CODEREDVTA

Vulnerability and Threat Advisories

“Security rules and techniques that helping you stay ahead of cyber threats”

Image Credit by Pixabay
31/01/2024

Critical Jenkins Vulnerability Exposes Servers to RCE Attacks

Critical Jenkins Vulnerability Exposes Servers to RCE Attacks Image Credit by Pixabay VTA-004472 – Critical Jenkins Vulnerability Exposes Servers to RCE Attacks Jenkins is a Java-based open-source automation platform with plugins designed for continuous integration. It is used to continually …

Read More
Image Credit by Pixabay
10/01/2024

New C#-Based “Silver RAT” Malware Distributed by Syrian Hackers

New C#-Based “Silver RAT” Malware Distributed by Syrian Hackers Image Credit by Pixabay VTA-004471 – New C#-Based “Silver RAT” Malware Distributed by Syrian Hackers Security experts are warning about Silver RAT, a new weapon in the malicious actor’s toolbox. This …

Read More
Credit by Pixabay
24/11/2023

Lumma Malware Claims to Have the Ability to Renew Expired Google Authentication Cookies

Lumma Malware Claims to Have the Ability to Renew Expired Google Authentication Cookies Credit by Pixabay VTA-004470 – Lumma Malware Claims to Have the Ability to Renew Expired Google Authentication Cookies The Lumma information-stealer malware, also known as ‘LummaC2,’ is …

Read More
Credit by Pixabay
02/11/2023

EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub

EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub Credit by Pixabay VTA-004469 – EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub The EleKtra-Leak campaign has emerged as a significant threat, targeting exposed Amazon Web Service (AWS) …

Read More
Credit by Pixabay
30/10/2023

Apple Vulnerability Exploitation Allows Attackers to Recover Sensitive Information from Safari

Apple Vulnerability Exploitation Allows Attackers to Recover Sensitive Information from Safari Credit by Pixabay VTA-004468 – Apple Vulnerability Exploitation Allows Attackers to Recover Sensitive Information from Safari iLeakage is a transient execution side channel that targets Apple’s web browser, Safari. …

Read More

Case Study