Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

RondoDox Botnet Exploits React2Shell to Widen IoT Infections

A persistent nine-month campaign enrolled IoT devices and web apps into the RondoDox botnet using multiple vulnerabilities, including React2Shell (CVE-2025-55182).About 90,300 vulnerable instances remain...

Trust Wallet Chrome Extension Breach Drains $8.5M from Users

Trust Wallet extension was compromised after developer GitHub secrets leaked, enabling malicious uploads to the Chrome Web Store.The attacker deployed a trojanized extension that...

DarkSpectre browser extensions steal meeting intel from 2.2M

DarkSpectre is linked to three browser-extension campaigns that together affected more than 8.8 million users over seven years.The campaigns — ShadyPanda, GhostPoster and the...

Critical IBM API Connect auth bypass CVE-2025-13915 Patch!!!

IBM disclosed a critical authentication bypass in API Connect, tracked as CVE-2025-13915 and rated 9.8 CVSS.Affected releases include 10.0.8.0 through 10.0.8.5 and 10.0.11.0.IBM provides...

OFAC Removes Three Intellexa Figures From Sanctions List Now

OFAC removed three people tied to the Intellexa Consortium from its sanctions list.The individuals were previously linked to the commercial spyware Predator and had...

Mustang Panda Uses Kernel Rootkit to Deploy TONESHELL in SEA

Mustang Panda used a signed kernel-mode minifilter driver to load a new TONESHELL backdoor in mid-2025.The malicious driver protects files, processes, and registry keys...

Silver Fox uses tax-themed phishing to deliver ValleyRAT now

Silver Fox is using India-themed tax phishing to spread the modular remote-access trojan ValleyRAT.Attackers use decoy PDFs that download an NSIS installer which sideloads...

Spear-phishers hide HTML lures in 27 malicious npm packages.

Attackers published 27 packages to the npm registry to host browser-based phishing lures that harvest credentials.The campaign targeted sales and commercial staff at critical-infrastructure-adjacent...

Must read

Bitcoin (BTC) $ 89,273.00 1.66%
Ethereum (ETH) $ 3,047.89 2.32%
XRP (XRP) $ 1.90 2.31%
Bittensor (TAO) $ 243.97 8.82%
Polkadot (DOT) $ 1.99 8.41%
Cardano (ADA) $ 0.364513 6.66%
Chainlink (LINK) $ 13.00 5.96%
Hyperliquid (HYPE) $ 24.55 4.07%
Monero (XMR) $ 418.48 1.42%
Hedera (HBAR) $ 0.119607 10.25%
Toncoin (TON) $ 1.73 3.17%