VTA

Operation 99: Lazarus Group Targets Developers with Sophisticated Cyberattack

Operation 99: Lazarus Group Targets Developers with Sophisticated Cyberattack VTA-004504 – Operation 99: Lazarus Group Targets Developers with Sophisticated Cyberattack On January 9, 2025, researchers discovered Operation 99, a cyberattack by North Korea’s Lazarus Group targeting software developers in Web3 and … Read More

“DoubleClickjacking” Exploit Bypasses Clickjacking Protection

“DoubleClickjacking” Exploit Bypasses Clickjacking Protection Credited by Freepik VTA-004503 – “DoubleClickjacking” Exploit Bypasses Clickjacking Protections DoubleClickjacking is a recently identified exploit that circumvents traditional clickjacking protections by manipulating the behavior of a double-click sequence. Unlike conventional clickjacking, which deceives users … Read More

New Sophisticated Attack Weaponizes Windows Defender to Bypass EDR

New Sophisticated Attack Weaponizes Windows Defender to Bypass EDR Credited by Freepik VTA-004502 – New Sophisticated Attack Weaponizes Windows Defender to Bypass EDR A new attack exploits Windows Defender Application Control (WDAC) to disable Endpoint Detection and Response (EDR) sensors, … Read More

Lazarus Group’s LinkedIn Scheme Leads to Major Crypto Theft

Lazarus Group’s LinkedIn Scheme Leads to Major Crypto Theft Credited by Freepik VTA-004501 – Lazarus Group’s LinkedIn Scheme Leads to Major Crypto Theft In April, the Bahrain-based cryptocurrency exchange Rain.com suffered a significant security breach, resulting in a loss of … Read More

Active Exploitation of PAN-OS Firewall Zero-Day Vulnerability

Active Exploitation of PAN-OS Firewall Zero-Day Vulnerability Credited by Freepik VTA-004500 – Active Exploitation of PAN-OS Firewall Zero-Day Vulnerability Palo Alto Networks has identified a critical zero-day vulnerability in its PAN-OS firewall management interface, actively exploited in the wild. The … Read More

Six Major Vulnerabilities Discovered in Ollama AI Framework: Risks of Model Theft, Poisoning, and Denial-of-Service

Six Major Vulnerabilities Discovered in Ollama AI Framework: Risks of Model Theft, Poisoning, and Denial-of-Service Credited by Freepik VTA-004499 – Six Major Vulnerabilities Discovered in Ollama AI Framework: Risks of Model Theft, Poisoning, and Denial-of-Service Ollama, an open-source application for … Read More

Severe Authentication Bypass Vulnerability in Fortinet FortiManager Allows Remote Code Execution

Severe Authentication Bypass Vulnerability in Fortinet FortiManager Allows Remote Code Execution Credit by Freepik VTA-004498 – Severe Authentication Bypass Vulnerability in Fortinet FortiManager Allows Remote Code Execution Researchers have been alerted to a critical vulnerability in FortiManager’s fgfmd daemon, which … Read More

OilRig Exploits Windows Kernal Flaw in Cyber Espionage

OilRig Exploits Windows Kernel Flaw in Cyber Espionage Credited by Freepik VTA-004497 – OilRig Exploits Windows Kernel Flaw in Cyber Espionage Iranian cyber espionage group OilRig, also tracked as Earth Simnavaz among other names, has recently escalated its cyber attacks … Read More

Weaponizing Visual Studio Code for Remote Access in Sophisticated Cyber Attacks

Weaponizing Visual Studio Code for Remote Access in Sophisticated Cyber Attacks Credited by Pixabay VTA-004496 – Weaponizing Visual Studio Code for Remote Access in Sophisticated Cyber Attacks Researchers have uncovered a clever cyber attack that starts with a malicious “.LNK” … Read More