CODEREDVTA

Vulnerability and Threat Advisories

“Security rules and techniques that helping you stay ahead of cyber threats”

Image Credit by Pixabay
05/07/2024

China-Linked Group Exploits Cisco Switch Flaw for Malware Delivery

China-Linked Group Exploits Cisco Switch Flaw for Malware Delivery Image Credit by Pixabay VTA-004487 – China-Linked Group Exploits Cisco Switch Flaw for Malware Delivery A cyberespionage group possibly linked to China has leveraged a zero-day exploit in Cisco’s NX-OS software …

Read More
Image credit by Freepik
28/06/2024

Rust-Powered P2PInfect Botnet Advances with Cryptocurrency Miners and Ransomware

Rust-Powered P2PInfect Botnet Advances with Cryptocurrency miners and Ransomware Image credit by Freepik VTA-004486 – Rust-Powered P2PInfect Botnet Advances with Cryptocurrency miners and Ransomware The P2PInfect malware botnet has been discovered targeting improperly configured Redis servers with ransomware and cryptocurrency …

Read More
Image Credit by Pixabay
13/06/2024

New PHP Flaw Puts Windows Servers at Risk of Remote Code Execution

New PHP Flaw Puts Windows Servers at Risk of Remote Code Execution Image Credit by Pixabay VTA-004485 – New PHP Flaw Puts Windows Servers at Risk of Remote Code Execution There is a new critical security flaw in PHP, known …

Read More
Image Credit by Pixabay
04/06/2024

RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit

RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit Image Credit by Pixabay VTA-004484 – RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit Cybercriminals using the RedTail cryptocurrency mining malware have found a new security flaw in Palo Alto Networks firewalls …

Read More
Image Credit by Pixabay
14/05/2024

Deceptive Android Apps Impersonate Google, Instagram, WhatsApp to Harvest Credentials

Deceptive Android Apps Impersonate Google, Instagram, WhatsApp to Harvest Credentials Image Credit by Pixabay VTA-004483 – Deceptive Android Apps Impersonate Google, Instagram, WhatsApp to Harvest Credentials Malicious Android applications, pretending to be Google, Instagram, Snapchat, WhatsApp, and X (previously Twitter), …

Read More

Case Study