protection and Advanced Evasion Techniques

HardBit Ransomware 4.0 with Passphrase Protection and Advanced Evasion Techniques Image Credit by Freepik VTA-004489 – HardBit Ransomware 4.0 with Passphrase Protection and Advanced Evasion Techniques In 2022, HardBit Ransomware released version 4.0, focusing on data theft, encryption, and ransom … Read More

Emerging Malware Campaign named Poco RAT Targeting Users

Emerging Malware Campaign named Poco RAT Targeting Users Image Credit by Freepik VTA-004488 – Emerging Malware Campaign named Poco RAT Targeting Users A new malware campaign targeting Spanish-speaking users, named Poco RAT. This Remote Access Trojan (RAT) primarily attacks the … Read More

China-Linked Group Exploits Cisco Switch Flaw for Malware Delivery

China-Linked Group Exploits Cisco Switch Flaw for Malware Delivery Image Credit by Pixabay VTA-004487 – China-Linked Group Exploits Cisco Switch Flaw for Malware Delivery A cyberespionage group possibly linked to China has leveraged a zero-day exploit in Cisco’s NX-OS software … Read More

Rust-Powered P2PInfect Botnet Advances with Cryptocurrency Miners and Ransomware

Rust-Powered P2PInfect Botnet Advances with Cryptocurrency miners and Ransomware Image credit by Freepik VTA-004486 – Rust-Powered P2PInfect Botnet Advances with Cryptocurrency miners and Ransomware The P2PInfect malware botnet has been discovered targeting improperly configured Redis servers with ransomware and cryptocurrency … Read More

New PHP Flaw Puts Windows Servers at Risk of Remote Code Execution

New PHP Flaw Puts Windows Servers at Risk of Remote Code Execution Image Credit by Pixabay VTA-004485 – New PHP Flaw Puts Windows Servers at Risk of Remote Code Execution There is a new critical security flaw in PHP, known … Read More

RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit

RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit Image Credit by Pixabay VTA-004484 – RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit Cybercriminals using the RedTail cryptocurrency mining malware have found a new security flaw in Palo Alto Networks firewalls … Read More

Deceptive Android Apps Impersonate Google, Instagram, WhatsApp to Harvest Credentials

Deceptive Android Apps Impersonate Google, Instagram, WhatsApp to Harvest Credentials Image Credit by Pixabay VTA-004483 – Deceptive Android Apps Impersonate Google, Instagram, WhatsApp to Harvest Credentials Malicious Android applications, pretending to be Google, Instagram, Snapchat, WhatsApp, and X (previously Twitter), … Read More