CODEREDVTA

Vulnerability and Threat Advisories

“Security rules and techniques that helping you stay ahead of cyber threats”

Credited by Pixabay
25/07/2025

Hackers Exploit Critical SharePoint Vulnerability for Full Server Takeover

Hackers Exploit Critical SharePoint Vulnerability for Full Server Takeover Credited by Pixabay VTA-004526 – Hackers Exploit Critical SharePoint Vulnerability for Full Server Takeover A newly discovered cyberattack campaign is exploiting a critical vulnerability chain in Microsoft SharePoint servers, allowing attackers …

Read More
Credited by Freepik
18/07/2025

HazyBeacon Malware Exploits AWS Lambda for Covert Data Theft

HazyBeacon Malware Exploits AWS Lambda for Covert Data Theft Credited by Freepik VTA-004523 – HazyBeacon Malware Exploits AWS Lambda for Covert Data Theft A newly discovered Windows backdoor, HazyBeacon, is targeting Southeast Asian government agencies to steal sensitive data, including …

Read More
Credited by Freepik
11/07/2025

Meeten Campaign Leverages Social Platforms to Deliver Malware to Crypto Users

Meeten Campaign Leverages Social Platforms to Deliver Malware to Crypto Users Credited by Freepik VTA-004522 – Meeten Campaign Leverages Social Platforms to Deliver Malware to Crypto Users A social engineering campaign is targeting cryptocurrency users, deploying malware to steal digital …

Read More
Credited by Freepik
04/07/2025

DEVMAN Ransomware Targets Windows Systems with Flawed DragonForce and Conti Hybrid

DEVMAN Ransomware Targets Windows Systems with Flawed DragonForce and Conti Hybrid Credited by Freepik VTA-004521 – DEVMAN Ransomware Targets Windows Systems with Flawed DragonForce and Conti Hybrid A new ransomware variant named DEVMAN has emerged, built on the DragonForce and …

Read More
Credited by Freepik
24/06/2025

SERPENTINE#CLOUD Exploits Cloudflare Tunnels for Malware Delivery

SERPENTINE#CLOUD Exploits Cloudflare Tunnels for Malware Delivery Credited by Freepik VTA-004520 – SERPENTINE#CLOUD Exploits Cloudflare Tunnels for Malware Delivery A new phishing campaign, dubbed SERPENTINE#CLOUD, is exploiting Cloudflare Tunnel subdomains to deliver malware through obfuscated scripts and memory-injected payloads. Researchers …

Read More

Case Study