Most recent articles by:
Deep Shah
Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.
News
Fortinet, Ivanti, SAP Release Critical Security Patches Dec 2025
Fortinet fixed critical vulnerabilities in FortiOS and related products involving improper cryptographic signature verification.Ivanti released patches for Endpoint Manager, including a high-severity stored cross-site...
News
Storm-0249 Shifts Tactics, Uses DLL Sideloading in Ransomware Attack
The threat actor known as Storm-0249 is evolving from an initial access broker to a direct Ransomware attacker using advanced tactics.It employs domain spoofing,...
News
GrayBravo’s CastleLoader Malware Expands Across Four Threat Clusters
Four separate threat clusters use the CastleLoader Malware under a malware-as-a-service model.The threat group behind CastleLoader is identified as GrayBravo, known for technical sophistication...
News
Malicious VS Code Extensions Steal Developer Data, Removed by Microsoft
Malicious extensions disguised as developer tools were found in the Microsoft Visual Studio Code Marketplace.The extensions stole sensitive data such as WiFi passwords, clipboard...
News
New JS#SMUGGLER Campaign Distributes NetSupport RAT Malware
A new cyber campaign called JS#SMUGGLER uses compromised websites to distribute NetSupport RAT, a remote access trojan.The attack involves obfuscated JavaScript loaders, HTML Applications...
News
Critical WordPress Flaw CVE-2025-6389 Exploited in Wild Attack
A remote code execution vulnerability (CVE-2025-6389) in the Sneeit Framework WordPress plugin is being actively exploited since November 24, 2025.The flaw allows unauthenticated attackers...
News
Iran’s MuddyWater Hacks with UDPGangster Malware via Phishing
An Iranian Hacking group called MuddyWater is using a new backdoor Malware named UDPGangster that exploits UDP for command-and-control operations.The malware targets systems in...
News
CISA Adds Critical React2Shell RCE Vulnerability to KEV List
A critical remote code execution vulnerability, CVE-2025-55182, impacts React Server Components, allowing unauthenticated attackers to execute arbitrary commands.The flaw, known as React2Shell, is due...
