Most recent articles by:
Deep Shah
Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.
News
Brazilian Banking Trojan Targets Crypto Platforms
Cybersecurity researchers have uncovered a new Brazilian banking trojan named TCLBANKER, which targets 59 banking, fintech, and cryptocurrency platforms.The malware spreads via malicious MSI...
News
Quasar Linux RAT Targets Developers’ Credentials
A new Linux malware, Quasar Linux RAT (QLNX), is stealthily targeting developers to steal credentials for software supply chains.The malware can hide itself, harvest...
News
Linux ‘Dirty Frag’ Vulnerability Unpatched
A new, unpatched Linux kernel vulnerability dubbed Dirty Frag enables local privilege escalation to root.The flaw chains two Page-Cache Write bugs and has a...
News
Ivanti EPMM Zero-Day Exploited, CISA Issues Order
A new, actively exploited flaw (CVE-2026-6973) in Ivanti Endpoint Manager Mobile allows authenticated admins remote code execution.The U.S. Cybersecurity and Infrastructure Security Agency (CISA)...
News
AI Phishing: New Threat Detection Webinar Announced
Cybersecurity's greatest challenge is human vulnerability, not technology.AI-generated phishing attacks are making the initial malicious "click" nearly impossible to detect.A rapid containment plan focused...
News
Critical Flaws Found in vm2 Node.js Sandbox Library
vm2 Node.js library users must urgently update to version 3.11.2 to patch twelve critical sandbox escape vulnerabilities.The flaws allow attackers to break out of...
News
New botnet targets Android TVs, IoT devices
A new Mirai-derived botnet called xlabs_v1 is targeting internet-exposed Android devices to build a DDoS-for-hire service.The malware specifically hunts for Android Debug Bridge (ADB)...
News
Android Bolsters Security with Binary Transparency Log
Google has expanded its Binary Transparency initiative to the entire Android ecosystem to combat supply chain attacks.The system creates a public cryptographic log, similar...
