Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

Malicious Python Package Steals Credentials

Threat actors published two malicious versions of the popular Python package Lightning (2.6.2 and 2.6.3) on April 30, 2026, as part of a supply...

DEEP#DOOR Python Backdoor Steals Cloud Credentials

A stealthy Python backdoor called DEEP#DOOR uses a tunneling service for command-and-control to steal sensitive data, including cloud credentials and SSH keys.The malware embeds...

Linux “Copy Fail” Bug Lets Local Users Gain Root

A critical Linux flaw allows an unprivileged local user to write to a file's cache and escalate to root privileges.The vulnerability, tracked as CVE-2026-31431,...

Supply chain attack hits SAP npm packages with malware

A supply chain attack compromised four key SAP-related npm packages with credential-stealing malware on April 29, 2026.The malware, self-titled mini Shai-Hulud, steals developer and...

Critical cPanel auth flaw threatens hosting control panels

cPanel has issued urgent security updates to fix a critical authentication vulnerability.All currently supported versions of the web hosting control panel software are affected.Hosting...

CISA adds ConnectWise, Microsoft flaws to exploit

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two actively exploited software flaws to its high-threat catalog on April 29, 2026.The new entries...

Critical GitHub RCE Flaw Lets Attacker Execute Code via Git Push

A critical vulnerability (CVE-2026-3854) in GitHub allowed remote code execution via a single "git push" command.The flaw was a command injection issue where unsanitized...

Hugging Face LeRobot Flaw Allows Remote Code Execution

A critical security flaw (CVE-2026-25874) has been disclosed in Hugging Face's open-source robotics platform, LeRobot, allowing unauthenticated remote code execution.The flaw stems from unsafe...

Must read