New C#-Based “Silver RAT” Malware Distributed by Syrian Hackers Image Credit by Pixabay VTA-004471 – New C#-Based “Silver RAT” Malware Distributed by Syrian Hackers Security experts are warning about Silver RAT, a new weapon in the malicious actor’s toolbox. This …
CODEREDVTA
Vulnerability and Threat Advisories
“Security rules and techniques that helping you stay ahead of cyber threats”
Lumma Malware Claims to Have the Ability to Renew Expired Google Authentication Cookies
Lumma Malware Claims to Have the Ability to Renew Expired Google Authentication Cookies Credit by Pixabay VTA-004470 – Lumma Malware Claims to Have the Ability to Renew Expired Google Authentication Cookies The Lumma information-stealer malware, also known as ‘LummaC2,’ is …
EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub
EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub Credit by Pixabay VTA-004469 – EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub The EleKtra-Leak campaign has emerged as a significant threat, targeting exposed Amazon Web Service (AWS) …
Apple Vulnerability Exploitation Allows Attackers to Recover Sensitive Information from Safari
Apple Vulnerability Exploitation Allows Attackers to Recover Sensitive Information from Safari Credit by Pixabay VTA-004468 – Apple Vulnerability Exploitation Allows Attackers to Recover Sensitive Information from Safari iLeakage is a transient execution side channel that targets Apple’s web browser, Safari. …
Hackers Exploit Cloudflare to Bypass Firewall and DDoS Protections
Hackers Exploit Cloudflare to Bypass Firewall and DDoS Protections Credit by Pixabay VTA-004467 – Hackers Exploit Cloudflare to Bypass Firewall and DDoS Protections Recent findings by researchers have exposed a vulnerability that has the potential to enable attackers to circumvent …