Most recent articles by:
Deep Shah
Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.
News
React2Shell Vulnerability Exploited for Linux Malware Attacks
The React2Shell security vulnerability is actively exploited to deploy advanced Malware such as KSwapDoor and ZnDoor.KSwapDoor is a stealthy Linux remote access tool using...
News
Critical FreePBX Flaws Expose PBX to Authentication Bypass Risks
Several security vulnerabilities were found in the open-source PBX platform FreePBX, including a critical authentication bypass.The flaws include SQL injection, arbitrary file upload, and...
News
Phishing Campaign in Russia Deploys Phantom Stealer via ISO Files
A phishing campaign named Operation MoneyMount-ISO targets Russian finance and accounting sectors using emails with malicious ISO attachments.The Phantom Stealer Malware in the ISO...
News
CyberVolk’s VolkLocker Ransomware Flawed, Files Decryptable
The pro-Russian hacktivist group CyberVolk introduced a flawed Ransomware-as-a-service named VolkLocker in August 2025.VolkLocker targets both Windows and Linux systems and encrypts files using...
News
CISA Flags High-Severity Flaw in Sierra Wireless ALEOS Routers
CISA added a high-severity vulnerability in Sierra Wireless AirLink ALEOS routers to its Known Exploited Vulnerabilities catalog due to active exploitation.CVE-2018-4063 allows remote code...
News
Apple Patches Two Exploited WebKit Zero-Days in Major Update
Apple issued security updates on December 13, 2025, addressing two WebKit vulnerabilities exploited in the wild.One flaw (CVE-2025-14174) is the same as the one...
News
GitHub Hosts New PyStoreRAT Malware Targeting Developers
A new Malware campaign uses GitHub-hosted Python repositories to distribute a JavaScript Remote Access Trojan called PyStoreRAT.PyStoreRAT is modular with multi-stage capabilities and delivers...
News
CISA Warns to Patch Critical React2Shell Vulnerability by Dec 12
The U.S. Cybersecurity and Infrastructure Security Agency has mandated federal agencies to patch the React2Shell vulnerability by December 12, 2025.React2Shell (CVE-2025-55182) is a critical...
