R00TK1T Hacking Group Announced Malaysia To Be Their Next Victim Image Credit by Pixabay VTA-004473 – R00TK1T Hacking Group Announced Malaysia To Be Their Next Victim The “R00TK1T Hacking Group” has been identified by researchers as the threat actor that … Read More
VTA
Critical Jenkins Vulnerability Exposes Servers to RCE Attacks
Critical Jenkins Vulnerability Exposes Servers to RCE Attacks Image Credit by Pixabay VTA-004472 – Critical Jenkins Vulnerability Exposes Servers to RCE Attacks Jenkins is a Java-based open-source automation platform with plugins designed for continuous integration. It is used to continually … Read More
New C#-Based “Silver RAT” Malware Distributed by Syrian Hackers
New C#-Based “Silver RAT” Malware Distributed by Syrian Hackers Image Credit by Pixabay VTA-004471 – New C#-Based “Silver RAT” Malware Distributed by Syrian Hackers Security experts are warning about Silver RAT, a new weapon in the malicious actor’s toolbox. This … Read More
Lumma Malware Claims to Have the Ability to Renew Expired Google Authentication Cookies
Lumma Malware Claims to Have the Ability to Renew Expired Google Authentication Cookies Credit by Pixabay VTA-004470 – Lumma Malware Claims to Have the Ability to Renew Expired Google Authentication Cookies The Lumma information-stealer malware, also known as ‘LummaC2,’ is … Read More
EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub
EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub Credit by Pixabay VTA-004469 – EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub The EleKtra-Leak campaign has emerged as a significant threat, targeting exposed Amazon Web Service (AWS) … Read More
Apple Vulnerability Exploitation Allows Attackers to Recover Sensitive Information from Safari
Apple Vulnerability Exploitation Allows Attackers to Recover Sensitive Information from Safari Credit by Pixabay VTA-004468 – Apple Vulnerability Exploitation Allows Attackers to Recover Sensitive Information from Safari iLeakage is a transient execution side channel that targets Apple’s web browser, Safari. … Read More
Hackers Exploit Cloudflare to Bypass Firewall and DDoS Protections
Hackers Exploit Cloudflare to Bypass Firewall and DDoS Protections Credit by Pixabay VTA-004467 – Hackers Exploit Cloudflare to Bypass Firewall and DDoS Protections Recent findings by researchers have exposed a vulnerability that has the potential to enable attackers to circumvent … Read More
Cuba Ransomware Gang Continues to Evolve With Dangerous Backdoor
Cuba Ransomware Gang Continues to Evolve With Dangerous Backdoor Credit by Pixabay VTA-004466 – Cuba Ransomware Gang Continues to Evolve With Dangerous Backdoor An ongoing investigation by Kaspersky has discovered a brand new malware sample related to a ransomware group … Read More
DarkGate Loader Malware Infiltrates Systems via Microsoft Teams
DarkGate Loader Malware Infiltrates Systems via Microsoft Teams Credit by Adobe Stock VTA-004465 – DarkGate Loader Malware Infiltrates Systems via Microsoft Teams DarkGate Loader is a modular malware loader that can be used to deliver a variety of other malware, … Read More