Rust-Powered P2PInfect Botnet Advances with Cryptocurrency miners and Ransomware Image credit by Freepik VTA-004486 – Rust-Powered P2PInfect Botnet Advances with Cryptocurrency miners and Ransomware The P2PInfect malware botnet has been discovered targeting improperly configured Redis servers with ransomware and cryptocurrency … Read More
VTA
New PHP Flaw Puts Windows Servers at Risk of Remote Code Execution
New PHP Flaw Puts Windows Servers at Risk of Remote Code Execution Image Credit by Pixabay VTA-004485 – New PHP Flaw Puts Windows Servers at Risk of Remote Code Execution There is a new critical security flaw in PHP, known … Read More
RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit
RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit Image Credit by Pixabay VTA-004484 – RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit Cybercriminals using the RedTail cryptocurrency mining malware have found a new security flaw in Palo Alto Networks firewalls … Read More
Deceptive Android Apps Impersonate Google, Instagram, WhatsApp to Harvest Credentials
Deceptive Android Apps Impersonate Google, Instagram, WhatsApp to Harvest Credentials Image Credit by Pixabay VTA-004483 – Deceptive Android Apps Impersonate Google, Instagram, WhatsApp to Harvest Credentials Malicious Android applications, pretending to be Google, Instagram, Snapchat, WhatsApp, and X (previously Twitter), … Read More
Critical Flaw in Atlassian Products Exploited to Deliver Cerber Ransomware to Linux Machines
Critical Flaw in Atlassian Products Exploited to Deliver Cerber Ransomware to Linux Machines Image Credit by Unsplash VTA-004482 – Critical Flaw in Atlassian Products Exploited to Deliver Cerber Ransomware to Linux Machines Hackers are taking advantage of vulnerabilities in outdated … Read More
South Asian iPhone Users Targeted by Chinese-Linked LightSpy iOS Spyware
South Asian iPhone Users Targeted by Chinese-Linked LightSpy iOS Spyware Image Credit by Pixabay VTA-004481 – South Asian iPhone Users Targeted by Chinese-Linked Lightspy iOS Spyware Cybersecurity experts have identified a “renewed” cyber espionage effort directed at users in South … Read More
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack Image Credit by Pixabay VTA-004480 – Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack A critical security vulnerability, identified as CVE-2024-3400, allows unauthenticated attackers to execute code with root privileges … Read More
TA547 Phishing Campaign Uses Rhadamanthys Stealer In Evolving Phishing Attacks
TA547 Phishing Campaign Uses Rhadamanthys Stealer In Evolving Phishing Attacks Image Credit by Pixabay VTA-004479 – TA547 Phishing Campaign Uses Rhadamanthys Stealer In Evolving Phishing Attacks TA547, a financially motivated cybercriminal group, has targeted German organizations with a new information … Read More
Hackers Employ Malicious Ads to Target macOS Users with Stealer Malware
Hackers Employ Malicious Ads to Target macOS Users with Stealer Malware Image Credit by Pixabay VTA-004478 – Hackers Employ Malicious Ads to Target macOS Users with Stealer Malware Malicious advertisements and fake websites are being used to distribute two distinct … Read More