CODEREDVTA

Vulnerability and Threat Advisories

“Security rules and techniques that helping you stay ahead of cyber threats”

Credited by Freepik
16/10/2024

OilRig Exploits Windows Kernal Flaw in Cyber Espionage

OilRig Exploits Windows Kernel Flaw in Cyber Espionage Credited by Freepik VTA-004497 – OilRig Exploits Windows Kernel Flaw in Cyber Espionage Iranian cyber espionage group OilRig, also tracked as Earth Simnavaz among other names, has recently escalated its cyber attacks …

Read More
Credited by Pixabay
11/10/2024

Weaponizing Visual Studio Code for Remote Access in Sophisticated Cyber Attacks

Weaponizing Visual Studio Code for Remote Access in Sophisticated Cyber Attacks Credited by Pixabay VTA-004496 – Weaponizing Visual Studio Code for Remote Access in Sophisticated Cyber Attacks Researchers have uncovered a clever cyber attack that starts with a malicious “.LNK” …

Read More
Credited by Pixabay
04/10/2024

Critical Linux CUPS Printing System Flaws Could Allow Remote Command Execution

Critical Linux CUPS Printing System Flaws Could Allow Remote Command Execution Credited by Pixabay VTA-004495 – Critical Linux CUPS Printing System Flaws Could Allow Remote Command Execution A critical vulnerability has been identified in CUPS, a widely used printing system, …

Read More
Credited by Pixabay
05/09/2024

Spoofed GlobalProtect Used to Deliver Unique WikiLoader Variant

Spoofed GlobalProtect Used to Deliver Unique WikiLoader Variant Credited by Pixabay VTA-004494 – Spoofed GlobalProtect Used to Deliver Unique WikiLoader Variant Palo Alto Networks’ Unit 42 discovered a new campaign using SEO poisoning to trick users into downloading a disguised …

Read More
Credited by Pixabay
02/09/2024

North Korean APT Group Exploits Chrome Zero-Day to Deploy FudModule Rootkit Malware

North Korean APT Group Exploits Chrome Zero-Day to Deploy FudModule Rootkit Malware Credited by Pixabay VTA-004493 – North Korean APT Group Exploits Chrome Zero-Day to Deploy FudModule Rootkit Malware In a recent cyberattack, North Korean state-sponsored hackers successfully exploited a …

Read More

Case Study