Most recent articles by:
Deep Shah
Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.
News
Noodlophile Malware Targets Enterprises via Copyright Phishing Emails
Noodlophile Malware targets companies in the U.S., Europe, the Baltics, and Asia-Pacific with advanced phishing campaigns.
Attackers use spear-phishing emails disguised as copyright infringement notices,...
News
Malicious PyPI Packages Uncovered: Supply Chain Risk for Python
Researchers identified malicious Python and npm packages facilitating Malware attacks through official repositories.
The compromised Python packages, termncolor and colorinal, enabled remote code execution and...
News
ERMAC 3.0 Android Trojan Source Code Leak Exposes Major Flaws
Researchers revealed a new version of the Android banking trojan ERMAC 3.0, which targets over 700 financial and cryptocurrency apps.
ERMAC 3.0 shows expanded data...
News
Agentic AI Challenges Traditional Privacy, Demands New Trust Model
Privacy is shifting from control to trust as Artificial Intelligence becomes more autonomous.Agentic AI systems interpret, act on, and evolve with sensitive user data,...
News
CrossC2 Enables Multi-Platform Cobalt Strike Attacks on Linux Servers
Japan’s CERT coordination center identified attacks using the CrossC2 framework to control Linux and macOS systems.Incidents were observed between September and December 2024 across...
News
CISA Adds Two Actively Exploited N-able Flaws to KEV Catalog
CISA has added two newly exploited vulnerabilities in N-able N-central to its Known Exploited Vulnerabilities catalog.
The vulnerabilities, CVE-2025-8875 and CVE-2025-8876, have been actively exploited...
News
Google Mandates Licenses for Crypto Apps Amid Scam Concerns
Google now requires crypto exchange and wallet app developers to hold government licenses before publishing in 15 regions.
The new policy targets locations including the...
News
Zoom, Xerox Patch Critical Windows Flaws Enabling Remote Attacks
Zoom and Xerox resolved major software vulnerabilities that could enable attackers to gain higher system privileges or run unauthorized code.
The Zoom flaw, labeled CVE-2025-49457...