Most recent articles by:
Deep Shah
Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.
News
React Fixes New DoS, Source Leak Flaws in Server Components
React released patches for two new vulnerabilities in React Server Components that could cause denial-of-service or source code leaks.The flaws were discovered during attempts...
News
CISA Flags High-Severity Vulnerability in OSGeo GeoServer Software
CISA has added a high-severity vulnerability affecting OSGeo GeoServer to its Known Exploited Vulnerabilities catalog due to active exploitation.The flaw, CVE-2025-58360, is an unauthenticated...
News
Google Patches Actively Exploited Chrome Zero-Day Flaw
Google released security updates for Chrome addressing three vulnerabilities, one actively exploited.The main flaw resides in the open-source ANGLE graphics library as a buffer...
News
New NANOREMOTE Windows Backdoor Uses Google Drive API for C2
A new Windows backdoor named NANOREMOTE uses the Google Drive API for command-and-control operations.NANOREMOTE shares code characteristics with the FINALDRAFT implant linked to the...
News
WIRTE APT Targets Middle East with AshTag Malware Since 2020
An advanced persistent threat group named WIRTE has been using a new Malware suite called AshTag to attack Middle Eastern government and diplomatic targets...
News
Over 700 Gogs Instances Exploited via Critical CVE-2025-8110 Flaw
A high-severity vulnerability in the self-hosted Git service Gogs is actively exploited, affecting over 700 internet-accessible instances.The flaw, CVE-2025-8110, enables arbitrary file overwrite via...
News
Gladinet Flaw: Hard-Coded Keys Enable Remote Code Execution Exploit
A vulnerability involving hard-coded cryptographic keys impacts Gladinet CentreStack and Triofox products.Threat actors exploit the flaw to access sensitive files like web.config and perform...
News
React2Shell Exploited for Crypto Mining and Malware Attacks
React2Shell exploit leverages a critical security flaw in React Server Components (RSC) for remote code execution and Malware deployment.Attackers distribute diverse malware, including the...
