Critical Jenkins Vulnerability Exposes Servers to RCE Attacks Image Credit by Pixabay VTA-004472 – Critical Jenkins Vulnerability Exposes Servers to RCE Attacks Jenkins is a Java-based open-source automation platform with plugins designed for continuous integration. It is used to continually …
CODEREDVTA
Vulnerability and Threat Advisories
“Security rules and techniques that helping you stay ahead of cyber threats”
New C#-Based “Silver RAT” Malware Distributed by Syrian Hackers
New C#-Based “Silver RAT” Malware Distributed by Syrian Hackers Image Credit by Pixabay VTA-004471 – New C#-Based “Silver RAT” Malware Distributed by Syrian Hackers Security experts are warning about Silver RAT, a new weapon in the malicious actor’s toolbox. This …
Lumma Malware Claims to Have the Ability to Renew Expired Google Authentication Cookies
Lumma Malware Claims to Have the Ability to Renew Expired Google Authentication Cookies Credit by Pixabay VTA-004470 – Lumma Malware Claims to Have the Ability to Renew Expired Google Authentication Cookies The Lumma information-stealer malware, also known as ‘LummaC2,’ is …
EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub
EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub Credit by Pixabay VTA-004469 – EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub The EleKtra-Leak campaign has emerged as a significant threat, targeting exposed Amazon Web Service (AWS) …
Apple Vulnerability Exploitation Allows Attackers to Recover Sensitive Information from Safari
Apple Vulnerability Exploitation Allows Attackers to Recover Sensitive Information from Safari Credit by Pixabay VTA-004468 – Apple Vulnerability Exploitation Allows Attackers to Recover Sensitive Information from Safari iLeakage is a transient execution side channel that targets Apple’s web browser, Safari. …