CODEREDVTA

Vulnerability and Threat Advisories

“Security rules and techniques that helping you stay ahead of cyber threats”

Image Credit by Unsplash
23/04/2024

Critical Flaw in Atlassian Products Exploited to Deliver Cerber Ransomware to Linux Machines

Critical Flaw in Atlassian Products Exploited to Deliver Cerber Ransomware to Linux Machines Image Credit by Unsplash VTA-004482 – Critical Flaw in Atlassian Products Exploited to Deliver Cerber Ransomware to Linux Machines Hackers are taking advantage of vulnerabilities in outdated …

Read More
Image Credit by Pixabay
17/04/2024

South Asian iPhone Users Targeted by Chinese-Linked LightSpy iOS Spyware

South Asian iPhone Users Targeted by Chinese-Linked LightSpy iOS Spyware Image Credit by Pixabay VTA-004481 – South Asian iPhone Users Targeted by Chinese-Linked Lightspy iOS Spyware Cybersecurity experts have identified a “renewed” cyber espionage effort directed at users in South …

Read More
Image Credit by Pixabay
16/04/2024

Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack

Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack Image Credit by Pixabay VTA-004480 – Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack A critical security vulnerability, identified as CVE-2024-3400, allows unauthenticated attackers to execute code with root privileges …

Read More
Image Credit by Pixabay
12/04/2024

TA547 Phishing Campaign Uses Rhadamanthys Stealer In Evolving Phishing Attacks

TA547 Phishing Campaign Uses Rhadamanthys Stealer In Evolving Phishing Attacks Image Credit by Pixabay VTA-004479 – TA547 Phishing Campaign Uses Rhadamanthys Stealer In Evolving Phishing Attacks TA547, a financially motivated cybercriminal group, has targeted German organizations with a new information …

Read More
Image Credit by Pixabay
04/04/2024

Hackers Employ Malicious Ads to Target macOS Users with Stealer Malware

Hackers Employ Malicious Ads to Target macOS Users with Stealer Malware Image Credit by Pixabay VTA-004478 – Hackers Employ Malicious Ads to Target macOS Users with Stealer Malware Malicious advertisements and fake websites are being used to distribute two distinct …

Read More

Case Study