PowerShell Malware Distributed Through Impersonated Microsoft Activation Sites Credited by Freepik VTA-004548 – PowerShell Malware Distributed Through Impersonated Microsoft Activation Sites A typosquatted domain mimicking the popular Microsoft Activation Scripts (MAS) tool has emerged as a clever trap for Windows …
CODEREDVTA
Vulnerability and Threat Advisories
“Security rules and techniques that helping you stay ahead of cyber threats”
Active Attacks Target Weak Cryptography in Gladinet File-Access Products
Active Attacks Target Weak Cryptography in Gladinet File-Access Products Credited by Freepik VTA-004547 – Active Attacks Target Weak Cryptography in Gladinet File-Access Products Huntress has uncovered active exploitation of a critical flaw in Gladinet’s CentreStack and Triofox file-sharing platforms, where …
Shanya The Silent Engine Behind Modern Stealth Attacks
Shanya The Silent Engine Behind Modern Stealth Attacks Credited by Freepik VTA-004546 – Shanya The Silent Engine Behind Modern Stealth Attacks Shanya, a sophisticated packer-as-a-service (PaaS) advertised as VX Crypt, has quickly become a go-to tool for ransomware operators seeking to evade endpoint detection …
Critical React2Shell Vulnerability (CVE-2025-66478) Enables Remote Code Execution in Next.js Applications
Critical React2Shell Vulnerability (CVE-2025-66478) Enables Remote Code Execution in Next.js Applications Credited by Freepik VTA-004545 – Critical React2Shell Vulnerability (CVE-2025-66478) Enables Remote Code Execution in Next.js Applications The React2Shell vulnerability (CVE-2025-66478) exposes a critical remote code execution flaw in Next.js …
Why DragonForce Ransomware Is More Dangerous Than Ever With Scattered Spider Support
Why DragonForce Ransomware Is More Dangerous Than Ever With Scattered Spider Support Credited by Freepik VTA-004544 – Why DragonForce Ransomware Is More Dangerous Than Ever With Scattered Spider Support Recent analysis by the Acronis Threat Research Unit reveals that the DragonForce ransomware …