China-Linked Group Exploits Cisco Switch Flaw for Malware Delivery Image Credit by Pixabay VTA-004487 – China-Linked Group Exploits Cisco Switch Flaw for Malware Delivery A cyberespionage group possibly linked to China has leveraged a zero-day exploit in Cisco’s NX-OS software …
CODEREDVTA
Vulnerability and Threat Advisories
“Security rules and techniques that helping you stay ahead of cyber threats”
Rust-Powered P2PInfect Botnet Advances with Cryptocurrency Miners and Ransomware
Rust-Powered P2PInfect Botnet Advances with Cryptocurrency miners and Ransomware Image credit by Freepik VTA-004486 – Rust-Powered P2PInfect Botnet Advances with Cryptocurrency miners and Ransomware The P2PInfect malware botnet has been discovered targeting improperly configured Redis servers with ransomware and cryptocurrency …
New PHP Flaw Puts Windows Servers at Risk of Remote Code Execution
New PHP Flaw Puts Windows Servers at Risk of Remote Code Execution Image Credit by Pixabay VTA-004485 – New PHP Flaw Puts Windows Servers at Risk of Remote Code Execution There is a new critical security flaw in PHP, known …
RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit
RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit Image Credit by Pixabay VTA-004484 – RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit Cybercriminals using the RedTail cryptocurrency mining malware have found a new security flaw in Palo Alto Networks firewalls …
Deceptive Android Apps Impersonate Google, Instagram, WhatsApp to Harvest Credentials
Deceptive Android Apps Impersonate Google, Instagram, WhatsApp to Harvest Credentials Image Credit by Pixabay VTA-004483 – Deceptive Android Apps Impersonate Google, Instagram, WhatsApp to Harvest Credentials Malicious Android applications, pretending to be Google, Instagram, Snapchat, WhatsApp, and X (previously Twitter), …