Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

React2Shell Vulnerability Exploited for Linux Malware Attacks

The React2Shell security vulnerability is actively exploited to deploy advanced Malware such as KSwapDoor and ZnDoor.KSwapDoor is a stealthy Linux remote access tool using...

Critical FreePBX Flaws Expose PBX to Authentication Bypass Risks

Several security vulnerabilities were found in the open-source PBX platform FreePBX, including a critical authentication bypass.The flaws include SQL injection, arbitrary file upload, and...

Phishing Campaign in Russia Deploys Phantom Stealer via ISO Files

A phishing campaign named Operation MoneyMount-ISO targets Russian finance and accounting sectors using emails with malicious ISO attachments.The Phantom Stealer Malware in the ISO...

CyberVolk’s VolkLocker Ransomware Flawed, Files Decryptable

The pro-Russian hacktivist group CyberVolk introduced a flawed Ransomware-as-a-service named VolkLocker in August 2025.VolkLocker targets both Windows and Linux systems and encrypts files using...

CISA Flags High-Severity Flaw in Sierra Wireless ALEOS Routers

CISA added a high-severity vulnerability in Sierra Wireless AirLink ALEOS routers to its Known Exploited Vulnerabilities catalog due to active exploitation.CVE-2018-4063 allows remote code...

Apple Patches Two Exploited WebKit Zero-Days in Major Update

Apple issued security updates on December 13, 2025, addressing two WebKit vulnerabilities exploited in the wild.One flaw (CVE-2025-14174) is the same as the one...

GitHub Hosts New PyStoreRAT Malware Targeting Developers

A new Malware campaign uses GitHub-hosted Python repositories to distribute a JavaScript Remote Access Trojan called PyStoreRAT.PyStoreRAT is modular with multi-stage capabilities and delivers...

CISA Warns to Patch Critical React2Shell Vulnerability by Dec 12

The U.S. Cybersecurity and Infrastructure Security Agency has mandated federal agencies to patch the React2Shell vulnerability by December 12, 2025.React2Shell (CVE-2025-55182) is a critical...

Must read