CODEREDVTA

Vulnerability and Threat Advisories

“Security rules and techniques that helping you stay ahead of cyber threats”

Credited by Freepik
09/01/2026

Ni8mare Flaw Exposes n8n Automation Servers to Unauthenticated Takeover

Ni8mare Flaw Exposes n8n Automation Servers to Unauthenticated Takeover Credited by Freepik VTA-004551 – Ni8mare Flaw Exposes n8n Automation Servers to Unauthenticated Takeover A critical vulnerability in n8n, a widely used open-source workflow automation platform that connects applications, APIs and internal services to streamline …

Read More
Credited by Freepik
05/01/2026

Old Fortinet VPN Bug Resurfaces as Active 2FA Bypass Threat

Old Fortinet VPN Bug Resurfaces as Active 2FA Bypass Threat Credited by Freepik VTA-004550 – Old Fortinet VPN Bug Resurfaces as Active 2FA Bypass Threat An ongoing campaign exploiting a long-standing vulnerability in Fortinet’s FortiOS and FortiProxy products enables attackers to bypass two-factor …

Read More
Credited by Freepik
31/12/2025

ERRTraffic Scales ClickFix Attacks Through Deceptive Web Errors

ERRTraffic Scales ClickFix Attacks Through Deceptive Web Errors Credited by Freepik VTA-004549 – ERRTraffic Scales ClickFix Attacks Through Deceptive Web Errors New service dubbed ERRTraffic is accelerating and industrializing the distribution of the already prolific ClickFix malware by leveraging deceptive browser behavior. Threat actors …

Read More
Credited by Freepik
26/12/2025

PowerShell Malware Distributed Through Impersonated Microsoft Activation Sites

PowerShell Malware Distributed Through Impersonated Microsoft Activation Sites Credited by Freepik VTA-004548 – PowerShell Malware Distributed Through Impersonated Microsoft Activation Sites A typosquatted domain mimicking the popular Microsoft Activation Scripts (MAS) tool has emerged as a clever trap for Windows …

Read More
Credited by Freepik
12/12/2025

Active Attacks Target Weak Cryptography in Gladinet File-Access Products

Active Attacks Target Weak Cryptography in Gladinet File-Access Products Credited by Freepik VTA-004547 – Active Attacks Target Weak Cryptography in Gladinet File-Access Products Huntress has uncovered active exploitation of a critical flaw in Gladinet’s CentreStack and Triofox file-sharing platforms, where …

Read More

Case Study