Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

Fortinet, Ivanti, SAP Release Critical Security Patches Dec 2025

Fortinet fixed critical vulnerabilities in FortiOS and related products involving improper cryptographic signature verification.Ivanti released patches for Endpoint Manager, including a high-severity stored cross-site...

Storm-0249 Shifts Tactics, Uses DLL Sideloading in Ransomware Attack

The threat actor known as Storm-0249 is evolving from an initial access broker to a direct Ransomware attacker using advanced tactics.It employs domain spoofing,...

GrayBravo’s CastleLoader Malware Expands Across Four Threat Clusters

Four separate threat clusters use the CastleLoader Malware under a malware-as-a-service model.The threat group behind CastleLoader is identified as GrayBravo, known for technical sophistication...

Malicious VS Code Extensions Steal Developer Data, Removed by Microsoft

Malicious extensions disguised as developer tools were found in the Microsoft Visual Studio Code Marketplace.The extensions stole sensitive data such as WiFi passwords, clipboard...

New JS#SMUGGLER Campaign Distributes NetSupport RAT Malware

A new cyber campaign called JS#SMUGGLER uses compromised websites to distribute NetSupport RAT, a remote access trojan.The attack involves obfuscated JavaScript loaders, HTML Applications...

Critical WordPress Flaw CVE-2025-6389 Exploited in Wild Attack

A remote code execution vulnerability (CVE-2025-6389) in the Sneeit Framework WordPress plugin is being actively exploited since November 24, 2025.The flaw allows unauthenticated attackers...

Iran’s MuddyWater Hacks with UDPGangster Malware via Phishing

An Iranian Hacking group called MuddyWater is using a new backdoor Malware named UDPGangster that exploits UDP for command-and-control operations.The malware targets systems in...

CISA Adds Critical React2Shell RCE Vulnerability to KEV List

A critical remote code execution vulnerability, CVE-2025-55182, impacts React Server Components, allowing unauthenticated attackers to execute arbitrary commands.The flaw, known as React2Shell, is due...

Must read