Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

Noodlophile Malware Targets Enterprises via Copyright Phishing Emails

Noodlophile Malware targets companies in the U.S., Europe, the Baltics, and Asia-Pacific with advanced phishing campaigns. Attackers use spear-phishing emails disguised as copyright infringement notices,...

Malicious PyPI Packages Uncovered: Supply Chain Risk for Python

Researchers identified malicious Python and npm packages facilitating Malware attacks through official repositories. The compromised Python packages, termncolor and colorinal, enabled remote code execution and...

ERMAC 3.0 Android Trojan Source Code Leak Exposes Major Flaws

Researchers revealed a new version of the Android banking trojan ERMAC 3.0, which targets over 700 financial and cryptocurrency apps. ERMAC 3.0 shows expanded data...

Agentic AI Challenges Traditional Privacy, Demands New Trust Model

Privacy is shifting from control to trust as Artificial Intelligence becomes more autonomous.Agentic AI systems interpret, act on, and evolve with sensitive user data,...

CrossC2 Enables Multi-Platform Cobalt Strike Attacks on Linux Servers

Japan’s CERT coordination center identified attacks using the CrossC2 framework to control Linux and macOS systems.Incidents were observed between September and December 2024 across...

CISA Adds Two Actively Exploited N-able Flaws to KEV Catalog

CISA has added two newly exploited vulnerabilities in N-able N-central to its Known Exploited Vulnerabilities catalog. The vulnerabilities, CVE-2025-8875 and CVE-2025-8876, have been actively exploited...

Google Mandates Licenses for Crypto Apps Amid Scam Concerns

Google now requires crypto exchange and wallet app developers to hold government licenses before publishing in 15 regions. The new policy targets locations including the...

Zoom, Xerox Patch Critical Windows Flaws Enabling Remote Attacks

Zoom and Xerox resolved major software vulnerabilities that could enable attackers to gain higher system privileges or run unauthorized code. The Zoom flaw, labeled CVE-2025-49457...

Must read