VTA

R00TK1T Hacking Group Announced Malaysia To Be Their Next Victim

R00TK1T Hacking Group Announced Malaysia To Be Their Next Victim Image Credit by Pixabay VTA-004473 – R00TK1T Hacking Group Announced Malaysia To Be Their Next Victim The “R00TK1T Hacking Group” has been identified by researchers as the threat actor that … Read More

Critical Jenkins Vulnerability Exposes Servers to RCE Attacks

Critical Jenkins Vulnerability Exposes Servers to RCE Attacks Image Credit by Pixabay VTA-004472 – Critical Jenkins Vulnerability Exposes Servers to RCE Attacks Jenkins is a Java-based open-source automation platform with plugins designed for continuous integration. It is used to continually … Read More

New C#-Based “Silver RAT” Malware Distributed by Syrian Hackers

New C#-Based “Silver RAT” Malware Distributed by Syrian Hackers Image Credit by Pixabay VTA-004471 – New C#-Based “Silver RAT” Malware Distributed by Syrian Hackers Security experts are warning about Silver RAT, a new weapon in the malicious actor’s toolbox. This … Read More

Lumma Malware Claims to Have the Ability to Renew Expired Google Authentication Cookies

Lumma Malware Claims to Have the Ability to Renew Expired Google Authentication Cookies Credit by Pixabay VTA-004470 – Lumma Malware Claims to Have the Ability to Renew Expired Google Authentication Cookies The Lumma information-stealer malware, also known as ‘LummaC2,’ is … Read More

EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub

EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub Credit by Pixabay VTA-004469 – EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub The EleKtra-Leak campaign has emerged as a significant threat, targeting exposed Amazon Web Service (AWS) … Read More

Apple Vulnerability Exploitation Allows Attackers to Recover Sensitive Information from Safari

Apple Vulnerability Exploitation Allows Attackers to Recover Sensitive Information from Safari Credit by Pixabay VTA-004468 – Apple Vulnerability Exploitation Allows Attackers to Recover Sensitive Information from Safari iLeakage is a transient execution side channel that targets Apple’s web browser, Safari. … Read More

Hackers Exploit Cloudflare to Bypass Firewall and DDoS Protections

Hackers Exploit Cloudflare to Bypass Firewall and DDoS Protections Credit by Pixabay VTA-004467 – Hackers Exploit Cloudflare to Bypass Firewall and DDoS Protections Recent findings by researchers have exposed a vulnerability that has the potential to enable attackers to circumvent … Read More

Cuba Ransomware Gang Continues to Evolve With Dangerous Backdoor

Cuba Ransomware Gang Continues to Evolve With Dangerous Backdoor Credit by Pixabay VTA-004466 – Cuba Ransomware Gang Continues to Evolve With Dangerous Backdoor An ongoing investigation by Kaspersky has discovered a brand new malware sample related to a ransomware group … Read More

DarkGate Loader Malware Infiltrates Systems via Microsoft Teams

DarkGate Loader Malware Infiltrates Systems via Microsoft Teams Credit by Adobe Stock VTA-004465 – DarkGate Loader Malware Infiltrates Systems via Microsoft Teams DarkGate Loader is a modular malware loader that can be used to deliver a variety of other malware, … Read More