Deceptive Android Apps Impersonate Google, Instagram, WhatsApp to Harvest Credentials Image Credit by Pixabay VTA-004483 – Deceptive Android Apps Impersonate Google, Instagram, WhatsApp to Harvest Credentials Malicious Android applications, pretending to be Google, Instagram, Snapchat, WhatsApp, and X (previously Twitter), …
CODEREDVTA
Vulnerability and Threat Advisories
“Security rules and techniques that helping you stay ahead of cyber threats”
Critical Flaw in Atlassian Products Exploited to Deliver Cerber Ransomware to Linux Machines
Critical Flaw in Atlassian Products Exploited to Deliver Cerber Ransomware to Linux Machines Image Credit by Unsplash VTA-004482 – Critical Flaw in Atlassian Products Exploited to Deliver Cerber Ransomware to Linux Machines Hackers are taking advantage of vulnerabilities in outdated …
South Asian iPhone Users Targeted by Chinese-Linked LightSpy iOS Spyware
South Asian iPhone Users Targeted by Chinese-Linked LightSpy iOS Spyware Image Credit by Pixabay VTA-004481 – South Asian iPhone Users Targeted by Chinese-Linked Lightspy iOS Spyware Cybersecurity experts have identified a “renewed” cyber espionage effort directed at users in South …
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack Image Credit by Pixabay VTA-004480 – Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack A critical security vulnerability, identified as CVE-2024-3400, allows unauthenticated attackers to execute code with root privileges …
TA547 Phishing Campaign Uses Rhadamanthys Stealer In Evolving Phishing Attacks
TA547 Phishing Campaign Uses Rhadamanthys Stealer In Evolving Phishing Attacks Image Credit by Pixabay VTA-004479 – TA547 Phishing Campaign Uses Rhadamanthys Stealer In Evolving Phishing Attacks TA547, a financially motivated cybercriminal group, has targeted German organizations with a new information …