CODEREDVTA

Vulnerability and Threat Advisories

“Security rules and techniques that helping you stay ahead of cyber threats”

Image Credit by Pixabay
10/01/2024

New C#-Based “Silver RAT” Malware Distributed by Syrian Hackers

New C#-Based “Silver RAT” Malware Distributed by Syrian Hackers Image Credit by Pixabay VTA-004471 – New C#-Based “Silver RAT” Malware Distributed by Syrian Hackers Security experts are warning about Silver RAT, a new weapon in the malicious actor’s toolbox. This …

Read More
Credit by Pixabay
24/11/2023

Lumma Malware Claims to Have the Ability to Renew Expired Google Authentication Cookies

Lumma Malware Claims to Have the Ability to Renew Expired Google Authentication Cookies Credit by Pixabay VTA-004470 – Lumma Malware Claims to Have the Ability to Renew Expired Google Authentication Cookies The Lumma information-stealer malware, also known as ‘LummaC2,’ is …

Read More
Credit by Pixabay
02/11/2023

EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub

EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub Credit by Pixabay VTA-004469 – EleKtra-Leak Cryptojacking Attacks Exploit AWS IAM Credentials Exposed on GitHub The EleKtra-Leak campaign has emerged as a significant threat, targeting exposed Amazon Web Service (AWS) …

Read More
Credit by Pixabay
30/10/2023

Apple Vulnerability Exploitation Allows Attackers to Recover Sensitive Information from Safari

Apple Vulnerability Exploitation Allows Attackers to Recover Sensitive Information from Safari Credit by Pixabay VTA-004468 – Apple Vulnerability Exploitation Allows Attackers to Recover Sensitive Information from Safari iLeakage is a transient execution side channel that targets Apple’s web browser, Safari. …

Read More
Credit by Pixabay
05/10/2023

Hackers Exploit Cloudflare to Bypass Firewall and DDoS Protections

Hackers Exploit Cloudflare to Bypass Firewall and DDoS Protections Credit by Pixabay VTA-004467 – Hackers Exploit Cloudflare to Bypass Firewall and DDoS Protections Recent findings by researchers have exposed a vulnerability that has the potential to enable attackers to circumvent …

Read More

Case Study