CODEREDVTA

Vulnerability and Threat Advisories

“Security rules and techniques that helping you stay ahead of cyber threats”

Image Credit by Pixabay
02/08/2023

Hackers Utilize WhatsApp for Phishing Messages to Distribute Malware

VTA – Hackers Utilize WhatsApp for Phishing Messages to Distribute Malware Credit by Pixabay VTA-004450 – Hackers Utilize WhatsApp for Phishing Messages to Distribute Malware The researchers recently obtained advanced Android malware through a deceptive chat app. The suspicious Android …

Read More
Image Credit by Pixabay
25/07/2023

Human Error Leads to Customer Details Data Leak on VirusTotal

Human Error Leads to Customer Details Data Leak on VirusTotal Credit by Pixabay VTA-00449 – Human Error Leads to Customer Details Data Leak on VirusTotal According to the IBM Cyber Security Intelligence Index Report, June 2022, 95% of cybersecurity breaches are …

Read More
Image Credit By Pixabay
21/07/2023

APT41 Mobile Espionage Campaign with WyrmSpy and DragonEgg Spyware

VTA-00448 – APT41 Mobile Espionage Campaign with WyrmSpy and DragonEgg Spyware The Chinese state-sponsored group APT41, known for its wide-ranging cyber espionage and financial gain activities, has set its sights on a new target: mobile platforms. Cybersecurity firm Lookout has identified …

Read More
Image Credit By Pixabay
21/07/2023

TeamTNT Cloud Credentials Stealing Campaigns Targeting AWS, Azure, and GCP

VTA-00447 – TeamTNT Cloud Credentials Stealing Campaigns Targeting AWS, Azure, and GCP Starting in June 2023, an actor initiated a cloud credentials stealing campaign primarily targeting Amazon Web Services (AWS) credentials from public-facing Jupyter Notebooks services. Collaborating with the Permiso Security …

Read More
Image Credit by Pixabay
16/07/2023

Hackers Exploit WEBAPK To Install Malware On Android Devices

VTA-00446 – Hackers Exploit WEBAPK To Install Malware On Android Devices According to the most recent research, Android devices are the target of a brand-new, highly sophisticated attack using Webapk technology. Through a Smishing attempts, the threat actors convince the victim …

Read More

Case Study