Most recent articles by:
Deep Shah
Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.
News
New NANOREMOTE Windows Backdoor Uses Google Drive API for C2
A new Windows backdoor named NANOREMOTE uses the Google Drive API for command-and-control operations.NANOREMOTE shares code characteristics with the FINALDRAFT implant linked to the...
News
WIRTE APT Targets Middle East with AshTag Malware Since 2020
An advanced persistent threat group named WIRTE has been using a new Malware suite called AshTag to attack Middle Eastern government and diplomatic targets...
News
Over 700 Gogs Instances Exploited via Critical CVE-2025-8110 Flaw
A high-severity vulnerability in the self-hosted Git service Gogs is actively exploited, affecting over 700 internet-accessible instances.The flaw, CVE-2025-8110, enables arbitrary file overwrite via...
News
Gladinet Flaw: Hard-Coded Keys Enable Remote Code Execution Exploit
A vulnerability involving hard-coded cryptographic keys impacts Gladinet CentreStack and Triofox products.Threat actors exploit the flaw to access sensitive files like web.config and perform...
News
React2Shell Exploited for Crypto Mining and Malware Attacks
React2Shell exploit leverages a critical security flaw in React Server Components (RSC) for remote code execution and Malware deployment.Attackers distribute diverse malware, including the...
News
Critical SOAPwn Flaw Enables Remote Code Execution in .NET Apps
A critical vulnerability named SOAPwn affects the .NET Framework, enabling remote code execution in enterprise applications.The flaw abuses Web Services Description Language (WSDL) imports...
News
Three PCIe IDE Vulnerabilities Expose Hardware Security Risks
Three security flaws have been found in the PCIe Integrity and Data Encryption (IDE) protocol, starting with PCIe 5.0.The flaws could lead to information...
News
WinRAR Path Traversal Bug CVE-2025-6218 Exploited Actively
A path traversal vulnerability in the Windows version of WinRAR (CVE-2025-6218) enables code execution and has active exploitation.The flaw allows attackers to place files...
