CODEREDVTA

Vulnerability and Threat Advisories

“Security rules and techniques that helping you stay ahead of cyber threats”

Credited by Pixabay
04/10/2024

Critical Linux CUPS Printing System Flaws Could Allow Remote Command Execution

Critical Linux CUPS Printing System Flaws Could Allow Remote Command Execution Credited by Pixabay VTA-004495 – Critical Linux CUPS Printing System Flaws Could Allow Remote Command Execution A critical vulnerability has been identified in CUPS, a widely used printing system, …

Read More
Credited by Pixabay
05/09/2024

Spoofed GlobalProtect Used to Deliver Unique WikiLoader Variant

Spoofed GlobalProtect Used to Deliver Unique WikiLoader Variant Credited by Pixabay VTA-004494 – Spoofed GlobalProtect Used to Deliver Unique WikiLoader Variant Palo Alto Networks’ Unit 42 discovered a new campaign using SEO poisoning to trick users into downloading a disguised …

Read More
Credited by Pixabay
02/09/2024

North Korean APT Group Exploits Chrome Zero-Day to Deploy FudModule Rootkit Malware

North Korean APT Group Exploits Chrome Zero-Day to Deploy FudModule Rootkit Malware Credited by Pixabay VTA-004493 – North Korean APT Group Exploits Chrome Zero-Day to Deploy FudModule Rootkit Malware In a recent cyberattack, North Korean state-sponsored hackers successfully exploited a …

Read More
Credited by Pixabay
31/08/2024

Sophisticated Phishing Scam Leverages Microsoft Sway and QR Codes

Sophisticated Phishing Scam Leverages Microsoft Sway and QR Codes Credited by Pixabay VTA-004492 – Sophisticated Phishing Scam Leverages Microsoft Sway and QR Codes Cybersecurity experts are raising concerns about a new phishing campaign using QR codes, known as “quishing,” which …

Read More
Image Credit by Pixabay
26/07/2024

Newly Discovered OpenSSH Vulnerability Known As ‘regreSSHion’ Allows Remote Code Execution with Root Privileges

Newly Discovered OpenSSH Vulnerability Known As ‘regreSSHion’ Allows Remote Code Execution with Root Privileges Image Credit by Pixabay VTA-004491 – Newly Discovered OpenSSH Vulnerability Known As ‘regreSSHion’ Allows Remote Code Execution with Root Privileges CVE-2024–6387, dubbed “regreSSHion,” has been discovered …

Read More

Case Study